Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
WgnsGjhA3P.exe

Overview

General Information

Sample name:WgnsGjhA3P.exe
renamed because original name is a hash value
Original sample name:7766c46c93d028e2e11517cfcf797fbb.exe
Analysis ID:1585664
MD5:7766c46c93d028e2e11517cfcf797fbb
SHA1:147b40c5fe1e860d77c7e02a0c986cb1eaac3ceb
SHA256:52e5833f1dedcc6f05d9585c6b4b52bab86c592061eddf38356492373583f8a0
Tags:exeValleyRATuser-abuse_ch
Infos:

Detection

GhostRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GhostRat
AI detected suspicious sample
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Found evasive API chain (may stop execution after checking mutex)
Found stalling execution ending in API Sleep call
Sample is not signed and drops a device driver
Sigma detected: Potentially Suspicious Malware Callback Communication
Tries to detect sandboxes / dynamic malware analysis system (QueryWinSAT)
AV process strings found (often used to terminate AV products)
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Creates driver files
Detected non-DNS traffic on DNS port
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain checking for process token information
Installs a global mouse hook
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Stores large binary data to the registry
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

  • System is w10x64
  • WgnsGjhA3P.exe (PID: 6988 cmdline: "C:\Users\user\Desktop\WgnsGjhA3P.exe" MD5: 7766C46C93D028E2E11517CFCF797FBB)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
WgnsGjhA3P.exeJoeSecurity_GhostRatYara detected GhostRatJoe Security
    SourceRuleDescriptionAuthorStrings
    Process Memory Space: WgnsGjhA3P.exe PID: 6988JoeSecurity_GhostRatYara detected GhostRatJoe Security
      SourceRuleDescriptionAuthorStrings
      0.2.WgnsGjhA3P.exe.7ff630880000.0.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security
        0.0.WgnsGjhA3P.exe.7ff630880000.0.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security

          System Summary

          barindex
          Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 192.238.134.52, DestinationIsIpv6: false, DestinationPort: 4433, EventID: 3, Image: C:\Users\user\Desktop\WgnsGjhA3P.exe, Initiated: true, ProcessId: 6988, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-08T00:19:02.944402+010020528751A Network Trojan was detected192.168.2.449730192.238.134.524433TCP
          2025-01-08T00:20:09.519910+010020528751A Network Trojan was detected192.168.2.449730192.238.134.524433TCP
          2025-01-08T00:21:14.723449+010020528751A Network Trojan was detected192.168.2.449730192.238.134.524433TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: WgnsGjhA3P.exeReversingLabs: Detection: 50%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
          Source: WgnsGjhA3P.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: z:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: x:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: v:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: t:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: r:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: p:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: n:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: l:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: j:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: h:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: f:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: b:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: y:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: w:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: u:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: s:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: q:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: o:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: m:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: k:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: i:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: g:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: e:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: [:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63088F410 GetLastInputInfo,GetTickCount,wsprintfW,GetForegroundWindow,GetWindowTextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,SHGetFolderPathW,lstrcatW,CreateFileW,lstrlenW,WriteFile,CloseHandle,FindFirstFileW,FindClose,_invalid_parameter_noinfo_noreturn,0_2_00007FF63088F410
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308B3EF0 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF6308B3EF0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308862F0 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6308862F0

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:49730 -> 192.238.134.52:4433
          Source: global trafficTCP traffic: 192.168.2.4:49185 -> 162.159.36.2:53
          Source: Joe Sandbox ViewASN Name: LEASEWEB-USA-LAX-11US LEASEWEB-USA-LAX-11US
          Source: unknownDNS traffic detected: query: 171.39.242.20.in-addr.arpa replaycode: Name error (3)
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
          Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
          Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
          Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF630883B00 select,recv,timeGetTime,0_2_00007FF630883B00
          Source: global trafficDNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: [esc]0_2_00007FF63088ADB0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF630890E20 _invalid_parameter_noinfo_noreturn,lstrlenW,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,CloseClipboard,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF630890E20
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF630890E20 _invalid_parameter_noinfo_noreturn,lstrlenW,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,CloseClipboard,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF630890E20
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF630890E20 _invalid_parameter_noinfo_noreturn,lstrlenW,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,CloseClipboard,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF630890E20
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63088FD10 GetVersion,GetDesktopWindow,GetDC,CreateCompatibleDC,GetDC,GetDeviceCaps,GetDeviceCaps,ReleaseDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,CreateCompatibleBitmap,SelectObject,SetStretchBltMode,GetSystemMetrics,GetSystemMetrics,StretchBlt,GetDIBits,DeleteObject,DeleteObject,ReleaseDC,DeleteObject,DeleteObject,ReleaseDC,_invalid_parameter_noinfo_noreturn,0_2_00007FF63088FD10
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF630887250 MultiByteToWideChar,MultiByteToWideChar,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,CreateMutexExW,GetLastError,Sleep,CreateMutexW,GetLastError,lstrlenW,lstrcmpW,SleepEx,GetModuleHandleW,GetConsoleWindow,SHGetFolderPathW,lstrcatW,CreateMutexW,WaitForSingleObject,CreateFileW,GetFileSize,CloseHandle,DeleteFileW,ReleaseMutex,DirectInput8Create,GetTickCount,GetKeyState,0_2_00007FF630887250
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeWindows user hook set: 0 mouse low level C:\Windows\SYSTEM32\DINPUT8.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63089C1B0: CreateFileA,DeviceIoControl,0_2_00007FF63089C1B0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63088E3E9 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,0_2_00007FF63088E3E9
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63088E4EE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00007FF63088E4EE
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63088E46D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00007FF63088E46D
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile created: C:\ProgramData\kernelquick.sysJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308879E00_2_00007FF6308879E0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308862F00_2_00007FF6308862F0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308872500_2_00007FF630887250
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308A8C100_2_00007FF6308A8C10
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63088F4100_2_00007FF63088F410
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63088FD100_2_00007FF63088FD10
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63089B5000_2_00007FF63089B500
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308815000_2_00007FF630881500
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63089AD800_2_00007FF63089AD80
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308B1DA80_2_00007FF6308B1DA8
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308880400_2_00007FF630888040
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308A62280_2_00007FF6308A6228
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308AF21C0_2_00007FF6308AF21C
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308B714C0_2_00007FF6308B714C
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308A51680_2_00007FF6308A5168
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308AD3200_2_00007FF6308AD320
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308893200_2_00007FF630889320
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308992500_2_00007FF630899250
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63088B4100_2_00007FF63088B410
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63088D4100_2_00007FF63088D410
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308AB3500_2_00007FF6308AB350
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308A73400_2_00007FF6308A7340
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308A536C0_2_00007FF6308A536C
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308AA4F80_2_00007FF6308AA4F8
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308AFD300_2_00007FF6308AFD30
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308B5D340_2_00007FF6308B5D34
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308AC51C0_2_00007FF6308AC51C
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308AAC800_2_00007FF6308AAC80
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63088CD400_2_00007FF63088CD40
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308A4D580_2_00007FF6308A4D58
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308B85840_2_00007FF6308B8584
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308A55780_2_00007FF6308A5578
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63088ADB00_2_00007FF63088ADB0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308A65AC0_2_00007FF6308A65AC
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63089A5A00_2_00007FF63089A5A0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF630892EC00_2_00007FF630892EC0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308B3EF00_2_00007FF6308B3EF0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF630882E500_2_00007FF630882E50
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308AF6B00_2_00007FF6308AF6B0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308B20240_2_00007FF6308B2024
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308B27440_2_00007FF6308B2744
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308A6F3C0_2_00007FF6308A6F3C
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308B37600_2_00007FF6308B3760
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308A4F5C0_2_00007FF6308A4F5C
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308A577C0_2_00007FF6308A577C
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308897A00_2_00007FF6308897A0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308978F00_2_00007FF6308978F0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308909000_2_00007FF630890900
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/1@1/1
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63089B500 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF63089B500
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF630889320 GetSystemDirectoryA,CreateProcessA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,0_2_00007FF630889320
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63088E3E9 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,0_2_00007FF63088E3E9
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63088E4EE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00007FF63088E4EE
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63088E46D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00007FF63088E46D
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308862F0 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6308862F0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308879E0 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CoCreateInstance,wsprintfW,RegOpenKeyExW,RegQueryValueExW,lstrcatW,lstrcatW,RegCloseKey,lstrlenW,lstrcatW,CloseHandle,lstrcatW,lstrcatW,0_2_00007FF6308879E0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308879E0 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CoCreateInstance,wsprintfW,RegOpenKeyExW,RegQueryValueExW,lstrcatW,lstrcatW,RegCloseKey,lstrlenW,lstrcatW,CloseHandle,lstrcatW,lstrcatW,0_2_00007FF6308879E0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeMutant created: \Sessions\1\BaseNamedObjects\????
          Source: WgnsGjhA3P.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: WgnsGjhA3P.exeReversingLabs: Detection: 50%
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: dxgi.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: dinput8.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: inputhost.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: napinsp.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: pnrpnsp.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: wshbth.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: nlaapi.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: winrnr.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: resourcepolicyclient.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: devenum.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: devobj.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: msdmo.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{62BE5D10-60EB-11d0-BD3B-00A0C911CE86}\InprocServer32Jump to behavior
          Source: WgnsGjhA3P.exeStatic PE information: Image base 0x140000000 > 0x60000000
          Source: WgnsGjhA3P.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Source: WgnsGjhA3P.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308862F0 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6308862F0

          Persistence and Installation Behavior

          barindex
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile created: C:\ProgramData\kernelquick.sysJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63088E36A OpenEventLogW,ClearEventLogW,CloseEventLog,0_2_00007FF63088E36A
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE VenkernalData_infoJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_0-21502
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeStalling execution: Execution stalls by calling Sleepgraph_0-21043
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{05DF8D13-C355-47F4-A11E-851B338CEFB8}Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308862F0 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6308862F0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeWindow / User API: threadDelayed 9587Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-21436
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exe TID: 6372Thread sleep count: 9587 > 30Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exe TID: 6372Thread sleep time: -95870s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63088F410 GetLastInputInfo,GetTickCount,wsprintfW,GetForegroundWindow,GetWindowTextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,SHGetFolderPathW,lstrcatW,CreateFileW,lstrlenW,WriteFile,CloseHandle,FindFirstFileW,FindClose,_invalid_parameter_noinfo_noreturn,0_2_00007FF63088F410
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308B3EF0 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF6308B3EF0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308862F0 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6308862F0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308891A0 GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,0_2_00007FF6308891A0
          Source: WgnsGjhA3P.exe, 00000000.00000002.3503564877.0000016C3E03C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: WgnsGjhA3P.exe, 00000000.00000002.3503564877.0000016C3E03C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63089B500 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF63089B500
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63089C70C GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF63089C70C
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308862F0 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6308862F0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308862F0 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6308862F0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF630888690 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,LookupAccountSidW,GetLastError,GetProcessHeap,HeapFree,0_2_00007FF630888690
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63089BCD0 SetUnhandledExceptionFilter,GetConsoleWindow,ShowWindow,GetCurrentThreadId,PostThreadMessageA,GetInputState,CreateThread,WaitForSingleObject,CloseHandle,Sleep,0_2_00007FF63089BCD0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63089B500 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF63089B500
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308A3A6C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6308A3A6C
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63089E54C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF63089E54C
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63089E6F4 SetUnhandledExceptionFilter,0_2_00007FF63089E6F4
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63089E8E0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF63089E8E0

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF630889320 GetSystemDirectoryA,CreateProcessA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,0_2_00007FF630889320
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF630889320 GetSystemDirectoryA,CreateProcessA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,0_2_00007FF630889320
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: GetSystemDirectoryA,CreateProcessA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\System32\svchost.exe0_2_00007FF630889320
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63089B500 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF63089B500
          Source: WgnsGjhA3P.exe, 00000000.00000003.1728670149.0000016C3E0E5000.00000004.00000020.00020000.00000000.sdmp, WgnsGjhA3P.exe, 00000000.00000002.3503564877.0000016C3E0E5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0 minProgram Manager
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308BC8C0 cpuid 0_2_00007FF6308BC8C0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6308862F0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: EnumSystemLocalesW,0_2_00007FF6308B7B08
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: EnumSystemLocalesW,0_2_00007FF6308B7A38
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF6308B7BA0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: GetLocaleInfoW,0_2_00007FF6308B0D10
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: GetLocaleInfoW,0_2_00007FF6308B7DE8
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,0_2_00007FF6308B76DC
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: GetLocaleInfoW,0_2_00007FF6308B7FF0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00007FF6308B7F40
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF6308B8124
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: EnumSystemLocalesW,0_2_00007FF6308B0838
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308862F0 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6308862F0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF6308B1DA8 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,0_2_00007FF6308B1DA8
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF63088FD10 GetVersion,GetDesktopWindow,GetDC,CreateCompatibleDC,GetDC,GetDeviceCaps,GetDeviceCaps,ReleaseDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,CreateCompatibleBitmap,SelectObject,SetStretchBltMode,GetSystemMetrics,GetSystemMetrics,StretchBlt,GetDIBits,DeleteObject,DeleteObject,ReleaseDC,DeleteObject,DeleteObject,ReleaseDC,_invalid_parameter_noinfo_noreturn,0_2_00007FF63088FD10
          Source: WgnsGjhA3P.exe, 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmp, WgnsGjhA3P.exe, 00000000.00000000.1656315338.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: KSafeTray.exe

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: WgnsGjhA3P.exe, type: SAMPLE
          Source: Yara matchFile source: 0.2.WgnsGjhA3P.exe.7ff630880000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.0.WgnsGjhA3P.exe.7ff630880000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: Process Memory Space: WgnsGjhA3P.exe PID: 6988, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: WgnsGjhA3P.exe, type: SAMPLE
          Source: Yara matchFile source: 0.2.WgnsGjhA3P.exe.7ff630880000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.0.WgnsGjhA3P.exe.7ff630880000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: Process Memory Space: WgnsGjhA3P.exe PID: 6988, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure1
          Replication Through Removable Media
          12
          Native API
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          121
          Input Capture
          2
          System Time Discovery
          Remote Services1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          Windows Service
          1
          Access Token Manipulation
          1
          Modify Registry
          LSASS Memory11
          Peripheral Device Discovery
          Remote Desktop Protocol1
          Screen Capture
          1
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
          Windows Service
          1
          Virtualization/Sandbox Evasion
          Security Account Manager2
          File and Directory Discovery
          SMB/Windows Admin Shares121
          Input Capture
          1
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook211
          Process Injection
          1
          Access Token Manipulation
          NTDS26
          System Information Discovery
          Distributed Component Object Model3
          Clipboard Data
          1
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script211
          Process Injection
          LSA Secrets151
          Security Software Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Indicator Removal
          Cached Domain Credentials1
          Virtualization/Sandbox Evasion
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync3
          Process Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
          Application Window Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          WgnsGjhA3P.exe50%ReversingLabsWin64.Backdoor.GhostRAT
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          171.39.242.20.in-addr.arpa
          unknown
          unknownfalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            192.238.134.52
            unknownUnited States
            395954LEASEWEB-USA-LAX-11UStrue
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1585664
            Start date and time:2025-01-08 00:18:06 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 5m 2s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Run name:Run with higher sleep bypass
            Number of analysed new started processes analysed:5
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:WgnsGjhA3P.exe
            renamed because original name is a hash value
            Original Sample Name:7766c46c93d028e2e11517cfcf797fbb.exe
            Detection:MAL
            Classification:mal100.troj.spyw.evad.winEXE@1/1@1/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 41
            • Number of non-executed functions: 119
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
            • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
            • Excluded IPs from analysis (whitelisted): 4.245.163.56, 20.242.39.171, 172.202.163.200, 13.107.246.45
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtEnumerateKey calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • VT rate limit hit for: WgnsGjhA3P.exe
            No simulations
            No context
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            LEASEWEB-USA-LAX-11USMes_Drivers_3.0.4.exeGet hashmaliciousUnknownBrowse
            • 23.83.76.85
            fuckunix.sh4.elfGet hashmaliciousMiraiBrowse
            • 23.85.171.227
            armv7l.elfGet hashmaliciousUnknownBrowse
            • 23.83.17.216
            f3fBEUL66b.exeGet hashmaliciousGhostRatBrowse
            • 192.238.134.113
            f3fBEUL66b.exeGet hashmaliciousGhostRatBrowse
            • 192.238.134.113
            nabarm7.elfGet hashmaliciousUnknownBrowse
            • 23.84.102.105
            52C660192933BE09807FC4895F376764A2BE35AA68567819BB854E83CF5F9E5C.dllGet hashmaliciousUnknownBrowse
            • 192.238.132.206
            mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
            • 23.87.203.7
            la.bot.arm6.elfGet hashmaliciousMiraiBrowse
            • 108.187.71.205
            No context
            No context
            Process:C:\Users\user\Desktop\WgnsGjhA3P.exe
            File Type:data
            Category:dropped
            Size (bytes):30
            Entropy (8bit):2.6616157143988106
            Encrypted:false
            SSDEEP:3:tblM6lEjln:tbhEZn
            MD5:AE50B29A0B8DCC411F24F1863B0EAFDE
            SHA1:D415A55627B1ADED8E4B2CBBA402F816B0461155
            SHA-256:6B4BBBCE480FBC50D39A8EC4B72CDB7D781B151921E063DD899FD9B736ADCF68
            SHA-512:D9A9BA42D99BE32D26667060BE1D523DCD20EAFA187A67F7919002CC6DA349FD058053C9C6F721D6FDB730EA02FBAA3013E51C0C653368BD6B3F57A4C0FCABA8
            Malicious:true
            Reputation:moderate, very likely benign file
            Preview:C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.
            File type:PE32+ executable (GUI) x86-64, for MS Windows
            Entropy (8bit):6.060388863278636
            TrID:
            • Win64 Executable GUI (202006/5) 92.65%
            • Win64 Executable (generic) (12005/4) 5.51%
            • Generic Win/DOS Executable (2004/3) 0.92%
            • DOS Executable Generic (2002/1) 0.92%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:WgnsGjhA3P.exe
            File size:389'632 bytes
            MD5:7766c46c93d028e2e11517cfcf797fbb
            SHA1:147b40c5fe1e860d77c7e02a0c986cb1eaac3ceb
            SHA256:52e5833f1dedcc6f05d9585c6b4b52bab86c592061eddf38356492373583f8a0
            SHA512:18c849a8de6220e2109c24352016d82201184738197acf4b8c37999ba36cd6b27540048095d3903212b52c44a064ab57a4f3f9f0dc48e4c042881c4d166e7a8c
            SSDEEP:6144:4KtL0RSVgMoEao8ItdKwzBFdYmT+xmCiRLBVmLhkM:NtwSqEao8It4wlDCxm/qx
            TLSH:1F848E49F79405F8E5678138C9634916EBB27C6D03A09BDF33A4866A2F237D0AD3E711
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........A...A...A.......D...............@.......@...Q(..K...Q(..S...Q(..........U.......X...A...m....)..S....)..@...RichA..........
            Icon Hash:90cececece8e8eb0
            Entrypoint:0x14001e13c
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x140000000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Time Stamp:0x677168BF [Sun Dec 29 15:20:31 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:6
            OS Version Minor:0
            File Version Major:6
            File Version Minor:0
            Subsystem Version Major:6
            Subsystem Version Minor:0
            Import Hash:d7444b6dc7c8cddb50fba5269ad57bce
            Instruction
            dec eax
            sub esp, 28h
            call 00007F48CD1396B0h
            dec eax
            add esp, 28h
            jmp 00007F48CD138F07h
            int3
            int3
            dec eax
            sub esp, 28h
            dec ebp
            mov eax, dword ptr [ecx+38h]
            dec eax
            mov ecx, edx
            dec ecx
            mov edx, ecx
            call 00007F48CD1390A2h
            mov eax, 00000001h
            dec eax
            add esp, 28h
            ret
            int3
            int3
            int3
            inc eax
            push ebx
            inc ebp
            mov ebx, dword ptr [eax]
            dec eax
            mov ebx, edx
            inc ecx
            and ebx, FFFFFFF8h
            dec esp
            mov ecx, ecx
            inc ecx
            test byte ptr [eax], 00000004h
            dec esp
            mov edx, ecx
            je 00007F48CD1390A5h
            inc ecx
            mov eax, dword ptr [eax+08h]
            dec ebp
            arpl word ptr [eax+04h], dx
            neg eax
            dec esp
            add edx, ecx
            dec eax
            arpl ax, cx
            dec esp
            and edx, ecx
            dec ecx
            arpl bx, ax
            dec edx
            mov edx, dword ptr [eax+edx]
            dec eax
            mov eax, dword ptr [ebx+10h]
            mov ecx, dword ptr [eax+08h]
            dec eax
            mov eax, dword ptr [ebx+08h]
            test byte ptr [ecx+eax+03h], 0000000Fh
            je 00007F48CD13909Dh
            movzx eax, byte ptr [ecx+eax+03h]
            and eax, FFFFFFF0h
            dec esp
            add ecx, eax
            dec esp
            xor ecx, edx
            dec ecx
            mov ecx, ecx
            pop ebx
            jmp 00007F48CD1390AAh
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            nop word ptr [eax+eax+00000000h]
            dec eax
            cmp ecx, dword ptr [00036E59h]
            jne 00007F48CD1390A2h
            dec eax
            rol ecx, 10h
            test cx, FFFFh
            jne 00007F48CD139093h
            ret
            dec eax
            ror ecx, 10h
            jmp 00007F48CD1397ABh
            int3
            int3
            dec eax
            mov dword ptr [esp+00h], ebx
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x523b00x104.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x600000x3420.pdata
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x640000xc80.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x4c7b00x38.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x4c9800x28.rdata
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x4c6700x140.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x3f0000x918.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x3dbf00x3dc00d3f6189e43bbd290b28f7518c02b76a1False0.5461593813259109data6.462564110280856IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x3f0000x1519e0x152006edb872335ad42db6aa2ce85a47a3af5False0.4149986131656805data4.932101759530432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x550000xaa6c0x7c00b1cb403515f9a2e2bde815147bd596cdFalse0.10622479838709678DOS executable (block device driver \377\3)1.5580115815014906IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .pdata0x600000x34200x360020b7b9769859dd90801ea597a1d992beFalse0.4626736111111111data5.517914471579984IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x640000xc800xe00316f5780e4a2c74c1946985bacab1ae4False0.4916294642857143data5.228910762857474IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            DLLImport
            KERNEL32.dllQueryDosDeviceW, WriteProcessMemory, GetCommandLineW, GetCurrentProcess, WriteFile, OutputDebugStringA, GetModuleFileNameW, GetProcessId, CreateMutexW, GetLocaleInfoW, LocalAlloc, CreateFileW, GetVersionExW, K32GetProcessImageFileNameW, GetSystemDirectoryW, ResumeThread, GetModuleHandleA, OpenProcess, GetVersion, GetLogicalDriveStringsW, CreateToolhelp32Snapshot, MultiByteToWideChar, Process32NextW, GetDiskFreeSpaceExW, GetSystemDirectoryA, LoadLibraryA, lstrcatW, GlobalAlloc, Process32FirstW, GlobalFree, GetSystemInfo, LoadLibraryW, GetLocalTime, VirtualProtectEx, GetThreadContext, GetProcAddress, VirtualAllocEx, LocalFree, ExitProcess, GetCurrentProcessId, GlobalMemoryStatusEx, CreateProcessW, GetModuleHandleW, FreeLibrary, GetConsoleWindow, lstrcpyW, CreateRemoteThread, CreateProcessA, SetThreadContext, GetModuleFileNameA, GetTickCount, lstrcmpW, GetDriveTypeW, GetExitCodeProcess, SetFilePointer, ReleaseMutex, GlobalSize, DeleteFileW, GlobalLock, GetFileSize, GlobalUnlock, FindFirstFileW, ExpandEnvironmentStringsW, FindClose, GetFileAttributesW, TerminateThread, VirtualProtect, IsBadReadPtr, CreateThread, IsDebuggerPresent, SetUnhandledExceptionFilter, WriteConsoleW, GetCurrentThreadId, GetConsoleMode, GetConsoleOutputCP, FlushFileBuffers, SetFilePointerEx, SetStdHandle, SetEnvironmentVariableW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetOEMCP, GetACP, IsValidCodePage, FindNextFileW, FindFirstFileExW, GetTimeZoneInformation, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, LCMapStringW, CompareStringW, FlsFree, FlsSetValue, GetStartupInfoW, CreateWaitableTimerW, SetWaitableTimer, TryEnterCriticalSection, WideCharToMultiByte, ResetEvent, CreateEventW, lstrlenW, CancelIo, GetNativeSystemInfo, SetLastError, lstrcmpiW, CreateEventA, CloseHandle, SetEvent, Sleep, HeapFree, WaitForSingleObject, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, EnterCriticalSection, HeapCreate, GetProcessHeap, DeleteCriticalSection, HeapDestroy, DecodePointer, HeapAlloc, HeapReAlloc, GetLastError, HeapSize, InitializeCriticalSectionEx, VirtualAlloc, VirtualFree, FlsGetValue, FlsAlloc, GetFileType, GetCommandLineA, GetStdHandle, VirtualQuery, GetModuleHandleExW, FreeLibraryAndExitThread, ExitThread, LoadLibraryExW, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, RtlPcToFileHeader, RtlUnwindEx, lstrcpyA, CreateFileA, GetSystemDefaultLangID, DeviceIoControl, TerminateProcess, InitializeSListHead, GetSystemTimeAsFileTime, QueryPerformanceCounter, IsProcessorFeaturePresent, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, SleepConditionVariableSRW, WakeAllConditionVariable, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, GetCPInfo, LCMapStringEx, EncodePointer, CompareStringEx, GetStringTypeW, RaiseException, OutputDebugStringW, SwitchToThread
            USER32.dllMsgWaitForMultipleObjects, GetWindowTextW, wsprintfW, GetForegroundWindow, GetLastInputInfo, GetClipboardData, CloseClipboard, OpenClipboard, GetKeyState, ReleaseDC, GetDesktopWindow, SetClipboardData, ExitWindowsEx, EmptyClipboard, GetSystemMetrics, GetDC, GetInputState, PostThreadMessageA, TranslateMessage, DispatchMessageW, PeekMessageW, ShowWindow
            GDI32.dllCreateCompatibleBitmap, SelectObject, CreateDIBSection, SetDIBColorTable, CreateCompatibleDC, StretchBlt, GetDIBits, GetDeviceCaps, GetObjectW, SetStretchBltMode, DeleteObject, DeleteDC
            ADVAPI32.dllOpenProcessToken, RegQueryValueExW, AllocateAndInitializeSid, FreeSid, CheckTokenMembership, ClearEventLogW, CloseEventLog, OpenEventLogW, LookupPrivilegeValueW, AdjustTokenPrivileges, GetCurrentHwProfileW, RegCloseKey, RegQueryInfoKeyW, GetSidSubAuthorityCount, GetSidSubAuthority, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCreateKeyW, RegDeleteValueW, LookupAccountSidW, GetTokenInformation
            SHELL32.dllSHGetFolderPathW
            ole32.dllCreateStreamOnHGlobal, GetHGlobalFromStream, CoInitialize, CoUninitialize, CoCreateInstance
            OLEAUT32.dllSysFreeString
            WS2_32.dllWSASetLastError, WSAEventSelect, WSAResetEvent, WSAWaitForMultipleEvents, WSAEnumNetworkEvents, WSAGetLastError, WSACleanup, WSAIoctl, closesocket, WSACreateEvent, select, WSAStartup, send, socket, connect, recv, htons, setsockopt, inet_ntoa, WSACloseEvent, gethostbyname, gethostname, shutdown
            WINMM.dlltimeGetTime
            gdiplus.dllGdipCreateBitmapFromStream, GdipBitmapUnlockBits, GdipCloneImage, GdipAlloc, GdiplusShutdown, GdipDrawImageI, GdipCreateBitmapFromScan0, GdipCreateBitmapFromHBITMAP, GdipGetImageWidth, GdipGetImagePalette, GdipDeleteGraphics, GdipGetImageEncodersSize, GdipGetImageGraphicsContext, GdipFree, GdipGetImagePixelFormat, GdipDisposeImage, GdipSaveImageToStream, GdipBitmapLockBits, GdipGetImagePaletteSize, GdiplusStartup, GdipGetImageHeight, GdipGetImageEncoders
            dxgi.dllCreateDXGIFactory
            DINPUT8.dllDirectInput8Create
            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
            2025-01-08T00:19:02.944402+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.449730192.238.134.524433TCP
            2025-01-08T00:20:09.519910+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.449730192.238.134.524433TCP
            2025-01-08T00:21:14.723449+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.449730192.238.134.524433TCP
            TimestampSource PortDest PortSource IPDest IP
            Jan 8, 2025 00:19:01.754209042 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:19:01.760711908 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:19:01.760890961 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:19:02.516408920 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:19:02.521799088 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:19:02.521821976 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:19:02.521872044 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:19:02.521924019 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:19:02.839272976 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:19:02.894110918 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:19:02.938110113 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:19:02.944330931 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:19:02.944343090 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:19:02.944351912 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:19:02.944401979 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:19:02.946050882 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:19:02.950473070 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:19:19.426230907 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:19:19.432627916 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:19:19.747056961 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:19:19.800528049 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:19:27.589776993 CET4918553192.168.2.4162.159.36.2
            Jan 8, 2025 00:19:27.594640017 CET5349185162.159.36.2192.168.2.4
            Jan 8, 2025 00:19:27.594711065 CET4918553192.168.2.4162.159.36.2
            Jan 8, 2025 00:19:27.599500895 CET5349185162.159.36.2192.168.2.4
            Jan 8, 2025 00:19:28.039550066 CET4918553192.168.2.4162.159.36.2
            Jan 8, 2025 00:19:28.044572115 CET5349185162.159.36.2192.168.2.4
            Jan 8, 2025 00:19:28.044629097 CET4918553192.168.2.4162.159.36.2
            Jan 8, 2025 00:19:36.222687960 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:19:36.229800940 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:19:36.544368029 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:19:36.597546101 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:19:52.472701073 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:19:52.477730036 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:19:52.791897058 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:19:52.832012892 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:20:09.519910097 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:20:09.525630951 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:20:09.839143038 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:20:09.894650936 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:20:25.488699913 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:20:25.495203018 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:20:25.809870958 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:20:25.863569975 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:20:41.691937923 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:20:41.696821928 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:20:42.011234045 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:20:42.066787004 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:20:57.988953114 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:20:57.993860960 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:20:58.308326006 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:20:58.348289967 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:21:14.723448992 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:21:14.729775906 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:21:15.043353081 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:21:15.098267078 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:21:30.770328999 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:21:30.775257111 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:21:31.121126890 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:21:31.160897017 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:21:46.473824024 CET497304433192.168.2.4192.238.134.52
            Jan 8, 2025 00:21:46.557847977 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:21:46.872154951 CET443349730192.238.134.52192.168.2.4
            Jan 8, 2025 00:21:46.926728964 CET497304433192.168.2.4192.238.134.52
            TimestampSource PortDest PortSource IPDest IP
            Jan 8, 2025 00:19:27.589283943 CET5353995162.159.36.2192.168.2.4
            Jan 8, 2025 00:19:28.051831007 CET5022153192.168.2.41.1.1.1
            Jan 8, 2025 00:19:28.058994055 CET53502211.1.1.1192.168.2.4
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Jan 8, 2025 00:19:28.051831007 CET192.168.2.41.1.1.10x2c64Standard query (0)171.39.242.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Jan 8, 2025 00:19:28.058994055 CET1.1.1.1192.168.2.40x2c64Name error (3)171.39.242.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Target ID:0
            Start time:18:18:54
            Start date:07/01/2025
            Path:C:\Users\user\Desktop\WgnsGjhA3P.exe
            Wow64 process (32bit):false
            Commandline:"C:\Users\user\Desktop\WgnsGjhA3P.exe"
            Imagebase:0x7ff630880000
            File size:389'632 bytes
            MD5 hash:7766C46C93D028E2E11517CFCF797FBB
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:false

            Reset < >

              Execution Graph

              Execution Coverage:7.5%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:38.4%
              Total number of Nodes:1032
              Total number of Limit Nodes:40
              execution_graph 22175 7ff6308bddd0 RegCloseKey RegCloseKey 22176 7ff63088bbd0 GetStringTypeW 22258 7ff63088bcd0 LCMapStringEx __crtLCMapStringW 22178 7ff63088e3c7 ExitProcess 22259 7ff63088e2c8 144 API calls BuildCatchObjectHelperInternal 22262 7ff6308818d0 47 API calls Concurrency::cancel_current_task 22179 7ff6308a1dcc 61 API calls 6 library calls 22180 7ff63088bfc0 GdipDisposeImage GdipFree 21004 7ff63089dfc0 21027 7ff63089dc60 21004->21027 21007 7ff63089dfe1 21010 7ff63089e121 21007->21010 21012 7ff63089dfff 21007->21012 21008 7ff63089e117 21047 7ff63089e54c 7 API calls 2 library calls 21008->21047 21048 7ff63089e54c 7 API calls 2 library calls 21010->21048 21013 7ff63089e024 21012->21013 21018 7ff63089e041 __scrt_release_startup_lock 21012->21018 21033 7ff6308acb44 21012->21033 21014 7ff63089e12c BuildCatchObjectHelperInternal 21016 7ff63089e0aa 21037 7ff6308ac44c 21016->21037 21018->21016 21044 7ff6308abd34 47 API calls 21018->21044 21020 7ff63089e0af 21043 7ff63089bcd0 10 API calls 21020->21043 21022 7ff63089e0cc 21045 7ff63089e6a0 GetModuleHandleW 21022->21045 21025 7ff63089e0d3 21025->21014 21046 7ff63089dde4 7 API calls 21025->21046 21026 7ff63089e0ea 21026->21013 21028 7ff63089dc68 21027->21028 21029 7ff63089dc74 __scrt_dllmain_crt_thread_attach 21028->21029 21030 7ff63089dc7d 21029->21030 21031 7ff63089dc81 21029->21031 21030->21007 21030->21008 21031->21030 21049 7ff6308a0128 7 API calls 2 library calls 21031->21049 21034 7ff6308acb7a 21033->21034 21035 7ff6308acb49 21033->21035 21034->21018 21035->21034 21050 7ff630881000 WSAStartup 21035->21050 21038 7ff6308ac45c 21037->21038 21041 7ff6308ac471 21037->21041 21038->21041 21057 7ff6308ac108 50 API calls __free_lconv_num 21038->21057 21040 7ff6308ac47a 21040->21041 21058 7ff6308ac2d8 12 API calls 3 library calls 21040->21058 21041->21020 21043->21022 21044->21016 21045->21025 21046->21026 21047->21010 21048->21014 21049->21030 21053 7ff63089de4c 21050->21053 21056 7ff63089de10 50 API calls 21053->21056 21055 7ff63088103a 21055->21035 21056->21055 21057->21040 21058->21041 22267 7ff6308b3ef0 54 API calls 5 library calls 22271 7ff63089e0ee GetModuleHandleW BuildCatchObjectHelperInternal 22183 7ff630889df0 49 API calls 22184 7ff63088eff2 188 API calls 22186 7ff6308b7de8 55 API calls 4 library calls 22274 7ff6308ac8e8 11 API calls 22188 7ff63088e3e9 14 API calls 22190 7ff630883ff0 WaitForSingleObject Sleep WaitForSingleObject WaitForSingleObject Sleep 22192 7ff63088b3e0 CloseHandle RtlPcToFileHeader RaiseException 22276 7ff630891ce0 48 API calls 22278 7ff63089dedc 59 API calls 2 library calls 22194 7ff6308acc10 GetCommandLineA GetCommandLineW 22195 7ff63088d410 360 API calls 6 library calls 22279 7ff6308bcf14 57 API calls 2 library calls 21769 7ff6308a8808 21770 7ff6308a8825 21769->21770 21771 7ff6308a8816 GetLastError ExitThread 21769->21771 21784 7ff6308aea70 GetLastError 21770->21784 21775 7ff6308a8843 21781 7ff630887250 116 API calls 21775->21781 21810 7ff630883b00 21775->21810 21824 7ff630883da0 21775->21824 21778 7ff6308a8862 21832 7ff6308a8a1c 19 API calls 21778->21832 21781->21778 21785 7ff6308aeab1 FlsSetValue 21784->21785 21786 7ff6308aea94 FlsGetValue 21784->21786 21788 7ff6308aeac3 21785->21788 21804 7ff6308aeaa1 21785->21804 21787 7ff6308aeaab 21786->21787 21786->21804 21787->21785 21790 7ff6308b0788 _get_daylight 11 API calls 21788->21790 21789 7ff6308aeb1d SetLastError 21791 7ff6308aeb3d 21789->21791 21792 7ff6308a882a 21789->21792 21793 7ff6308aead2 21790->21793 21834 7ff6308a3dd8 47 API calls 2 library calls 21791->21834 21806 7ff6308b137c 21792->21806 21795 7ff6308aeaf0 FlsSetValue 21793->21795 21796 7ff6308aeae0 FlsSetValue 21793->21796 21799 7ff6308aeb0e 21795->21799 21800 7ff6308aeafc FlsSetValue 21795->21800 21798 7ff6308aeae9 21796->21798 21802 7ff6308ae6bc __free_lconv_num 11 API calls 21798->21802 21833 7ff6308ae820 11 API calls _get_daylight 21799->21833 21800->21798 21802->21804 21803 7ff6308aeb16 21805 7ff6308ae6bc __free_lconv_num 11 API calls 21803->21805 21804->21789 21805->21789 21807 7ff6308a8836 21806->21807 21808 7ff6308b138b 21806->21808 21807->21775 21831 7ff6308b10b0 5 API calls std::_Locinfo::_Locinfo_ctor 21807->21831 21808->21807 21835 7ff6308b0ac8 5 API calls std::_Locinfo::_Locinfo_ctor 21808->21835 21814 7ff630883b18 21810->21814 21811 7ff630883c54 21811->21778 21812 7ff630883be0 select 21812->21811 21812->21814 21813 7ff630883c08 recv 21813->21814 21814->21811 21814->21812 21814->21813 21815 7ff6308a8afc 11 API calls _get_daylight 21814->21815 21816 7ff630881730 2 API calls 21814->21816 21817 7ff630883d04 timeGetTime 21814->21817 21819 7ff630881500 VirtualAlloc VirtualFree 21814->21819 21836 7ff63088dbef 21814->21836 21844 7ff63088d9c0 21814->21844 21859 7ff63088e29b 21814->21859 21863 7ff630881810 VirtualAlloc VirtualFree BuildCatchObjectHelperInternal 21814->21863 21815->21814 21816->21814 21818 7ff630881730 2 API calls 21817->21818 21818->21814 21819->21814 21825 7ff630883e22 21824->21825 21828 7ff630883db4 21824->21828 21825->21778 21826 7ff630883dc8 SleepEx 21826->21828 21827 7ff630883e15 21827->21778 21828->21826 21828->21827 21830 7ff630883e30 10 API calls 21828->21830 21829 7ff630883df1 timeGetTime 21829->21828 21830->21829 21831->21775 21833->21803 21835->21807 21837 7ff63088dbfb 21836->21837 21839 7ff63088e2c3 21836->21839 21838 7ff6308a87a0 std::_Locinfo::_Locinfo_ctor 47 API calls 21837->21838 21840 7ff63088dc19 21837->21840 21838->21840 21839->21814 21840->21839 21864 7ff63088f410 21840->21864 21842 7ff63088dc41 21842->21839 21843 7ff630883e30 10 API calls 21842->21843 21843->21839 21845 7ff63088d9df 21844->21845 21846 7ff63088da2a CloseHandle 21844->21846 21847 7ff63088da44 21845->21847 21848 7ff63088da0b 21845->21848 21846->21847 21849 7ff6308a3d58 _invalid_parameter_noinfo_noreturn 47 API calls 21847->21849 21848->21846 21850 7ff63088da49 21849->21850 21851 7ff63088daf7 21850->21851 21854 7ff63089de98 std::_Facet_Register 49 API calls 21850->21854 21852 7ff63088db41 RegOpenKeyExW 21851->21852 21853 7ff63088dbb0 21851->21853 21852->21853 21855 7ff63088db7c RegQueryValueExW 21852->21855 21853->21814 21856 7ff63088da83 memcpy_s 21854->21856 21855->21853 21857 7ff63088da97 GetLastInputInfo GetTickCount wsprintfW 21856->21857 22084 7ff630888040 21857->22084 21860 7ff63088e2a2 21859->21860 21861 7ff63088e2c3 21860->21861 21862 7ff630883e30 10 API calls 21860->21862 21861->21814 21862->21861 21863->21814 21865 7ff63089de98 std::_Facet_Register 49 API calls 21864->21865 21866 7ff63088f437 memcpy_s 21865->21866 21867 7ff63088f44b GetLastInputInfo GetTickCount wsprintfW GetForegroundWindow 21866->21867 21868 7ff63088f4a1 GetWindowTextW 21867->21868 21869 7ff63088f4b4 CreateToolhelp32Snapshot 21867->21869 21868->21869 21870 7ff63088f555 CreateToolhelp32Snapshot 21869->21870 21871 7ff63088f4d8 memcpy_s 21869->21871 21873 7ff63088f577 memcpy_s 21870->21873 21874 7ff63088f5f8 CreateToolhelp32Snapshot 21870->21874 21875 7ff63088f4e9 Process32FirstW 21871->21875 21877 7ff63088f58b Process32FirstW 21873->21877 21878 7ff63088f6a8 RegOpenKeyExW 21874->21878 21879 7ff63088f61a memcpy_s 21874->21879 21875->21870 21884 7ff63088f501 21875->21884 21877->21874 21891 7ff63088f5a9 21877->21891 21881 7ff63088f913 RegOpenKeyExW 21878->21881 21882 7ff63088f6fa RegQueryValueExW 21878->21882 21885 7ff63088f62e Process32FirstW 21879->21885 21886 7ff63088f951 RegQueryValueExW 21881->21886 21887 7ff63088f9f2 RegOpenKeyExW 21881->21887 21888 7ff63088f908 RegCloseKey 21882->21888 21900 7ff63088f734 memcpy_s 21882->21900 21883 7ff63088f544 Process32NextW 21883->21870 21883->21884 21884->21870 21884->21883 21885->21878 21898 7ff63088f64c 21885->21898 21889 7ff63088f9e7 RegCloseKey 21886->21889 21901 7ff63088f986 memcpy_s 21886->21901 21892 7ff63088fa30 RegQueryValueExW 21887->21892 21893 7ff63088fad1 7 API calls 21887->21893 21888->21881 21889->21887 21890 7ff63088f5e4 Process32NextW 21890->21874 21890->21891 21891->21874 21891->21890 21896 7ff63088fac6 RegCloseKey 21892->21896 21903 7ff63088fa65 memcpy_s 21892->21903 21894 7ff63088fb91 FindClose 21893->21894 21895 7ff63088fb89 21893->21895 21918 7ff63088fd10 GetVersion 21894->21918 21895->21894 21896->21893 21897 7ff63088f694 Process32NextW 21897->21878 21897->21898 21898->21878 21898->21897 21902 7ff63088f75e RegQueryValueExW 21900->21902 21904 7ff63088f9b0 RegQueryValueExW 21901->21904 21902->21888 21905 7ff63088f791 21902->21905 21906 7ff63088fa8f RegQueryValueExW 21903->21906 21904->21889 21907 7ff63088f9df 21904->21907 21940 7ff630891390 49 API calls 4 library calls 21905->21940 21906->21896 21909 7ff63088fabe 21906->21909 21907->21889 21909->21896 21910 7ff63088fbd1 BuildCatchObjectHelperInternal 21916 7ff63088fcbe 21910->21916 21917 7ff630883e30 10 API calls 21910->21917 21911 7ff63088f900 21911->21888 21912 7ff63088fcfe 21913 7ff6308a3d58 _invalid_parameter_noinfo_noreturn 47 API calls 21912->21913 21915 7ff63088fd03 21913->21915 21914 7ff63088f79d 21914->21888 21914->21911 21914->21912 21916->21842 21917->21916 21919 7ff63088fd40 21918->21919 21920 7ff630890145 21918->21920 21919->21920 21921 7ff63088fd4c 7 API calls 21919->21921 21920->21910 21922 7ff63088fe0e GetSystemMetrics 21921->21922 21923 7ff63088fdfa 21921->21923 21925 7ff63088fe2e GetSystemMetrics 21922->21925 21926 7ff63088fe78 GetSystemMetrics 21922->21926 21924 7ff63088fe97 8 API calls 21923->21924 21927 7ff63088ffe2 memcpy_s 21924->21927 21925->21924 21926->21924 21928 7ff63088fff7 GetDIBits 21927->21928 21929 7ff63089002f memcpy_s BuildCatchObjectHelperInternal 21928->21929 21930 7ff63089de98 std::_Facet_Register 49 API calls 21929->21930 21931 7ff6308900a2 21930->21931 21941 7ff6308902a0 GlobalAlloc GlobalLock 21931->21941 21934 7ff6308900e1 DeleteObject DeleteObject ReleaseDC 21939 7ff63089010b 21934->21939 21935 7ff6308901b1 BuildCatchObjectHelperInternal 21936 7ff6308901f2 DeleteObject DeleteObject ReleaseDC 21935->21936 21936->21939 21937 7ff6308a3d58 _invalid_parameter_noinfo_noreturn 47 API calls 21938 7ff630890295 21937->21938 21939->21920 21939->21937 21940->21914 21989 7ff6308bd110 21941->21989 21944 7ff63089031f 21991 7ff6308861e0 21944->21991 21945 7ff630890671 GlobalFree 21946 7ff6308900d1 21945->21946 21946->21934 21946->21935 21950 7ff63089037c 21951 7ff630890384 GdipCreateBitmapFromStream 21950->21951 21988 7ff6308905e7 21950->21988 21952 7ff6308903b0 GdipDisposeImage 21951->21952 21953 7ff6308903bb 21951->21953 21952->21988 22009 7ff63088c340 GdipGetImagePixelFormat 21953->22009 21955 7ff6308903c8 GdipDisposeImage 21959 7ff6308903dc CreateStreamOnHGlobal 21955->21959 21955->21988 21956 7ff630890606 DeleteObject 21957 7ff63089062a 21956->21957 21958 7ff6308861e0 58 API calls 21957->21958 21960 7ff63089062f EnterCriticalSection 21958->21960 21961 7ff6308903f9 21959->21961 21959->21988 21962 7ff630890642 EnterCriticalSection 21960->21962 21963 7ff630890667 LeaveCriticalSection 21960->21963 22043 7ff63088c7b0 21961->22043 21965 7ff630890654 GdiplusShutdown 21962->21965 21966 7ff63089065a LeaveCriticalSection 21962->21966 21963->21945 21965->21966 21966->21963 21967 7ff630890406 GetHGlobalFromStream GlobalLock 21968 7ff63089042e GlobalFree 21967->21968 21969 7ff6308904bf GlobalSize 21967->21969 21971 7ff63089044f DeleteObject 21968->21971 21972 7ff630890471 21968->21972 21973 7ff6308904d2 BuildCatchObjectHelperInternal 21969->21973 21971->21972 21974 7ff6308861e0 58 API calls 21972->21974 22057 7ff630889e70 21973->22057 21976 7ff630890476 EnterCriticalSection 21974->21976 21978 7ff6308904ae LeaveCriticalSection 21976->21978 21979 7ff630890489 EnterCriticalSection 21976->21979 21977 7ff630890501 21982 7ff630890594 21977->21982 21983 7ff630890698 21977->21983 21978->21946 21980 7ff6308904a1 LeaveCriticalSection 21979->21980 21981 7ff63089049b GdiplusShutdown 21979->21981 21980->21978 21981->21980 21985 7ff6308905af DeleteObject 21982->21985 21986 7ff6308905d3 GlobalUnlock 21982->21986 21984 7ff6308a3d58 _invalid_parameter_noinfo_noreturn 47 API calls 21983->21984 21987 7ff63089069d 21984->21987 21985->21986 21986->21988 21988->21956 21988->21957 21990 7ff6308902f8 GlobalUnlock CreateStreamOnHGlobal 21989->21990 21990->21944 21990->21945 21992 7ff63088626b EnterCriticalSection LeaveCriticalSection 21991->21992 21993 7ff630886200 21991->21993 22002 7ff63088c9b0 21992->22002 22071 7ff63089dbac AcquireSRWLockExclusive SleepConditionVariableSRW ReleaseSRWLockExclusive 21993->22071 22003 7ff6308861e0 58 API calls 22002->22003 22004 7ff63088c9bb 22003->22004 22005 7ff63088c9c4 22004->22005 22006 7ff63088c9cc EnterCriticalSection 22004->22006 22005->21950 22007 7ff63088ca23 LeaveCriticalSection 22006->22007 22008 7ff63088c9e9 GdiplusStartup 22006->22008 22007->21950 22008->22007 22010 7ff63088c385 GdipGetImageHeight 22009->22010 22012 7ff63088c40f GdipGetImageWidth 22010->22012 22013 7ff63088c402 22010->22013 22014 7ff63088c424 22012->22014 22013->22012 22072 7ff63088c160 22014->22072 22016 7ff63088c445 22017 7ff63088c461 GdipGetImagePaletteSize 22016->22017 22018 7ff63088c5fc 22016->22018 22024 7ff63088c449 __vcrt_freefls 22016->22024 22028 7ff63088c47a std::_Locinfo::_Locinfo_ctor 22017->22028 22019 7ff63088c6e2 GdipCreateBitmapFromScan0 GdipGetImageGraphicsContext GdipDrawImageI GdipDeleteGraphics GdipDisposeImage 22018->22019 22020 7ff63088c622 GdipBitmapLockBits 22018->22020 22019->22024 22023 7ff63088c66a BuildCatchObjectHelperInternal 22020->22023 22020->22024 22021 7ff63088c6c4 GdipBitmapUnlockBits 22021->22024 22022 7ff63088c78d memcpy_s 22079 7ff6308a8afc 11 API calls _get_daylight 22022->22079 22023->22021 22023->22022 22024->21955 22026 7ff63088c4e7 GdipGetImagePalette 22033 7ff63088c4fb 22026->22033 22027 7ff63088c799 22080 7ff6308a3d38 47 API calls _invalid_parameter_noinfo 22027->22080 22028->22024 22028->22026 22030 7ff63088c7a4 22081 7ff6308810f0 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 22030->22081 22033->22024 22033->22033 22034 7ff63088c5aa SetDIBColorTable 22033->22034 22077 7ff630886280 56 API calls 22033->22077 22034->22018 22035 7ff63088c5c4 SelectObject 22034->22035 22078 7ff630886280 56 API calls 22035->22078 22038 7ff63088c564 22040 7ff63088c58e SelectObject 22038->22040 22041 7ff63088c586 CreateCompatibleDC 22038->22041 22039 7ff63088c5db 22039->22018 22042 7ff63088c5f3 DeleteDC 22039->22042 22040->22034 22041->22040 22042->22018 22044 7ff63088c9b0 61 API calls 22043->22044 22045 7ff63088c7d4 22044->22045 22046 7ff63088c992 22045->22046 22047 7ff63088c7dc GdipGetImageEncodersSize 22045->22047 22046->21967 22047->22046 22049 7ff63088c7f2 std::_Locinfo::_Locinfo_ctor 22047->22049 22048 7ff63088c86b GdipGetImageEncoders 22050 7ff63088c861 __vcrt_freefls 22048->22050 22051 7ff63088c87f 22048->22051 22049->22048 22049->22050 22050->21967 22051->22050 22052 7ff63088c8f1 GdipCreateBitmapFromScan0 22051->22052 22053 7ff63088c923 GdipCreateBitmapFromHBITMAP 22051->22053 22054 7ff63088c933 GdipSaveImageToStream 22052->22054 22053->22054 22055 7ff63088c95e GdipDisposeImage 22054->22055 22056 7ff63088c951 GdipDisposeImage 22054->22056 22055->22050 22056->22050 22058 7ff630889f77 22057->22058 22061 7ff630889ea1 22057->22061 22083 7ff6308861c0 49 API calls 22058->22083 22063 7ff630889ed3 22061->22063 22064 7ff630889f2c 22061->22064 22068 7ff630889ea7 BuildCatchObjectHelperInternal 22061->22068 22062 7ff63089de98 std::_Facet_Register 49 API calls 22066 7ff630889ee9 22062->22066 22063->22062 22067 7ff630889f71 22063->22067 22065 7ff63089de98 std::_Facet_Register 49 API calls 22064->22065 22065->22068 22066->22068 22070 7ff6308a3d58 _invalid_parameter_noinfo_noreturn 47 API calls 22066->22070 22082 7ff6308819d0 49 API calls Concurrency::cancel_current_task 22067->22082 22068->21977 22070->22067 22074 7ff63088c19b memcpy_s 22072->22074 22073 7ff63088c249 __vcrt_freefls 22073->22016 22074->22073 22075 7ff63088c202 CreateDIBSection 22074->22075 22075->22073 22076 7ff63088c227 GetObjectW 22075->22076 22076->22073 22077->22038 22078->22039 22079->22027 22080->22030 22082->22058 22085 7ff6308880e4 memcpy_s 22084->22085 22087 7ff630888076 memcpy_s 22084->22087 22086 7ff63089c2e0 77 API calls 22085->22086 22090 7ff630888105 22086->22090 22121 7ff63089c2e0 22087->22121 22089 7ff6308880b8 BuildCatchObjectHelperInternal 22089->21851 22090->22089 22090->22090 22091 7ff6308881bb 22090->22091 22092 7ff6308882b7 22090->22092 22120 7ff63088818f 22090->22120 22135 7ff630889c80 49 API calls 4 library calls 22091->22135 22137 7ff630889c80 49 API calls 4 library calls 22092->22137 22095 7ff6308a3d58 _invalid_parameter_noinfo_noreturn 47 API calls 22098 7ff630888675 22095->22098 22096 7ff6308881d6 22100 7ff630889e70 49 API calls 22096->22100 22097 7ff6308882d6 22101 7ff630889e70 49 API calls 22097->22101 22099 7ff6308a3d58 _invalid_parameter_noinfo_noreturn 47 API calls 22098->22099 22102 7ff63088867b 22099->22102 22105 7ff630888206 22100->22105 22106 7ff630888303 22101->22106 22103 7ff6308a3d58 _invalid_parameter_noinfo_noreturn 47 API calls 22102->22103 22104 7ff630888681 22103->22104 22108 7ff6308a3d58 _invalid_parameter_noinfo_noreturn 47 API calls 22104->22108 22136 7ff630889bc0 47 API calls _invalid_parameter_noinfo_noreturn 22105->22136 22138 7ff630889bc0 47 API calls _invalid_parameter_noinfo_noreturn 22106->22138 22110 7ff630888687 22108->22110 22111 7ff6308884f4 OutputDebugStringA 22112 7ff630888518 MultiByteToWideChar 22111->22112 22116 7ff630888591 memcpy_s BuildCatchObjectHelperInternal 22111->22116 22113 7ff63089ded4 22112->22113 22114 7ff63088855f MultiByteToWideChar 22113->22114 22114->22116 22115 7ff6308884dc 22115->22111 22140 7ff630889bc0 47 API calls _invalid_parameter_noinfo_noreturn 22116->22140 22117 7ff630888273 std::_Locinfo::_Locinfo_ctor BuildCatchObjectHelperInternal 22117->22098 22117->22102 22117->22111 22117->22115 22139 7ff63088a010 49 API calls 4 library calls 22117->22139 22120->22089 22120->22095 22120->22104 22122 7ff63089c300 wsprintfW CreateFileW 22121->22122 22123 7ff63089c509 22122->22123 22124 7ff63089c34d DeviceIoControl 22122->22124 22123->22089 22125 7ff63089c500 CloseHandle 22124->22125 22127 7ff63089c398 __vcrt_freefls 22124->22127 22125->22123 22126 7ff63089c3c2 DeviceIoControl 22126->22127 22130 7ff63089c4f3 __vcrt_freefls 22126->22130 22127->22125 22127->22126 22128 7ff63089c41c DeviceIoControl 22127->22128 22129 7ff63089c480 DeviceIoControl 22127->22129 22131 7ff63089c520 WideCharToMultiByte WideCharToMultiByte 22127->22131 22141 7ff63089c1b0 22127->22141 22128->22125 22128->22127 22129->22127 22129->22130 22130->22125 22131->22127 22134 7ff63089c4ef 22134->22123 22135->22096 22136->22117 22137->22097 22138->22117 22139->22117 22140->22120 22142 7ff63089c1d1 22141->22142 22143 7ff63089c2c9 CloseHandle 22142->22143 22144 7ff63089c22f CreateFileA 22142->22144 22143->22122 22143->22134 22144->22143 22145 7ff63089c268 __vcrt_freefls 22144->22145 22146 7ff63089c270 DeviceIoControl 22145->22146 22146->22143 22147 7ff63089c2ab 22146->22147 22150 7ff63089bdd0 22147->22150 22151 7ff63089c190 CloseHandle 22150->22151 22169 7ff63089bdfd memcpy_s 22150->22169 22152 7ff63089c166 __vcrt_freefls 22152->22151 22153 7ff63089be40 DeviceIoControl 22153->22152 22153->22169 22154 7ff63089be8c DeviceIoControl 22154->22169 22155 7ff63089bf8e DeviceIoControl 22155->22169 22156 7ff63089bf08 GlobalAlloc 22157 7ff63089bf20 DeviceIoControl 22156->22157 22156->22169 22159 7ff63089bf7b GlobalFree 22157->22159 22157->22169 22158 7ff63089bfee GlobalAlloc 22161 7ff63089c003 DeviceIoControl 22158->22161 22158->22169 22159->22169 22160 7ff63089c5c0 WideCharToMultiByte WideCharToMultiByte GetSystemDefaultLangID DeviceIoControl lstrcpyA 22160->22169 22162 7ff63089c041 22161->22162 22163 7ff63089c06c GlobalFree 22161->22163 22170 7ff63089c520 WideCharToMultiByte 22162->22170 22163->22169 22165 7ff63089c04a GlobalFree 22167 7ff63089c05b 22165->22167 22165->22169 22168 7ff63089c1b0 58 API calls 22167->22168 22167->22169 22168->22167 22169->22152 22169->22153 22169->22154 22169->22155 22169->22156 22169->22158 22169->22159 22169->22160 22169->22169 22174 7ff63089bd70 51 API calls 22169->22174 22171 7ff63089c561 22170->22171 22172 7ff63089c59a __vcrt_freefls 22170->22172 22171->22172 22173 7ff63089c570 WideCharToMultiByte 22171->22173 22172->22165 22173->22172 22174->22169 22280 7ff6308b070c 57 API calls _isindst 22197 7ff6308bce0c RtlUnwindEx __GSHandlerCheck_SEH __GSHandlerCheckCommon 22198 7ff630885410 36 API calls 22282 7ff630891300 8 API calls 21059 7ff63089b500 21113 7ff6308a9c1c 21059->21113 21062 7ff63089b573 21064 7ff63089b64f GetLocalTime wsprintfW SetUnhandledExceptionFilter 21062->21064 21065 7ff63089b580 GetCurrentProcess OpenProcessToken 21062->21065 21063 7ff63089b543 21066 7ff63089de98 std::_Facet_Register 49 API calls 21063->21066 21121 7ff6308a8940 21064->21121 21067 7ff63089b59f LookupPrivilegeValueW AdjustTokenPrivileges CloseHandle 21065->21067 21068 7ff63089b5f4 GetModuleHandleA GetProcAddress 21065->21068 21070 7ff63089b54d 21066->21070 21067->21068 21068->21064 21072 7ff63089b619 GetCurrentProcessId OpenProcess 21068->21072 21071 7ff6308a8940 52 API calls 21070->21071 21074 7ff63089b56a CloseHandle 21071->21074 21072->21064 21074->21062 21078 7ff63089b6ec 21146 7ff63089ad80 RegOpenKeyExW 21078->21146 21081 7ff63089b789 21085 7ff63089b792 RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 21081->21085 21096 7ff63089b80d 21081->21096 21082 7ff63089b75b CheckTokenMembership 21083 7ff63089b775 21082->21083 21084 7ff63089b77c FreeSid 21082->21084 21083->21084 21084->21081 21085->21096 21086 7ff6308a87a0 47 API calls std::_Locinfo::_Locinfo_ctor 21086->21096 21087 7ff6308a9c1c ProcessCodePage 47 API calls 21088 7ff63089b91d SleepEx 21087->21088 21089 7ff6308a9c1c ProcessCodePage 47 API calls 21088->21089 21089->21096 21090 7ff6308a9c1c ProcessCodePage 47 API calls 21090->21096 21091 7ff63089b992 CreateEventA 21192 7ff6308a87a0 21091->21192 21094 7ff63089ba3c Sleep 21098 7ff63089ba30 21094->21098 21095 7ff63089ba72 Sleep 21095->21096 21096->21086 21096->21087 21096->21090 21096->21091 21097 7ff63089bad5 CloseHandle 21096->21097 21096->21098 21099 7ff63089bae9 21096->21099 21179 7ff630883820 ResetEvent timeGetTime socket 21096->21179 21201 7ff6308862f0 21096->21201 21097->21096 21098->21094 21098->21095 21098->21097 21326 7ff6308a3d58 21099->21326 21114 7ff6308a9c4c 21113->21114 21331 7ff6308a9480 21114->21331 21117 7ff6308a9ca0 21120 7ff63089b52b SleepEx 21117->21120 21351 7ff6308a394c 47 API calls 2 library calls 21117->21351 21120->21062 21120->21063 21122 7ff6308a8960 21121->21122 21123 7ff6308a8977 21121->21123 21367 7ff6308a8afc 11 API calls _get_daylight 21122->21367 21360 7ff6308a88dc 21123->21360 21126 7ff6308a8965 21368 7ff6308a3d38 47 API calls _invalid_parameter_noinfo 21126->21368 21129 7ff6308a898a CreateThread 21130 7ff63089b6ca CloseHandle 21129->21130 21131 7ff6308a89ba GetLastError 21129->21131 21139 7ff63089de98 21130->21139 21369 7ff6308a8a70 11 API calls 2 library calls 21131->21369 21133 7ff6308a89c7 21134 7ff6308a89d0 CloseHandle 21133->21134 21135 7ff6308a89d6 21133->21135 21134->21135 21136 7ff6308a89df FreeLibrary 21135->21136 21137 7ff6308a89e5 21135->21137 21136->21137 21370 7ff6308ae6bc 21137->21370 21142 7ff63089dea3 21139->21142 21140 7ff63089b6dd 21145 7ff6308836e0 WSAStartup CreateEventW 21140->21145 21142->21139 21142->21140 21388 7ff6308aca30 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 21142->21388 21389 7ff63089cb90 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 21142->21389 21390 7ff6308819d0 49 API calls Concurrency::cancel_current_task 21142->21390 21145->21078 21147 7ff63089adbf RegQueryValueExW 21146->21147 21148 7ff63089adec memcpy_s 21146->21148 21147->21148 21149 7ff63089ae22 RegQueryValueExW lstrlenW 21148->21149 21177 7ff63089b471 AllocateAndInitializeSid 21148->21177 21391 7ff6308bd7b0 21149->21391 21151 7ff63089ae70 lstrlenW lstrlenW 21152 7ff63089af18 lstrlenW 21151->21152 21159 7ff63089ae99 BuildCatchObjectHelperInternal 21151->21159 21153 7ff6308bd7b0 memcpy_s 21152->21153 21154 7ff63089af3d lstrlenW lstrlenW 21153->21154 21155 7ff63089afe8 lstrlenW lstrlenW 21154->21155 21164 7ff63089af6a BuildCatchObjectHelperInternal 21154->21164 21156 7ff63089b07a lstrlenW 21155->21156 21162 7ff63089b011 21155->21162 21157 7ff6308bd7b0 memcpy_s 21156->21157 21158 7ff63089b09f lstrlenW lstrlenW 21157->21158 21160 7ff63089b148 lstrlenW 21158->21160 21169 7ff63089b0cc BuildCatchObjectHelperInternal 21158->21169 21159->21152 21161 7ff6308bd7b0 memcpy_s 21160->21161 21163 7ff63089b16d lstrlenW lstrlenW 21161->21163 21162->21156 21165 7ff63089b218 lstrlenW lstrlenW 21163->21165 21174 7ff63089b19a BuildCatchObjectHelperInternal 21163->21174 21164->21155 21166 7ff63089b2aa lstrlenW 21165->21166 21172 7ff63089b241 21165->21172 21167 7ff6308bd7b0 memcpy_s 21166->21167 21168 7ff63089b2cf lstrlenW lstrlenW 21167->21168 21170 7ff63089b378 lstrlenW 21168->21170 21176 7ff63089b2fc BuildCatchObjectHelperInternal 21168->21176 21169->21160 21171 7ff6308bd7b0 memcpy_s 21170->21171 21173 7ff63089b39d lstrlenW lstrlenW 21171->21173 21172->21166 21175 7ff63089b448 lstrlenW lstrlenW 21173->21175 21178 7ff63089b3ca BuildCatchObjectHelperInternal 21173->21178 21174->21165 21175->21177 21176->21170 21177->21081 21177->21082 21178->21175 21180 7ff630883ad9 21179->21180 21181 7ff630883893 lstrlenW WideCharToMultiByte 21179->21181 21180->21096 21182 7ff63089ded4 21181->21182 21183 7ff6308838d4 lstrlenW WideCharToMultiByte gethostbyname 21182->21183 21184 7ff63088391d 21183->21184 21184->21180 21185 7ff63088392e htons connect 21184->21185 21185->21180 21186 7ff630883971 setsockopt setsockopt setsockopt setsockopt 21185->21186 21187 7ff630883a37 WSAIoctl 21186->21187 21188 7ff630883a86 21186->21188 21187->21188 21189 7ff6308a8940 52 API calls 21188->21189 21190 7ff630883ab0 21189->21190 21191 7ff6308a8940 52 API calls 21190->21191 21191->21180 21193 7ff6308a87ad 21192->21193 21194 7ff6308a87b7 21192->21194 21193->21194 21198 7ff6308a87d3 21193->21198 21393 7ff6308a8afc 11 API calls _get_daylight 21194->21393 21196 7ff6308a87cb 21196->21096 21198->21196 21395 7ff6308a8afc 11 API calls _get_daylight 21198->21395 21200 7ff6308a87bf 21394 7ff6308a3d38 47 API calls _invalid_parameter_noinfo 21200->21394 21202 7ff63088631d std::_Locinfo::_Locinfo_ctor 21201->21202 21203 7ff63089de98 std::_Facet_Register 49 API calls 21202->21203 21204 7ff63088632a memcpy_s 21203->21204 21205 7ff63088635e memcpy_s 21204->21205 21206 7ff6308a87a0 std::_Locinfo::_Locinfo_ctor 47 API calls 21204->21206 21207 7ff630886376 gethostname gethostbyname 21205->21207 21206->21205 21208 7ff6308863b2 inet_ntoa 21207->21208 21209 7ff63088644f 8 API calls 21207->21209 21535 7ff6308a8f58 47 API calls 2 library calls 21208->21535 21210 7ff63088665c GetSystemInfo wsprintfW 21209->21210 21211 7ff63088653e GetProcAddress 21209->21211 21215 7ff6308866a0 GetDriveTypeW 21210->21215 21213 7ff630886557 21211->21213 21214 7ff630886653 FreeLibrary 21211->21214 21396 7ff630883670 21213->21396 21214->21210 21217 7ff6308866f8 21215->21217 21218 7ff6308866c1 GetDiskFreeSpaceExW 21215->21218 21216 7ff6308863d5 21536 7ff6308a8f58 47 API calls 2 library calls 21216->21536 21217->21215 21220 7ff6308866ff GlobalMemoryStatusEx 21217->21220 21218->21217 21222 7ff630883670 50 API calls 21220->21222 21224 7ff630886762 21222->21224 21223 7ff6308865a0 21400 7ff6308891a0 GetModuleHandleW GetProcAddress 21223->21400 21226 7ff630883670 50 API calls 21224->21226 21225 7ff630886400 inet_ntoa 21537 7ff6308a8f58 47 API calls 2 library calls 21225->21537 21228 7ff630886786 21226->21228 21404 7ff630888e00 CreateDXGIFactory 21228->21404 21229 7ff6308863ed 21229->21209 21229->21225 21538 7ff6308a8f58 47 API calls 2 library calls 21229->21538 21234 7ff630886799 GetForegroundWindow 21236 7ff6308867ba lstrlenW 21234->21236 21237 7ff6308867a4 GetWindowTextW 21234->21237 21416 7ff630888cd0 21236->21416 21237->21236 21239 7ff630886622 21240 7ff630886640 RegCloseKey 21239->21240 21243 7ff6308a9248 std::_Locinfo::_Locinfo_ctor 47 API calls 21239->21243 21242 7ff63089de64 21240->21242 21241 7ff6308867fa 21244 7ff630886823 21241->21244 21245 7ff6308867ff GetLocalTime wsprintfW 21241->21245 21242->21214 21243->21240 21246 7ff6308a87a0 std::_Locinfo::_Locinfo_ctor 47 API calls 21244->21246 21245->21244 21247 7ff63088683b lstrlenW 21246->21247 21248 7ff630888cd0 6 API calls 21247->21248 21249 7ff63088685f 21248->21249 21250 7ff630886878 GetModuleHandleW GetProcAddress 21249->21250 21251 7ff6308a87a0 std::_Locinfo::_Locinfo_ctor 47 API calls 21249->21251 21252 7ff6308868ad GetNativeSystemInfo 21250->21252 21253 7ff6308868b1 GetSystemInfo 21250->21253 21251->21250 21254 7ff6308868b7 wsprintfW 21252->21254 21253->21254 21425 7ff630888ad0 21254->21425 21257 7ff630886906 GetCurrentProcessId 21258 7ff63088691c OpenProcess 21257->21258 21259 7ff630886a5e CoInitializeEx CoCreateInstance 21257->21259 21261 7ff63088693d K32GetProcessImageFileNameW 21258->21261 21262 7ff630886a57 21258->21262 21260 7ff630886b8f 21259->21260 21289 7ff630886a95 21259->21289 21266 7ff6308a87a0 std::_Locinfo::_Locinfo_ctor 47 API calls 21260->21266 21263 7ff63088695b GetLogicalDriveStringsW 21261->21263 21264 7ff630886a4e CloseHandle 21261->21264 21262->21259 21265 7ff630886a3e lstrcpyW 21263->21265 21282 7ff630886975 21263->21282 21264->21262 21265->21264 21267 7ff630886bab memcpy_s 21266->21267 21269 7ff630886bc6 RegOpenKeyExW 21267->21269 21268 7ff630886990 lstrcmpiW 21270 7ff6308869b2 lstrcmpiW 21268->21270 21268->21282 21271 7ff630886bf5 RegQueryInfoKeyW 21269->21271 21272 7ff630886d52 lstrlenW 21269->21272 21273 7ff6308869c6 QueryDosDeviceW 21270->21273 21270->21282 21274 7ff630886d82 21271->21274 21296 7ff630886c55 memcpy_s 21271->21296 21272->21274 21275 7ff630886d64 21272->21275 21273->21264 21276 7ff630886a00 lstrlenW 21273->21276 21454 7ff6308879e0 21274->21454 21445 7ff6308a9248 21275->21445 21539 7ff6308a90ac 53 API calls 3 library calls 21276->21539 21279 7ff630886b7e CoUninitialize 21279->21260 21282->21265 21282->21268 21284 7ff630886e8d lstrcpyW lstrcatW 21282->21284 21283 7ff6308a9248 std::_Locinfo::_Locinfo_ctor 47 API calls 21285 7ff630886da1 GetTickCount 21283->21285 21284->21264 21472 7ff6308a8b9c GetSystemTimeAsFileTime 21285->21472 21286 7ff630886d47 RegCloseKey 21286->21272 21289->21260 21289->21279 21291 7ff630886b36 SysFreeString 21289->21291 21291->21289 21292 7ff630886cb4 RegEnumKeyExW lstrlenW 21294 7ff630886cf7 lstrlenW 21292->21294 21292->21296 21294->21296 21295 7ff630886e7f 21479 7ff630887250 21295->21479 21296->21272 21296->21286 21296->21292 21299 7ff6308a8b24 47 API calls std::_Locinfo::_Locinfo_ctor 21296->21299 21298 7ff630886ed1 lstrlenW 21300 7ff630888cd0 6 API calls 21298->21300 21299->21296 21301 7ff630886f0a 21300->21301 21302 7ff630886fe7 CreateToolhelp32Snapshot 21301->21302 21303 7ff630886f13 6 API calls 21301->21303 21306 7ff630887088 CreateToolhelp32Snapshot 21302->21306 21307 7ff630887001 memcpy_s 21302->21307 21304 7ff630886fda RegCloseKey 21303->21304 21305 7ff630886f98 lstrlenW RegSetValueExW 21303->21305 21304->21302 21305->21304 21309 7ff630886fcd RegCloseKey 21305->21309 21310 7ff6308870ab memcpy_s 21306->21310 21311 7ff630887138 CreateToolhelp32Snapshot 21306->21311 21312 7ff630887015 Process32FirstW 21307->21312 21309->21304 21316 7ff6308870bf Process32FirstW 21310->21316 21314 7ff63088715b memcpy_s 21311->21314 21315 7ff6308871e4 21311->21315 21312->21306 21318 7ff630887033 21312->21318 21320 7ff63088716f Process32FirstW 21314->21320 21519 7ff630883e30 GetCurrentThreadId 21315->21519 21316->21311 21321 7ff6308870dd 21316->21321 21317 7ff63088721c 21317->21096 21318->21306 21319 7ff630887074 Process32NextW 21318->21319 21319->21306 21319->21318 21320->21315 21323 7ff63088718d 21320->21323 21321->21311 21322 7ff630887124 Process32NextW 21321->21322 21322->21311 21322->21321 21323->21315 21324 7ff6308871d0 Process32NextW 21323->21324 21324->21315 21324->21323 21768 7ff6308a3bd0 47 API calls 2 library calls 21326->21768 21328 7ff6308a3d71 21329 7ff6308a3d88 _invalid_parameter_noinfo_noreturn 17 API calls 21328->21329 21330 7ff6308a3d86 21329->21330 21332 7ff6308a94b8 21331->21332 21333 7ff6308a94ca 21331->21333 21352 7ff6308a8afc 11 API calls _get_daylight 21332->21352 21335 7ff6308a9514 21333->21335 21337 7ff6308a94d8 21333->21337 21341 7ff6308a952f ProcessCodePage 21335->21341 21355 7ff6308a8160 47 API calls ProcessCodePage 21335->21355 21336 7ff6308a94bd 21353 7ff6308a3d38 47 API calls _invalid_parameter_noinfo 21336->21353 21354 7ff6308a3c6c 47 API calls 2 library calls 21337->21354 21342 7ff6308a98b5 21341->21342 21356 7ff6308a8afc 11 API calls _get_daylight 21341->21356 21348 7ff6308a94c8 21342->21348 21358 7ff6308a8afc 11 API calls _get_daylight 21342->21358 21345 7ff6308a98aa 21357 7ff6308a3d38 47 API calls _invalid_parameter_noinfo 21345->21357 21346 7ff6308a9b46 21359 7ff6308a3d38 47 API calls _invalid_parameter_noinfo 21346->21359 21348->21117 21350 7ff6308a394c 47 API calls 2 library calls 21348->21350 21350->21117 21351->21120 21352->21336 21353->21348 21354->21348 21355->21341 21356->21345 21357->21342 21358->21346 21359->21348 21376 7ff6308b0788 21360->21376 21363 7ff6308ae6bc __free_lconv_num 11 API calls 21364 7ff6308a8908 21363->21364 21365 7ff6308a8911 GetModuleHandleExW 21364->21365 21366 7ff6308a890d 21364->21366 21365->21366 21366->21129 21366->21130 21367->21126 21368->21130 21369->21133 21371 7ff6308ae6c1 RtlFreeHeap 21370->21371 21372 7ff6308ae6f0 21370->21372 21371->21372 21373 7ff6308ae6dc GetLastError 21371->21373 21372->21130 21374 7ff6308ae6e9 __free_lconv_num 21373->21374 21387 7ff6308a8afc 11 API calls _get_daylight 21374->21387 21377 7ff6308b0799 21376->21377 21384 7ff6308b07a7 _get_daylight 21376->21384 21378 7ff6308b07ea 21377->21378 21377->21384 21386 7ff6308a8afc 11 API calls _get_daylight 21378->21386 21379 7ff6308b07ce HeapAlloc 21380 7ff6308b07e8 21379->21380 21379->21384 21382 7ff6308a88fe 21380->21382 21382->21363 21384->21378 21384->21379 21385 7ff6308aca30 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 21384->21385 21385->21384 21386->21382 21387->21372 21388->21142 21390->21142 21392 7ff6308bd7a0 21391->21392 21392->21151 21392->21392 21393->21200 21394->21196 21395->21200 21397 7ff630883695 21396->21397 21540 7ff6308a868c 21397->21540 21401 7ff6308891e1 GetSystemInfo 21400->21401 21402 7ff6308891dd GetNativeSystemInfo 21400->21402 21403 7ff6308865c2 RegOpenKeyExW RegQueryValueExW 21401->21403 21402->21403 21403->21239 21403->21240 21406 7ff630889143 21404->21406 21410 7ff630888e5a 21404->21410 21405 7ff630889175 21405->21234 21406->21405 21407 7ff6308a3d58 _invalid_parameter_noinfo_noreturn 47 API calls 21406->21407 21409 7ff630889196 21407->21409 21411 7ff6308a3d58 _invalid_parameter_noinfo_noreturn 47 API calls 21409->21411 21415 7ff630888ed5 21410->21415 21554 7ff63088a4c0 49 API calls BuildCatchObjectHelperInternal 21410->21554 21412 7ff63088919c 21411->21412 21414 7ff630883670 50 API calls 21414->21415 21415->21406 21415->21409 21415->21414 21555 7ff63088a4c0 49 API calls BuildCatchObjectHelperInternal 21415->21555 21417 7ff6308bd7b0 memcpy_s 21416->21417 21418 7ff630888d11 RegOpenKeyExW 21417->21418 21419 7ff630888d46 21418->21419 21420 7ff630888d3c 21418->21420 21421 7ff630888dc8 RegCloseKey RegCloseKey 21419->21421 21422 7ff630888d54 RegQueryValueExW 21419->21422 21420->21421 21421->21241 21422->21421 21423 7ff630888d93 lstrcmpW 21422->21423 21423->21420 21424 7ff630888db0 lstrcpyW 21423->21424 21424->21421 21426 7ff63089ded4 21425->21426 21427 7ff630888ae8 GetCurrentProcessId wsprintfW 21426->21427 21556 7ff630888900 GetCurrentProcessId OpenProcess 21427->21556 21429 7ff630888b10 memcpy_s 21430 7ff630888b24 GetVersionExW 21429->21430 21431 7ff630888b3f 21430->21431 21432 7ff630888c92 21430->21432 21431->21432 21435 7ff630888b55 GetCurrentProcess OpenProcessToken 21431->21435 21433 7ff630888c99 wsprintfW 21432->21433 21434 7ff630888ca9 21433->21434 21434->21257 21435->21432 21436 7ff630888b81 GetTokenInformation 21435->21436 21437 7ff630888bb6 GetLastError 21436->21437 21438 7ff630888c3c CloseHandle 21436->21438 21437->21438 21439 7ff630888bc1 LocalAlloc 21437->21439 21438->21432 21444 7ff630888c4e 21438->21444 21440 7ff630888be3 GetTokenInformation 21439->21440 21441 7ff630888c34 21439->21441 21442 7ff630888c12 GetSidSubAuthorityCount GetSidSubAuthority 21440->21442 21443 7ff630888c2b LocalFree 21440->21443 21441->21438 21442->21443 21443->21441 21444->21433 21444->21434 21449 7ff6308a9265 21445->21449 21446 7ff6308a926a 21447 7ff6308a9280 21446->21447 21606 7ff6308a8afc 11 API calls _get_daylight 21446->21606 21447->21274 21449->21446 21449->21447 21452 7ff6308a92b6 21449->21452 21450 7ff6308a9274 21607 7ff6308a3d38 47 API calls _invalid_parameter_noinfo 21450->21607 21452->21447 21608 7ff6308a8afc 11 API calls _get_daylight 21452->21608 21455 7ff630887a13 memcpy_s 21454->21455 21456 7ff630887afc CoCreateInstance 21455->21456 21460 7ff630887a64 CreateToolhelp32Snapshot 21455->21460 21464 7ff630887d65 CloseHandle 21455->21464 21465 7ff630887abf Process32NextW 21455->21465 21457 7ff630887d21 lstrlenW 21456->21457 21468 7ff630887b2d memcpy_s 21456->21468 21458 7ff630886d87 21457->21458 21459 7ff630887d2e lstrcatW 21457->21459 21458->21283 21459->21458 21460->21455 21462 7ff630887a7a Process32FirstW 21460->21462 21461 7ff630887d0f 21461->21457 21462->21455 21463 7ff630887acd CloseHandle 21462->21463 21463->21455 21464->21455 21466 7ff630887d75 lstrcatW lstrcatW 21464->21466 21465->21455 21465->21463 21466->21455 21467 7ff630887bb5 wsprintfW RegOpenKeyExW 21467->21468 21468->21461 21468->21467 21469 7ff630887c77 RegQueryValueExW 21468->21469 21470 7ff630887ce0 RegCloseKey 21469->21470 21471 7ff630887cc0 lstrcatW lstrcatW 21469->21471 21470->21468 21471->21470 21473 7ff630886db2 21472->21473 21474 7ff6308a8f10 21473->21474 21609 7ff6308b177c 21474->21609 21477 7ff630886dd2 wsprintfW GetLocaleInfoW GetSystemDirectoryW GetCurrentHwProfileW 21477->21295 21480 7ff6308872b0 21479->21480 21480->21480 21482 7ff6308872c6 BuildCatchObjectHelperInternal 21480->21482 21725 7ff63088a300 49 API calls 4 library calls 21480->21725 21484 7ff630887312 BuildCatchObjectHelperInternal 21482->21484 21726 7ff63088a300 49 API calls 4 library calls 21482->21726 21486 7ff630887381 BuildCatchObjectHelperInternal 21484->21486 21727 7ff63088a300 49 API calls 4 library calls 21484->21727 21488 7ff6308873f4 BuildCatchObjectHelperInternal 21486->21488 21728 7ff63088a300 49 API calls 4 library calls 21486->21728 21490 7ff63088744f BuildCatchObjectHelperInternal 21488->21490 21729 7ff63088a300 49 API calls 4 library calls 21488->21729 21492 7ff6308874d0 BuildCatchObjectHelperInternal 21490->21492 21730 7ff63088a300 49 API calls 4 library calls 21490->21730 21494 7ff630887540 BuildCatchObjectHelperInternal 21492->21494 21731 7ff63088a300 49 API calls 4 library calls 21492->21731 21719 7ff630899b00 21494->21719 21497 7ff6308876ad 21497->21298 21498 7ff630887636 21498->21497 21499 7ff6308876d8 21498->21499 21501 7ff6308a3d58 _invalid_parameter_noinfo_noreturn 47 API calls 21498->21501 21500 7ff6308a3d58 _invalid_parameter_noinfo_noreturn 47 API calls 21499->21500 21502 7ff6308876de CreateMutexExW GetLastError 21500->21502 21501->21499 21503 7ff630887749 21502->21503 21504 7ff630887719 21502->21504 21506 7ff6308877f0 9 API calls 21503->21506 21509 7ff630887760 lstrlenW 21503->21509 21505 7ff630887720 Sleep CreateMutexW GetLastError 21504->21505 21505->21503 21505->21505 21507 7ff6308878ad ReleaseMutex DirectInput8Create 21506->21507 21508 7ff6308878a4 DeleteFileW 21506->21508 21510 7ff630887980 21507->21510 21515 7ff6308878e3 21507->21515 21508->21507 21511 7ff630888cd0 6 API calls 21509->21511 21510->21298 21512 7ff6308877be 21511->21512 21513 7ff6308877d8 SleepEx 21512->21513 21514 7ff6308877c2 lstrcmpW 21512->21514 21513->21506 21513->21509 21514->21506 21514->21513 21515->21510 21516 7ff63088799f GetTickCount GetKeyState 21515->21516 21732 7ff63088adb0 37 API calls 3 library calls 21516->21732 21520 7ff630883e5c 21519->21520 21749 7ff630881670 21520->21749 21522 7ff630883e9b 21523 7ff630881670 2 API calls 21522->21523 21524 7ff630883ec4 21523->21524 21756 7ff630881500 21524->21756 21526 7ff630883efa 21527 7ff630883f1a 21526->21527 21532 7ff630883f06 21526->21532 21528 7ff630883fa1 21527->21528 21529 7ff630883f30 send 21527->21529 21527->21532 21762 7ff630881730 21528->21762 21529->21527 21530 7ff630883f80 send 21530->21528 21530->21532 21532->21528 21532->21530 21533 7ff630883fba GetCurrentThreadId 21534 7ff630883fca 21533->21534 21534->21317 21535->21216 21536->21229 21537->21229 21538->21229 21539->21282 21542 7ff6308a86c5 21540->21542 21541 7ff6308a8708 21545 7ff6308a8747 21541->21545 21551 7ff6308a3c6c 47 API calls 2 library calls 21541->21551 21542->21541 21550 7ff6308a3fe0 50 API calls 3 library calls 21542->21550 21546 7ff6308a876d 21545->21546 21552 7ff6308a394c 47 API calls 2 library calls 21545->21552 21548 7ff6308836b4 21546->21548 21553 7ff6308a394c 47 API calls 2 library calls 21546->21553 21548->21223 21550->21541 21551->21545 21552->21546 21553->21548 21554->21410 21555->21415 21557 7ff63088893a OpenProcessToken 21556->21557 21565 7ff630888967 21556->21565 21558 7ff63088895e CloseHandle 21557->21558 21559 7ff630888971 21557->21559 21558->21565 21587 7ff630888690 21559->21587 21561 7ff6308889bb BuildCatchObjectHelperInternal 21562 7ff6308889e8 CloseHandle CloseHandle 21561->21562 21563 7ff630888a14 21562->21563 21564 7ff630888aba 21563->21564 21563->21565 21567 7ff6308a3d58 _invalid_parameter_noinfo_noreturn 47 API calls 21563->21567 21566 7ff6308a3d58 _invalid_parameter_noinfo_noreturn 47 API calls 21564->21566 21565->21429 21568 7ff630888ac0 21566->21568 21567->21564 21569 7ff630888ae8 GetCurrentProcessId wsprintfW 21568->21569 21570 7ff630888900 58 API calls 21569->21570 21571 7ff630888b10 memcpy_s 21570->21571 21572 7ff630888b24 GetVersionExW 21571->21572 21573 7ff630888b3f 21572->21573 21574 7ff630888c92 21572->21574 21573->21574 21577 7ff630888b55 GetCurrentProcess OpenProcessToken 21573->21577 21575 7ff630888c99 wsprintfW 21574->21575 21576 7ff630888ca9 21575->21576 21576->21429 21577->21574 21578 7ff630888b81 GetTokenInformation 21577->21578 21579 7ff630888bb6 GetLastError 21578->21579 21580 7ff630888c3c CloseHandle 21578->21580 21579->21580 21581 7ff630888bc1 LocalAlloc 21579->21581 21580->21574 21586 7ff630888c4e 21580->21586 21582 7ff630888be3 GetTokenInformation 21581->21582 21583 7ff630888c34 21581->21583 21584 7ff630888c12 GetSidSubAuthorityCount GetSidSubAuthority 21582->21584 21585 7ff630888c2b LocalFree 21582->21585 21583->21580 21584->21585 21585->21583 21586->21575 21586->21576 21588 7ff6308886c1 21587->21588 21589 7ff6308886f3 GetTokenInformation 21588->21589 21590 7ff6308887e8 21588->21590 21591 7ff63088874e GetTokenInformation 21589->21591 21592 7ff630888715 GetLastError 21589->21592 21590->21561 21594 7ff63088877c LookupAccountSidW 21591->21594 21603 7ff6308887e3 BuildCatchObjectHelperInternal 21591->21603 21592->21590 21593 7ff630888724 GetProcessHeap HeapAlloc 21592->21593 21593->21590 21593->21591 21596 7ff6308887c0 GetLastError 21594->21596 21598 7ff6308887ef 21594->21598 21595 7ff6308888c4 GetProcessHeap HeapFree 21595->21590 21596->21590 21597 7ff6308887cd 21596->21597 21599 7ff6308a87a0 std::_Locinfo::_Locinfo_ctor 47 API calls 21597->21599 21601 7ff63088881a BuildCatchObjectHelperInternal 21598->21601 21604 7ff63088a1a0 49 API calls 4 library calls 21598->21604 21599->21603 21601->21603 21605 7ff63088a1a0 49 API calls 4 library calls 21601->21605 21603->21590 21603->21595 21604->21601 21605->21603 21606->21450 21607->21447 21608->21450 21649 7ff6308aebe8 GetLastError 21609->21649 21611 7ff6308b1787 21612 7ff6308b17ab 21611->21612 21613 7ff6308a8f27 21611->21613 21666 7ff6308aedd0 21611->21666 21612->21613 21673 7ff6308a8afc 11 API calls _get_daylight 21612->21673 21613->21477 21618 7ff6308a8c10 21613->21618 21617 7ff6308ae6bc __free_lconv_num 11 API calls 21617->21612 21619 7ff6308a8c41 21618->21619 21620 7ff6308a8c26 21618->21620 21619->21620 21622 7ff6308a8c5a 21619->21622 21694 7ff6308a8afc 11 API calls _get_daylight 21620->21694 21623 7ff6308a8c60 21622->21623 21626 7ff6308a8c7d 21622->21626 21696 7ff6308a8afc 11 API calls _get_daylight 21623->21696 21624 7ff6308a8c2b 21695 7ff6308a3d38 47 API calls _invalid_parameter_noinfo 21624->21695 21677 7ff6308b233c 21626->21677 21632 7ff6308a8ef7 21690 7ff6308a3d88 IsProcessorFeaturePresent 21632->21690 21635 7ff6308a8f0c 21637 7ff6308b177c 12 API calls 21635->21637 21639 7ff6308a8f27 21637->21639 21641 7ff6308a8f3c 21639->21641 21643 7ff6308a8c10 61 API calls 21639->21643 21641->21477 21642 7ff6308a8cc1 21644 7ff6308a8cda 21642->21644 21645 7ff6308a8d3a 21642->21645 21643->21641 21648 7ff6308a8c37 21644->21648 21709 7ff6308b2380 47 API calls _isindst 21644->21709 21645->21648 21710 7ff6308b2380 47 API calls _isindst 21645->21710 21648->21477 21650 7ff6308aec29 FlsSetValue 21649->21650 21655 7ff6308aec0c 21649->21655 21651 7ff6308aec3b 21650->21651 21656 7ff6308aec19 21650->21656 21652 7ff6308b0788 _get_daylight 5 API calls 21651->21652 21654 7ff6308aec4a 21652->21654 21653 7ff6308aec95 SetLastError 21653->21611 21657 7ff6308aec68 FlsSetValue 21654->21657 21658 7ff6308aec58 FlsSetValue 21654->21658 21655->21650 21655->21656 21656->21653 21660 7ff6308aec74 FlsSetValue 21657->21660 21661 7ff6308aec86 21657->21661 21659 7ff6308aec61 21658->21659 21662 7ff6308ae6bc __free_lconv_num 5 API calls 21659->21662 21660->21659 21674 7ff6308ae820 11 API calls _get_daylight 21661->21674 21662->21656 21664 7ff6308aec8e 21665 7ff6308ae6bc __free_lconv_num 5 API calls 21664->21665 21665->21653 21667 7ff6308aee1b 21666->21667 21671 7ff6308aeddf _get_daylight 21666->21671 21676 7ff6308a8afc 11 API calls _get_daylight 21667->21676 21668 7ff6308aee02 HeapAlloc 21670 7ff6308aee19 21668->21670 21668->21671 21670->21617 21671->21667 21671->21668 21675 7ff6308aca30 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 21671->21675 21673->21613 21674->21664 21675->21671 21676->21670 21678 7ff6308a8c82 21677->21678 21679 7ff6308b234b 21677->21679 21684 7ff6308b1464 21678->21684 21711 7ff6308aaba4 EnterCriticalSection 21679->21711 21681 7ff6308b2353 21682 7ff6308b2364 21681->21682 21683 7ff6308b21ac 61 API calls 21681->21683 21683->21682 21685 7ff6308a8c97 21684->21685 21686 7ff6308b146d 21684->21686 21685->21632 21697 7ff6308b1494 21685->21697 21712 7ff6308a8afc 11 API calls _get_daylight 21686->21712 21688 7ff6308b1472 21713 7ff6308a3d38 47 API calls _invalid_parameter_noinfo 21688->21713 21691 7ff6308a3d9b 21690->21691 21714 7ff6308a3a6c 14 API calls 2 library calls 21691->21714 21693 7ff6308a3db6 GetCurrentProcess TerminateProcess 21694->21624 21695->21648 21696->21648 21698 7ff6308a8ca8 21697->21698 21699 7ff6308b149d 21697->21699 21698->21632 21703 7ff6308b14c4 21698->21703 21715 7ff6308a8afc 11 API calls _get_daylight 21699->21715 21701 7ff6308b14a2 21716 7ff6308a3d38 47 API calls _invalid_parameter_noinfo 21701->21716 21704 7ff6308a8cb9 21703->21704 21705 7ff6308b14cd 21703->21705 21704->21632 21704->21642 21717 7ff6308a8afc 11 API calls _get_daylight 21705->21717 21707 7ff6308b14d2 21718 7ff6308a3d38 47 API calls _invalid_parameter_noinfo 21707->21718 21709->21648 21710->21648 21712->21688 21713->21685 21714->21693 21715->21701 21716->21698 21717->21707 21718->21704 21720 7ff630899b2d 21719->21720 21733 7ff630899d20 21720->21733 21722 7ff630899c2f 21723 7ff630899e70 49 API calls 21722->21723 21724 7ff6308875dd MultiByteToWideChar MultiByteToWideChar 21722->21724 21723->21722 21724->21498 21725->21482 21726->21484 21727->21486 21728->21488 21729->21490 21730->21492 21731->21494 21734 7ff630899d49 21733->21734 21745 7ff630899e65 21733->21745 21738 7ff630899da1 21734->21738 21739 7ff630899ddd 21734->21739 21744 7ff630899d94 BuildCatchObjectHelperInternal 21734->21744 21737 7ff63089de98 std::_Facet_Register 49 API calls 21737->21744 21738->21737 21740 7ff630899e5f 21738->21740 21741 7ff63089de98 std::_Facet_Register 49 API calls 21739->21741 21747 7ff6308819d0 49 API calls Concurrency::cancel_current_task 21740->21747 21741->21744 21742 7ff6308a3d58 _invalid_parameter_noinfo_noreturn 47 API calls 21742->21740 21744->21742 21746 7ff630899e27 BuildCatchObjectHelperInternal 21744->21746 21748 7ff6308861c0 49 API calls 21745->21748 21746->21722 21747->21745 21750 7ff630881686 21749->21750 21751 7ff63088167e 21749->21751 21752 7ff6308816ac VirtualAlloc 21750->21752 21751->21522 21753 7ff6308816d6 BuildCatchObjectHelperInternal 21752->21753 21754 7ff6308816f6 VirtualFree 21753->21754 21755 7ff630881704 21753->21755 21754->21755 21755->21522 21757 7ff63088152a 21756->21757 21758 7ff63088155b VirtualAlloc 21757->21758 21759 7ff6308815b5 BuildCatchObjectHelperInternal 21757->21759 21760 7ff630881587 BuildCatchObjectHelperInternal 21758->21760 21759->21526 21760->21759 21761 7ff6308815a7 VirtualFree 21760->21761 21761->21759 21763 7ff63088174b 21762->21763 21764 7ff6308817fb 21763->21764 21765 7ff63088177c VirtualAlloc 21763->21765 21764->21533 21766 7ff6308817a8 BuildCatchObjectHelperInternal 21765->21766 21767 7ff6308817be VirtualFree 21766->21767 21767->21533 21768->21328 22283 7ff6308a0100 10 API calls 2 library calls 22284 7ff63089e704 56 API calls 22285 7ff6308aa4f8 60 API calls 5 library calls 22200 7ff630885200 8 API calls BuildCatchObjectHelperInternal 22286 7ff630885300 115 API calls 22202 7ff6308bea30 WSACleanup 22287 7ff630891b30 50 API calls 22289 7ff63088b331 17 API calls 22290 7ff6308b5d34 56 API calls 3 library calls 22291 7ff630881130 HeapAlloc 22206 7ff63088e01f 71 API calls memcpy_s 22207 7ff630889220 GetModuleFileNameW GetCommandLineW GetStartupInfoW CreateProcessW ExitProcess 22208 7ff63088c020 GdipCloneImage GdipAlloc 22293 7ff63088ef25 RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 22209 7ff63088e217 TerminateThread CloseHandle 22295 7ff6308bea50 DeleteDC DeleteDC DeleteDC DeleteDC 22212 7ff6308b0748 12 API calls 22298 7ff63088e248 7 API calls 22213 7ff6308b714c 54 API calls 4 library calls 22299 7ff63088dc4d 56 API calls 4 library calls 22300 7ff6308b5040 60 API calls 4 library calls 22301 7ff63088de3f 55 API calls 4 library calls 22218 7ff63088cd40 88 API calls 3 library calls 22220 7ff630891340 HeapFree HeapDestroy HeapCreate HeapDestroy __vcrt_freefls 22221 7ff630889740 83 API calls 22223 7ff6308ba544 67 API calls 22224 7ff6308b1338 FreeLibrary 22226 7ff630881140 HeapFree 22303 7ff630885640 40 API calls 22304 7ff630881040 GetTickCount 22227 7ff63089e13c GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 22230 7ff6308b0368 17 API calls 2 library calls 22231 7ff6308abb69 63 API calls 22232 7ff63088e36a OpenEventLogW ClearEventLogW CloseEventLog 22307 7ff630881470 VirtualFree 22308 7ff630884470 164 API calls std::_Locinfo::_Locinfo_ctor 22233 7ff63088f160 52 API calls 5 library calls 22311 7ff6308bcc64 CloseHandle 22312 7ff630881058 GetLastError IsDebuggerPresent OutputDebugStringW shared_ptr 22235 7ff6308aab5c 7 API calls 22236 7ff630881160 HeapReAlloc 22237 7ff63088bd90 13 API calls 22317 7ff6308b0488 80 API calls __free_lconv_num 22319 7ff63088be80 12 API calls _Wcrtomb 22320 7ff63088c080 64 API calls 22321 7ff630881078 InitializeCriticalSectionEx shared_ptr 22323 7ff630881a80 LeaveCriticalSection 22243 7ff63089f77c 60 API calls __CxxCallCatchBlock 22324 7ff6308beab0 EnterCriticalSection GdiplusShutdown LeaveCriticalSection 22327 7ff63089d0b0 7 API calls __vcrt_freefls 22245 7ff63089c7b4 DeleteCriticalSection __vcrt_freefls 22246 7ff6308811b0 HeapDestroy 22247 7ff6308a25aa 57 API calls __CxxCallCatchBlock 22248 7ff6308b7ba0 57 API calls 4 library calls 22330 7ff630890ca0 15 API calls BuildCatchObjectHelperInternal 22251 7ff6308beba4 DecodePointer 22252 7ff63088efa3 RegOpenKeyExW RegDeleteValueW RegCloseKey 22253 7ff63089dfa4 48 API calls 2 library calls 22331 7ff63088e697 79 API calls 4 library calls 22332 7ff6308b549c GetProcessHeap 22255 7ff6308811a0 HeapSize 22256 7ff6308837a0 setsockopt CancelIo closesocket SetEvent 22333 7ff6308854a0 70 API calls

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 0 7ff6308862f0-7ff630886344 call 7ff63089e4e0 call 7ff63089de98 call 7ff6308bd7b0 7 7ff630886346-7ff630886359 call 7ff6308a87a0 0->7 8 7ff63088635e-7ff6308863ac call 7ff6308bd7b0 gethostname gethostbyname 0->8 7->8 12 7ff6308863b2-7ff6308863fc inet_ntoa call 7ff6308a8f58 * 2 8->12 13 7ff63088644f-7ff630886538 MultiByteToWideChar * 2 GetLastInputInfo GetTickCount wsprintfW MultiByteToWideChar * 2 LoadLibraryW 8->13 12->13 29 7ff6308863fe 12->29 14 7ff63088665c-7ff630886697 GetSystemInfo wsprintfW 13->14 15 7ff63088653e-7ff630886551 GetProcAddress 13->15 19 7ff6308866a0-7ff6308866bf GetDriveTypeW 14->19 17 7ff630886557-7ff6308865e5 call 7ff630883670 call 7ff63089ded4 call 7ff6308891a0 15->17 18 7ff630886653-7ff630886656 FreeLibrary 15->18 45 7ff6308865ed-7ff630886620 RegOpenKeyExW RegQueryValueExW 17->45 46 7ff6308865e7 17->46 18->14 21 7ff6308866f8-7ff6308866fd 19->21 22 7ff6308866c1-7ff6308866f5 GetDiskFreeSpaceExW 19->22 21->19 25 7ff6308866ff-7ff6308867a2 GlobalMemoryStatusEx call 7ff630883670 * 2 call 7ff630888e00 GetForegroundWindow 21->25 22->21 47 7ff6308867ba-7ff6308867fd lstrlenW call 7ff630888cd0 25->47 48 7ff6308867a4-7ff6308867b4 GetWindowTextW 25->48 32 7ff630886400-7ff63088644d inet_ntoa call 7ff6308a8f58 * 2 29->32 32->13 50 7ff630886622-7ff630886624 45->50 51 7ff630886640-7ff63088664e RegCloseKey call 7ff63089de64 45->51 46->45 56 7ff630886823-7ff630886862 call 7ff6308a87a0 lstrlenW call 7ff630888cd0 47->56 57 7ff6308867ff-7ff63088681d GetLocalTime wsprintfW 47->57 48->47 50->51 54 7ff630886626-7ff63088663b call 7ff6308a9248 50->54 51->18 54->51 62 7ff630886878-7ff6308868ab GetModuleHandleW GetProcAddress 56->62 63 7ff630886864-7ff630886873 call 7ff6308a87a0 56->63 57->56 65 7ff6308868ad-7ff6308868af GetNativeSystemInfo 62->65 66 7ff6308868b1 GetSystemInfo 62->66 63->62 67 7ff6308868b7-7ff6308868c3 65->67 66->67 68 7ff6308868c5-7ff6308868cf 67->68 69 7ff6308868d1 67->69 68->69 70 7ff6308868d6-7ff630886916 wsprintfW call 7ff630888ad0 GetCurrentProcessId 68->70 69->70 73 7ff63088691c-7ff630886937 OpenProcess 70->73 74 7ff630886a5e-7ff630886a8f CoInitializeEx CoCreateInstance 70->74 77 7ff63088693d-7ff630886955 K32GetProcessImageFileNameW 73->77 78 7ff630886a57 73->78 75 7ff630886a95-7ff630886aaa 74->75 76 7ff630886b8f 74->76 82 7ff630886ab0-7ff630886ab2 75->82 81 7ff630886b96-7ff630886bef call 7ff6308a87a0 call 7ff6308bd7b0 RegOpenKeyExW 76->81 79 7ff63088695b-7ff63088696f GetLogicalDriveStringsW 77->79 80 7ff630886a4e-7ff630886a51 CloseHandle 77->80 78->74 83 7ff630886975-7ff63088697e 79->83 84 7ff630886a3e-7ff630886a48 lstrcpyW 79->84 80->78 95 7ff630886bf5-7ff630886c4f RegQueryInfoKeyW 81->95 96 7ff630886d52-7ff630886d62 lstrlenW 81->96 82->76 86 7ff630886ab8-7ff630886ae5 82->86 83->84 87 7ff630886984-7ff63088698b 83->87 84->80 106 7ff630886aeb 86->106 107 7ff630886b7e-7ff630886b8d CoUninitialize 86->107 90 7ff630886990-7ff6308869b0 lstrcmpiW 87->90 93 7ff6308869b2-7ff6308869c4 lstrcmpiW 90->93 94 7ff630886a2e-7ff630886a38 90->94 93->94 97 7ff6308869c6-7ff6308869fe QueryDosDeviceW 93->97 94->84 94->90 98 7ff630886c55-7ff630886c67 95->98 99 7ff630886d82-7ff630886e7d call 7ff6308879e0 call 7ff6308a9248 GetTickCount call 7ff6308a8b9c call 7ff6308a8f10 wsprintfW GetLocaleInfoW GetSystemDirectoryW GetCurrentHwProfileW 95->99 96->99 100 7ff630886d64-7ff630886d7d call 7ff6308a9248 96->100 97->80 102 7ff630886a00-7ff630886a28 lstrlenW call 7ff6308a90ac 97->102 98->96 103 7ff630886c6d-7ff630886c70 98->103 137 7ff630886eb6 99->137 138 7ff630886e7f-7ff630886e8b 99->138 100->99 102->94 115 7ff630886e8d-7ff630886eb1 lstrcpyW lstrcatW 102->115 103->96 109 7ff630886c76-7ff630886c8f call 7ff6308bd7b0 103->109 111 7ff630886af0-7ff630886b13 106->111 107->76 107->81 121 7ff630886d47-7ff630886d4c RegCloseKey 109->121 122 7ff630886c95 109->122 119 7ff630886b4d-7ff630886b78 111->119 120 7ff630886b15-7ff630886b34 111->120 115->80 119->107 119->111 130 7ff630886b36-7ff630886b3c SysFreeString 120->130 131 7ff630886b42-7ff630886b47 120->131 121->96 124 7ff630886ca0-7ff630886cf5 call 7ff6308bd7b0 RegEnumKeyExW lstrlenW 122->124 135 7ff630886d39-7ff630886d41 124->135 136 7ff630886cf7-7ff630886d07 lstrlenW 124->136 130->131 131->119 135->121 135->124 136->135 140 7ff630886d09-7ff630886d34 call 7ff6308a8b24 * 2 136->140 139 7ff630886ebb-7ff630886f0d call 7ff630887250 lstrlenW call 7ff630888cd0 137->139 138->139 148 7ff630886fe7-7ff630886ffb CreateToolhelp32Snapshot 139->148 149 7ff630886f13-7ff630886f96 GetLocalTime wsprintfW RegOpenKeyExW RegDeleteValueW RegCloseKey RegCreateKeyW 139->149 140->135 152 7ff630887088 148->152 153 7ff630887001-7ff630887031 call 7ff6308bd7b0 Process32FirstW 148->153 150 7ff630886fda-7ff630886fe1 RegCloseKey 149->150 151 7ff630886f98-7ff630886fcb lstrlenW RegSetValueExW 149->151 150->148 151->150 155 7ff630886fcd-7ff630886fd4 RegCloseKey 151->155 154 7ff63088708a-7ff6308870a5 CreateToolhelp32Snapshot 152->154 153->152 162 7ff630887033-7ff63088703a 153->162 157 7ff6308870ab-7ff6308870db call 7ff6308bd7b0 Process32FirstW 154->157 158 7ff630887138 154->158 155->150 157->158 169 7ff6308870dd-7ff6308870e8 157->169 160 7ff63088713a-7ff630887155 CreateToolhelp32Snapshot 158->160 164 7ff63088715b-7ff63088718b call 7ff6308bd7b0 Process32FirstW 160->164 165 7ff6308871ff-7ff630887219 call 7ff630883e30 160->165 163 7ff630887040-7ff63088704f 162->163 167 7ff630887050-7ff63088705a 163->167 164->165 178 7ff63088718d-7ff630887198 164->178 170 7ff63088721c-7ff630887240 call 7ff63089de64 165->170 171 7ff63088705c-7ff630887064 167->171 172 7ff630887074-7ff630887086 Process32NextW 167->172 174 7ff6308870f0-7ff6308870fe 169->174 176 7ff63088706a-7ff630887072 171->176 177 7ff6308871e6-7ff6308871eb 171->177 172->152 172->163 179 7ff630887100-7ff63088710a 174->179 176->167 176->172 177->154 181 7ff6308871a0-7ff6308871ae 178->181 182 7ff63088710c-7ff630887114 179->182 183 7ff630887124-7ff630887136 Process32NextW 179->183 184 7ff6308871b0-7ff6308871ba 181->184 185 7ff63088711a-7ff630887122 182->185 186 7ff6308871f0-7ff6308871f5 182->186 183->158 183->174 187 7ff6308871bc-7ff6308871c4 184->187 188 7ff6308871d0-7ff6308871e2 Process32NextW 184->188 185->179 185->183 186->160 189 7ff6308871fa 187->189 190 7ff6308871c6-7ff6308871ce 187->190 188->181 191 7ff6308871e4 188->191 189->165 190->184 190->188 191->165
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Process32lstrlen$CloseCreateInfo$Systemwsprintf$ByteCharFirstHandleMultiNextOpenSnapshotTimeToolhelp32Wide$AddressFreeProcProcessQueryValue$Concurrency::cancel_current_taskCountCurrentDriveFileInstanceLibraryLocalModuleNativeTickWindow_invalid_parameter_noinfoinet_ntoalstrcmpi$DeleteDeviceDirectoryDiskEnumForegroundGlobalImageInitializeInputLastLoadLocaleLogicalMemoryNameProfileSpaceStatusStringStringsTextTypeUninitializegethostbynamegethostnamelstrcpy
              • String ID: %d min$%d.%d$%d.%d.%d$%sFree%d Gb $7e604a66-3b67-4656-8552-1184595e4a9f$A:\$AppEvents$B:\$FriendlyName$GetNativeSystemInfo$HDD:%d$INSTALLTIME$Network$ProductName$RtlGetNtVersionNumbers$SOFTWARE\Microsoft\Windows NT\CurrentVersion$Software$Software\Tencent\Plugin\VAS$Telegram.exe$VenGROUP$VenNetwork$VenREMARK$WeChat.exe$WxWork.exe$X64 %s$kernel32.dll$ntdll.dll$x64$x86
              • API String ID: 4136965836-154773921
              • Opcode ID: 5fafffc449150de91c54ecd83cfb5b313bf068d550184ca4faa4dac19eea3f34
              • Instruction ID: 1c7a4f7e8028092f36ee2a2e272c1336a86e767fb940363d921c06421f147809
              • Opcode Fuzzy Hash: 5fafffc449150de91c54ecd83cfb5b313bf068d550184ca4faa4dac19eea3f34
              • Instruction Fuzzy Hash: 22925E36A08A96A6EF20DF65D8446E93360FB8475CF804232DA4D87BA5EF3CD64DD700

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 193 7ff63089b500-7ff63089b541 call 7ff6308a9c1c SleepEx 196 7ff63089b573-7ff63089b57a 193->196 197 7ff63089b543-7ff63089b56d call 7ff63089de98 call 7ff6308a8940 CloseHandle 193->197 198 7ff63089b64f-7ff63089b759 GetLocalTime wsprintfW SetUnhandledExceptionFilter call 7ff6308a8940 CloseHandle call 7ff63089de98 call 7ff6308836e0 call 7ff63089ad80 AllocateAndInitializeSid 196->198 199 7ff63089b580-7ff63089b59d GetCurrentProcess OpenProcessToken 196->199 197->196 215 7ff63089b789-7ff63089b790 198->215 216 7ff63089b75b-7ff63089b773 CheckTokenMembership 198->216 201 7ff63089b59f-7ff63089b5ee LookupPrivilegeValueW AdjustTokenPrivileges CloseHandle 199->201 202 7ff63089b5f4-7ff63089b617 GetModuleHandleA GetProcAddress 199->202 201->202 202->198 206 7ff63089b619-7ff63089b64a GetCurrentProcessId OpenProcess 202->206 206->198 219 7ff63089b792-7ff63089b807 RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 215->219 220 7ff63089b80d-7ff63089b81b 215->220 217 7ff63089b775 216->217 218 7ff63089b77c-7ff63089b783 FreeSid 216->218 217->218 218->215 219->220 221 7ff63089b820-7ff63089b833 220->221 222 7ff63089b861-7ff63089b885 call 7ff6308a87a0 * 2 221->222 223 7ff63089b835-7ff63089b85f call 7ff6308a87a0 * 2 221->223 232 7ff63089b88b-7ff63089b8b4 222->232 223->232 233 7ff63089b8b6-7ff63089b8f2 call 7ff6308a87a0 * 2 232->233 234 7ff63089b8f9-7ff63089b903 232->234 233->234 236 7ff63089b905 234->236 237 7ff63089b90a-7ff63089b955 call 7ff6308a9c1c SleepEx call 7ff6308a9c1c call 7ff630883820 234->237 236->237 237->221 246 7ff63089b95b-7ff63089ba18 call 7ff6308a9c1c CreateEventA call 7ff6308a87a0 call 7ff6308862f0 237->246 253 7ff63089ba1d-7ff63089ba20 246->253 254 7ff63089ba30 253->254 255 7ff63089ba22-7ff63089ba2e 253->255 256 7ff63089ba33-7ff63089ba3a 254->256 261 7ff63089ba7e-7ff63089ba8d 255->261 257 7ff63089ba65-7ff63089ba6c 256->257 258 7ff63089ba3c-7ff63089ba4c Sleep 256->258 263 7ff63089ba72-7ff63089ba7d Sleep 257->263 258->256 260 7ff63089ba4e-7ff63089ba55 258->260 260->257 262 7ff63089ba57-7ff63089ba63 260->262 264 7ff63089ba8f-7ff63089baa7 261->264 265 7ff63089bad5-7ff63089bae4 CloseHandle 261->265 262->263 263->261 266 7ff63089babe-7ff63089bace call 7ff63089de64 264->266 267 7ff63089baa9-7ff63089babc 264->267 265->221 266->265 267->266 269 7ff63089bae9-7ff63089bb04 call 7ff6308a3d58 IsDebuggerPresent 267->269 274 7ff63089bb11-7ff63089bb34 LoadLibraryW 269->274 275 7ff63089bb06-7ff63089bb10 269->275 276 7ff63089bb40-7ff63089bb5e GetProcAddress 274->276 277 7ff63089bb36-7ff63089bb3b 274->277 279 7ff63089bb60-7ff63089bb6e FreeLibrary 276->279 280 7ff63089bb73-7ff63089bc25 call 7ff6308bd7b0 GetLocalTime wsprintfW CreateFileW 276->280 278 7ff63089bcae-7ff63089bcc8 277->278 281 7ff63089bca6 279->281 284 7ff63089bc35-7ff63089bc90 GetCurrentThreadId GetCurrentProcessId GetCurrentProcess CloseHandle FreeLibrary 280->284 285 7ff63089bc27-7ff63089bc33 FreeLibrary 280->285 281->278 286 7ff63089bc96-7ff63089bc9e 284->286 285->286 286->281
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CloseHandle$ProcessSleep$OpenTokenValue$AddressByteCharCurrentFreeLibraryMultiProcWide_invalid_parameter_noinfoinet_ntoa$AdjustAllocateCheckCreateDebuggerDeleteEventExceptionFilterInitializeLoadLocalLookupMembershipModulePresentPrivilegePrivilegesTimeUnhandled_invalid_parameter_noinfo_noreturngethostbynamegethostnamewsprintf
              • String ID: !analyze -v$%4d.%2d.%2d-%2d:%2d:%2d$%s-%04d%02d%02d-%02d%02d%02d.dmp$10443$192.238.134.52$192.238.134.52$192.238.134.52$192.238.134.52$4433$4433$DbgHelp.dll$MiniDumpWriteDump$NtDll.dll$NtSetInformationProcess$SOFTWARE$SeDebugPrivilege$VenkernalData_info$loginconfig
              • API String ID: 905065789-3740111702
              • Opcode ID: af5b0ca8d781796932839bb88e6d9c06d7e346fee9f2ebf3790dbac2dd1ba735
              • Instruction ID: 6abb110508cb56e153c2fe1254333b81e11b9330c7882161e966b9b3bd70bccb
              • Opcode Fuzzy Hash: af5b0ca8d781796932839bb88e6d9c06d7e346fee9f2ebf3790dbac2dd1ba735
              • Instruction Fuzzy Hash: 3B226271A08B82A6EF20DF65E8502A973A5FF84758F504236D94D87BA5DF3CE14DE700

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 289 7ff63088f410-7ff63088f49f call 7ff63089de98 call 7ff6308bd7b0 GetLastInputInfo GetTickCount wsprintfW GetForegroundWindow 294 7ff63088f4a1-7ff63088f4ae GetWindowTextW 289->294 295 7ff63088f4b4-7ff63088f4d6 CreateToolhelp32Snapshot 289->295 294->295 296 7ff63088f555 295->296 297 7ff63088f4d8-7ff63088f4ff call 7ff6308bd7b0 Process32FirstW 295->297 298 7ff63088f557-7ff63088f571 CreateToolhelp32Snapshot 296->298 297->296 304 7ff63088f501-7ff63088f508 297->304 300 7ff63088f577-7ff63088f5a7 call 7ff6308bd7b0 Process32FirstW 298->300 301 7ff63088f5f8 298->301 300->301 310 7ff63088f5a9 300->310 305 7ff63088f5fa-7ff63088f614 CreateToolhelp32Snapshot 301->305 307 7ff63088f510-7ff63088f517 304->307 308 7ff63088f6a8 305->308 309 7ff63088f61a-7ff63088f64a call 7ff6308bd7b0 Process32FirstW 305->309 312 7ff63088f520-7ff63088f52a 307->312 311 7ff63088f6aa-7ff63088f6f4 RegOpenKeyExW 308->311 309->308 327 7ff63088f64c-7ff63088f657 309->327 314 7ff63088f5b0-7ff63088f5ba 310->314 315 7ff63088f913-7ff63088f94b RegOpenKeyExW 311->315 316 7ff63088f6fa-7ff63088f72e RegQueryValueExW 311->316 317 7ff63088f544-7ff63088f553 Process32NextW 312->317 318 7ff63088f52c-7ff63088f534 312->318 322 7ff63088f5c0-7ff63088f5ca 314->322 320 7ff63088f951-7ff63088f984 RegQueryValueExW 315->320 321 7ff63088f9f2-7ff63088fa2a RegOpenKeyExW 315->321 323 7ff63088f734-7ff63088f78b call 7ff63089ded4 call 7ff6308bd7b0 RegQueryValueExW 316->323 324 7ff63088f908-7ff63088f90d RegCloseKey 316->324 317->296 317->307 325 7ff63088f7f2-7ff63088f7f4 318->325 326 7ff63088f53a-7ff63088f542 318->326 329 7ff63088f986-7ff63088f9dd call 7ff63089ded4 call 7ff6308bd7b0 RegQueryValueExW 320->329 330 7ff63088f9e7-7ff63088f9ec RegCloseKey 320->330 334 7ff63088fa30-7ff63088fa63 RegQueryValueExW 321->334 335 7ff63088fad1-7ff63088fb87 SHGetFolderPathW lstrcatW CreateFileW lstrlenW WriteFile CloseHandle FindFirstFileW 321->335 331 7ff63088f5e4-7ff63088f5f6 Process32NextW 322->331 332 7ff63088f5cc-7ff63088f5d4 322->332 323->324 361 7ff63088f791-7ff63088f7b9 call 7ff630891390 323->361 324->315 325->298 326->312 326->317 328 7ff63088f660-7ff63088f66a 327->328 336 7ff63088f670-7ff63088f67a 328->336 329->330 363 7ff63088f9df 329->363 330->321 331->301 331->314 340 7ff63088f7f9-7ff63088f7fb 332->340 341 7ff63088f5da-7ff63088f5e2 332->341 343 7ff63088fa65-7ff63088fabc call 7ff63089ded4 call 7ff6308bd7b0 RegQueryValueExW 334->343 344 7ff63088fac6-7ff63088facb RegCloseKey 334->344 338 7ff63088fb91-7ff63088fbdc FindClose call 7ff63088fd10 335->338 339 7ff63088fb89 335->339 345 7ff63088f694-7ff63088f6a6 Process32NextW 336->345 346 7ff63088f67c-7ff63088f684 336->346 359 7ff63088fbde-7ff63088fbe2 338->359 360 7ff63088fbf8-7ff63088fc20 call 7ff63089ded4 338->360 339->338 340->305 341->322 341->331 343->344 367 7ff63088fabe 343->367 344->335 345->308 345->328 351 7ff63088f800-7ff63088f802 346->351 352 7ff63088f68a-7ff63088f692 346->352 351->311 352->336 352->345 359->360 364 7ff63088fbe4-7ff63088fbf1 359->364 372 7ff63088fc23-7ff63088fc7c 360->372 370 7ff63088f7bf-7ff63088f7ca 361->370 371 7ff63088f845-7ff63088f855 361->371 363->330 364->360 367->344 374 7ff63088f7d0-7ff63088f7d9 370->374 375 7ff63088f857-7ff63088f85e 371->375 376 7ff63088f8cd-7ff63088f8d1 371->376 372->372 373 7ff63088fc7e-7ff63088fcac call 7ff6308bd110 372->373 388 7ff63088fcbe-7ff63088fcc1 373->388 389 7ff63088fcae-7ff63088fcbb call 7ff630883e30 373->389 374->371 379 7ff63088f7db 374->379 377 7ff63088f862-7ff63088f86b 375->377 376->324 380 7ff63088f8d3-7ff63088f8e5 376->380 377->376 381 7ff63088f86d 377->381 383 7ff63088f7e0-7ff63088f7e4 379->383 384 7ff63088f900-7ff63088f903 call 7ff63089de64 380->384 385 7ff63088f8e7-7ff63088f8fa 380->385 387 7ff63088f870-7ff63088f874 381->387 390 7ff63088f7e6-7ff63088f7ee 383->390 391 7ff63088f807-7ff63088f80a 383->391 384->324 385->384 392 7ff63088fcfe-7ff63088fd03 call 7ff6308a3d58 385->392 393 7ff63088f876-7ff63088f87e 387->393 394 7ff63088f88b-7ff63088f88e 387->394 396 7ff63088fcc3-7ff63088fcc6 call 7ff63089de64 388->396 397 7ff63088fccb-7ff63088fcf4 call 7ff63089de64 388->397 389->388 390->383 395 7ff63088f7f0 390->395 391->371 398 7ff63088f80c-7ff63088f81c 391->398 393->387 400 7ff63088f880 393->400 394->376 401 7ff63088f890-7ff63088f89d 394->401 395->371 396->397 404 7ff63088f820-7ff63088f826 398->404 400->376 406 7ff63088f8a0-7ff63088f8a6 401->406 408 7ff63088f882-7ff63088f886 404->408 409 7ff63088f828-7ff63088f834 404->409 410 7ff63088fcf5-7ff63088fcf9 406->410 411 7ff63088f8ac-7ff63088f8b8 406->411 408->374 409->404 412 7ff63088f836-7ff63088f83f 409->412 410->377 411->406 413 7ff63088f8ba-7ff63088f8c3 411->413 412->371 414 7ff63088f8c5 412->414 413->376 413->414 414->376
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Process32QueryValue$Close$CreateFirst$FileNextOpenSnapshotToolhelp32$Concurrency::cancel_current_taskFindWindow$CountFolderForegroundHandleInfoInputLastPathTextTickWrite_invalid_parameter_noinfo_noreturnlstrcatlstrlenwsprintf
              • String ID: %d min$C:\ProgramData\Mylnk$C:\Users$OpenAi_Service$SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders$SOFTWARE\Microsoft\Windows\CurrentVersion\Run$Startup$Telegram.exe$WXWork.exe$WeChat.exe$\kernelquick.sys
              • API String ID: 3029130142-1423135667
              • Opcode ID: e62539a16d3ca5b5cc7c3476556dc898a7606d9ab66eaf610e565dd4e6f3647a
              • Instruction ID: 72cef16ee18ae94c3e24443aeffcd88833368cc297989c0f3d483870e5916e61
              • Opcode Fuzzy Hash: e62539a16d3ca5b5cc7c3476556dc898a7606d9ab66eaf610e565dd4e6f3647a
              • Instruction Fuzzy Hash: F232A232A08A86A2EF60DF69E4046BD77A0FB95B8CF404135DA4D87796EF7CE548D700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: lstrlen$QueryValue$Open
              • String ID: 10443$192.238.134.52$192.238.134.52$192.238.134.52$4433$Console$Vendata$o1:$o2:$o3:$p1:$p2:$p3:$t1:$t2:$t3:
              • API String ID: 1772312705-2005200276
              • Opcode ID: c599fbb0e57935ebe8c3f9b158b0f14cad8e83e9b9ac755a95a7fb9a9d72626c
              • Instruction ID: dcde39c8d3a5ce9c92773f3e2e14748e6e5c56f224b1cfe98a43b5a7082da1ff
              • Opcode Fuzzy Hash: c599fbb0e57935ebe8c3f9b158b0f14cad8e83e9b9ac755a95a7fb9a9d72626c
              • Instruction Fuzzy Hash: FC22C461F18A6BA1EF24AB18E5606B963A1EF9474CF805131C54EC2B92EF7CF14DA344

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 567 7ff63088fd10-7ff63088fd3a GetVersion 568 7ff63088fd40 567->568 569 7ff630890284-7ff63089028f 567->569 570 7ff63088fd42-7ff63088fd46 568->570 571 7ff63088fd4c-7ff63088fdf8 GetDesktopWindow GetDC CreateCompatibleDC GetDC GetDeviceCaps * 2 ReleaseDC 568->571 570->569 570->571 572 7ff63088fe0e-7ff63088fe2c GetSystemMetrics 571->572 573 7ff63088fdfa-7ff63088fe09 571->573 575 7ff63088fe2e-7ff63088fe76 GetSystemMetrics 572->575 576 7ff63088fe78-7ff63088fe93 GetSystemMetrics 572->576 574 7ff63088fe97-7ff6308900db GetSystemMetrics * 2 CreateCompatibleBitmap SelectObject SetStretchBltMode GetSystemMetrics * 2 StretchBlt call 7ff63089ded4 call 7ff6308bd7b0 GetDIBits call 7ff63089ded4 call 7ff6308bd7b0 call 7ff6308bd110 call 7ff63089de98 call 7ff6308902a0 573->574 591 7ff6308901b1-7ff6308901e1 call 7ff63089ded4 574->591 592 7ff6308900e1-7ff63089011b DeleteObject * 2 ReleaseDC call 7ff63089de64 * 2 574->592 575->574 576->574 597 7ff6308901e3 591->597 598 7ff6308901e6-7ff630890221 call 7ff6308bd110 DeleteObject * 2 ReleaseDC call 7ff63089de64 * 2 591->598 603 7ff63089014d-7ff6308901b0 call 7ff63089de64 592->603 604 7ff63089011d-7ff63089012a 592->604 597->598 617 7ff630890226-7ff63089022e 598->617 607 7ff630890148 call 7ff63089de64 604->607 608 7ff63089012c-7ff63089013f 604->608 607->603 611 7ff630890290-7ff630890295 call 7ff6308a3d58 608->611 612 7ff630890145 608->612 612->607 618 7ff630890230-7ff63089023d 617->618 619 7ff63089025c-7ff63089027c call 7ff63089de64 617->619 621 7ff63089023f-7ff630890252 618->621 622 7ff630890257 call 7ff63089de64 618->622 619->569 621->611 625 7ff630890254 621->625 622->619 625->622
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: MetricsSystem$Object$CapsCompatibleCreateDeleteDeviceReleaseStretch$BitmapBitsDesktopModeSelectVersionWindow_invalid_parameter_noinfo_noreturn
              • String ID: $($6$gfff$gfff
              • API String ID: 3905184151-2922166585
              • Opcode ID: 9eafb342d491789966fcdb852ac60d50250fc806a3a0662fbf213cd29233fd2c
              • Instruction ID: 76231a0761181f50857f897df3b243097ee193b806dad9a7fe05769b53829ef8
              • Opcode Fuzzy Hash: 9eafb342d491789966fcdb852ac60d50250fc806a3a0662fbf213cd29233fd2c
              • Instruction Fuzzy Hash: 93E1D871A187C596EB259F35E40436EB3A1FF99B88F008235DA8D97B55DF3CD4889B00

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 626 7ff630887250-7ff6308872a6 627 7ff6308872b0-7ff6308872b9 626->627 627->627 628 7ff6308872bb-7ff6308872c4 627->628 629 7ff6308872c6-7ff6308872e0 call 7ff6308bd110 628->629 630 7ff6308872e2-7ff6308872e7 call 7ff63088a300 628->630 634 7ff6308872ec 629->634 630->634 635 7ff6308872f3-7ff6308872fb 634->635 635->635 636 7ff6308872fd-7ff630887310 635->636 637 7ff630887345-7ff630887355 call 7ff63088a300 636->637 638 7ff630887312-7ff630887343 call 7ff6308bd110 636->638 642 7ff63088735a 637->642 638->642 643 7ff630887361-7ff63088736a 642->643 643->643 644 7ff63088736c-7ff63088737f 643->644 645 7ff6308873b4-7ff6308873c4 call 7ff63088a300 644->645 646 7ff630887381-7ff6308873b2 call 7ff6308bd110 644->646 650 7ff6308873c9-7ff6308873cd 645->650 646->650 651 7ff6308873d4-7ff6308873dd 650->651 651->651 652 7ff6308873df-7ff6308873f2 651->652 653 7ff630887427-7ff630887434 call 7ff63088a300 652->653 654 7ff6308873f4-7ff630887425 call 7ff6308bd110 652->654 658 7ff630887439-7ff63088744d 653->658 654->658 659 7ff630887485-7ff63088749f call 7ff63088a300 658->659 660 7ff63088744f-7ff630887483 call 7ff6308bd110 658->660 663 7ff6308874a4-7ff6308874af 659->663 660->663 665 7ff6308874b0-7ff6308874b9 663->665 665->665 666 7ff6308874bb-7ff6308874ce 665->666 667 7ff630887503-7ff630887510 call 7ff63088a300 666->667 668 7ff6308874d0-7ff630887501 call 7ff6308bd110 666->668 672 7ff630887515-7ff630887519 667->672 668->672 673 7ff630887520-7ff630887529 672->673 673->673 674 7ff63088752b-7ff63088753e 673->674 675 7ff630887573-7ff630887580 call 7ff63088a300 674->675 676 7ff630887540-7ff630887571 call 7ff6308bd110 674->676 679 7ff630887585-7ff630887634 call 7ff630899170 call 7ff630899b00 MultiByteToWideChar * 2 675->679 676->679 685 7ff630887636-7ff630887647 679->685 686 7ff630887663-7ff63088767d 679->686 687 7ff630887649-7ff63088765c 685->687 688 7ff63088765e call 7ff63089de64 685->688 689 7ff6308876b2-7ff6308876d2 686->689 690 7ff63088767f-7ff630887696 686->690 687->688 691 7ff6308876d9-7ff630887717 call 7ff6308a3d58 CreateMutexExW GetLastError 687->691 688->686 693 7ff6308876ad call 7ff63089de64 690->693 694 7ff630887698-7ff6308876ab 690->694 701 7ff630887749-7ff630887750 691->701 702 7ff630887719 691->702 693->689 694->693 696 7ff6308876d3-7ff6308876d8 call 7ff6308a3d58 694->696 696->691 704 7ff630887756 701->704 705 7ff6308877f0-7ff6308878a2 GetModuleHandleW GetConsoleWindow SHGetFolderPathW lstrcatW CreateMutexW WaitForSingleObject CreateFileW GetFileSize CloseHandle 701->705 703 7ff630887720-7ff630887747 Sleep CreateMutexW GetLastError 702->703 703->701 703->703 708 7ff630887760-7ff6308877c0 lstrlenW call 7ff630888cd0 704->708 706 7ff6308878ad-7ff6308878dd ReleaseMutex DirectInput8Create 705->706 707 7ff6308878a4-7ff6308878a7 DeleteFileW 705->707 709 7ff6308878e3-7ff630887903 706->709 710 7ff630887980-7ff63088799e 706->710 707->706 714 7ff6308877d8-7ff6308877ea SleepEx 708->714 715 7ff6308877c2-7ff6308877d6 lstrcmpW 708->715 709->710 716 7ff630887905-7ff63088791b 709->716 714->705 714->708 715->705 715->714 716->710 718 7ff63088791d-7ff630887935 716->718 718->710 720 7ff630887937-7ff63088796d 718->720 720->710 722 7ff63088796f-7ff63088797e 720->722 722->710 724 7ff63088799f-7ff6308879d1 GetTickCount GetKeyState call 7ff63088adb0 722->724
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ByteCharMultiWide$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
              • String ID: <$X64$\DisplaySessionContainers.log$key$open
              • API String ID: 143101810-941791203
              • Opcode ID: 84872136b42da0819a194256f274013d04c1c29aff028023f1cbf7d720f00181
              • Instruction ID: 79db2b18d0ddbb6593e51703a15d18fea46a21cbd681ee3279e22c3fb7fae35f
              • Opcode Fuzzy Hash: 84872136b42da0819a194256f274013d04c1c29aff028023f1cbf7d720f00181
              • Instruction Fuzzy Hash: FF228372A18A86A2EF10DB65E4402AE7371FB84B98F504232EA5D83B99DF3CD549D740

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 939 7ff6308879e0-7ff630887a2c call 7ff6308bd7b0 call 7ff63089fc98 944 7ff630887afc-7ff630887b27 CoCreateInstance 939->944 945 7ff630887a32-7ff630887a46 939->945 946 7ff630887b2d-7ff630887b79 944->946 947 7ff630887d21-7ff630887d2c lstrlenW 944->947 948 7ff630887a50-7ff630887a78 call 7ff6308bd7b0 CreateToolhelp32Snapshot 945->948 956 7ff630887d0f-7ff630887d19 946->956 957 7ff630887b7f-7ff630887b9b 946->957 950 7ff630887d3f-7ff630887d46 947->950 951 7ff630887d2e-7ff630887d3e lstrcatW 947->951 958 7ff630887a7a-7ff630887a90 Process32FirstW 948->958 959 7ff630887ad6-7ff630887af6 call 7ff63089fc98 948->959 954 7ff630887d48 950->954 955 7ff630887d4e-7ff630887d64 950->955 951->950 954->955 956->947 961 7ff630887d1b 956->961 957->956 967 7ff630887ba1-7ff630887c5d call 7ff6308bd7b0 wsprintfW RegOpenKeyExW 957->967 962 7ff630887acd-7ff630887ad0 CloseHandle 958->962 963 7ff630887a92-7ff630887a9c 958->963 959->944 959->948 961->947 962->959 966 7ff630887aa0-7ff630887aaa 963->966 968 7ff630887aac-7ff630887ab2 966->968 969 7ff630887ab4-7ff630887ab9 966->969 975 7ff630887ced-7ff630887cff 967->975 976 7ff630887c63-7ff630887cbe call 7ff6308bd7b0 RegQueryValueExW 967->976 968->966 968->969 970 7ff630887d65-7ff630887d6f CloseHandle 969->970 971 7ff630887abf-7ff630887acb Process32NextW 969->971 970->959 973 7ff630887d75-7ff630887d93 lstrcatW * 2 970->973 971->962 971->963 973->959 979 7ff630887d07-7ff630887d09 975->979 980 7ff630887ce0-7ff630887ce7 RegCloseKey 976->980 981 7ff630887cc0-7ff630887cda lstrcatW * 2 976->981 979->956 979->967 980->975 981->980
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: lstrcat$Close$CreateHandleProcess32$FirstInstanceNextOpenQuerySnapshotToolhelp32Valuelstrlenwsprintf
              • String ID: CLSID\{%.8X-%.4X-%.4X-%.2X%.2X-%.2X%.2X%.2X%.2X%.2X%.2X}$Windows Defender IOfficeAntiVirus implementation
              • API String ID: 582347850-1583895642
              • Opcode ID: 134265c9e40a9f760aa4fceb9a534aa5a21de15c77527937ae6ae4b8d1d4e22b
              • Instruction ID: fbcf12ad277249f147d2e8f7882b871b5d0d0d5dca0a801b18a4ee98a67ecf31
              • Opcode Fuzzy Hash: 134265c9e40a9f760aa4fceb9a534aa5a21de15c77527937ae6ae4b8d1d4e22b
              • Instruction Fuzzy Hash: 9AA18132A08A92A6EB24CF75E8406AA77B1FB85B4CF444131DE4D87B69DF3CD648D700

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1080 7ff630888690-7ff6308886bf 1081 7ff6308886c1 1080->1081 1082 7ff6308886c4-7ff6308886d3 1080->1082 1081->1082 1083 7ff6308886d5 1082->1083 1084 7ff6308886d8-7ff6308886ed 1082->1084 1083->1084 1085 7ff6308886f3-7ff630888713 GetTokenInformation 1084->1085 1086 7ff6308888d8 1084->1086 1087 7ff63088874e-7ff630888776 GetTokenInformation 1085->1087 1088 7ff630888715-7ff63088871e GetLastError 1085->1088 1089 7ff6308888da-7ff6308888f1 1086->1089 1091 7ff6308888bf-7ff6308888c2 1087->1091 1092 7ff63088877c-7ff6308887be LookupAccountSidW 1087->1092 1088->1086 1090 7ff630888724-7ff630888748 GetProcessHeap HeapAlloc 1088->1090 1090->1086 1090->1087 1091->1086 1093 7ff6308888c4-7ff6308888d2 GetProcessHeap HeapFree 1091->1093 1094 7ff6308887ef-7ff6308887fe 1092->1094 1095 7ff6308887c0-7ff6308887cb GetLastError 1092->1095 1093->1086 1096 7ff630888800-7ff630888807 1094->1096 1097 7ff6308887e8-7ff6308887ea 1095->1097 1098 7ff6308887cd-7ff6308887e3 call 7ff6308a87a0 1095->1098 1096->1096 1099 7ff630888809-7ff630888818 1096->1099 1097->1089 1098->1091 1102 7ff630888844-7ff63088884c call 7ff63088a1a0 1099->1102 1103 7ff63088881a-7ff630888821 1099->1103 1108 7ff630888851-7ff630888859 1102->1108 1104 7ff630888823 1103->1104 1105 7ff630888826-7ff630888842 call 7ff6308bd110 1103->1105 1104->1105 1105->1108 1110 7ff630888860-7ff630888867 1108->1110 1110->1110 1111 7ff630888869-7ff630888870 1110->1111 1112 7ff63088889f-7ff6308888ad call 7ff63088a1a0 1111->1112 1113 7ff630888872-7ff630888879 1111->1113 1118 7ff6308888b2-7ff6308888ba 1112->1118 1114 7ff63088887e-7ff63088889d call 7ff6308bd110 1113->1114 1115 7ff63088887b 1113->1115 1114->1118 1115->1114 1118->1091
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Heap$ErrorInformationLastProcessToken$AccountAllocFreeLookup
              • String ID: NONE_MAPPED
              • API String ID: 162735656-2950899194
              • Opcode ID: fc7d76223dfa6cbbf8efa4015a3b0f0cb7eb74909b040ee270e83bc7d35c4934
              • Instruction ID: a3bd24295624e5578fa44c8e7056380109cea744a90344341a5690e844a72401
              • Opcode Fuzzy Hash: fc7d76223dfa6cbbf8efa4015a3b0f0cb7eb74909b040ee270e83bc7d35c4934
              • Instruction Fuzzy Hash: 8F51AD62A08B82E6EE609F05E4442AE73A0FF44BC8F844936DA5D83B95EF3CD548D740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Thread$Window$CloseConsoleCreateCurrentExceptionFilterHandleInputMessageObjectPostShowSingleSleepStateUnhandledWait
              • String ID:
              • API String ID: 2277684705-0
              • Opcode ID: 6f2be5bc360ff60992bf957455bd65437668e6ddaf6ac78ef69b290b53bfb88b
              • Instruction ID: 3b4bddf47d20fa03af8865390b074553d3f2b874f7f8b1b27798213144fe75cc
              • Opcode Fuzzy Hash: 6f2be5bc360ff60992bf957455bd65437668e6ddaf6ac78ef69b290b53bfb88b
              • Instruction Fuzzy Hash: 6F01E835E18A42A2EB14AFB9FC5457A33A1FF88B19F418135D40EC2771DE3CA44DA304
              APIs
              • _get_daylight.LIBCMT ref: 00007FF6308B1DED
                • Part of subcall function 00007FF6308B1464: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6308B1478
                • Part of subcall function 00007FF6308AE6BC: RtlFreeHeap.NTDLL(?,?,?,00007FF6308B65C2,?,?,?,00007FF6308B693F,?,?,00000000,00007FF6308B6D85,?,?,?,00007FF6308B6CB7), ref: 00007FF6308AE6D2
                • Part of subcall function 00007FF6308AE6BC: GetLastError.KERNEL32(?,?,?,00007FF6308B65C2,?,?,?,00007FF6308B693F,?,?,00000000,00007FF6308B6D85,?,?,?,00007FF6308B6CB7), ref: 00007FF6308AE6DC
                • Part of subcall function 00007FF6308A3D88: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF6308A3D37,?,?,?,?,?,00007FF6308A3C22), ref: 00007FF6308A3D91
                • Part of subcall function 00007FF6308A3D88: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF6308A3D37,?,?,?,?,?,00007FF6308A3C22), ref: 00007FF6308A3DB6
                • Part of subcall function 00007FF6308B9F14: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6308B9E5F
              • _get_daylight.LIBCMT ref: 00007FF6308B1DDC
                • Part of subcall function 00007FF6308B14C4: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6308B14D8
              • _get_daylight.LIBCMT ref: 00007FF6308B2052
              • _get_daylight.LIBCMT ref: 00007FF6308B2063
              • _get_daylight.LIBCMT ref: 00007FF6308B2074
              • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF6308B22B4), ref: 00007FF6308B209B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureFreeHeapInformationLastPresentProcessProcessorTimeZone
              • String ID: Eastern Standard Time$Eastern Summer Time
              • API String ID: 4070488512-239921721
              • Opcode ID: e4d215210ab8a5127c723f465f4324ebd8545cea5875ff9c0ed7522d57f15f04
              • Instruction ID: 9a720cdef9e05ee07fb2cd5f4550f5225134b0fd2a20ba15762fc9b1d9cc0641
              • Opcode Fuzzy Hash: e4d215210ab8a5127c723f465f4324ebd8545cea5875ff9c0ed7522d57f15f04
              • Instruction Fuzzy Hash: 21D1A126A08642A5EF20AF25D4902B97761EF4479CF844136EE4EC7B86DF3CE449E340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ControlDevice_invalid_parameter_noinfo_noreturn$CreateFilewsprintf
              • String ID:
              • API String ID: 3155671162-0
              • Opcode ID: ca3a5f53a69bd94d5085424c179d366c67bc8047cf41c0a47e4941c75c49cf7e
              • Instruction ID: e5170e445827c8e8b2b556f2091f80ae978307f2c6a3a66cf93a1bf17dcb0637
              • Opcode Fuzzy Hash: ca3a5f53a69bd94d5085424c179d366c67bc8047cf41c0a47e4941c75c49cf7e
              • Instruction Fuzzy Hash: 60029322F18B82A6EF00DB61E4103BD63A1EB55BACF004635DE5D977DADE3CE449A304
              APIs
              • _get_daylight.LIBCMT ref: 00007FF6308B2052
                • Part of subcall function 00007FF6308B14C4: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6308B14D8
              • _get_daylight.LIBCMT ref: 00007FF6308B2063
                • Part of subcall function 00007FF6308B1464: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6308B1478
              • _get_daylight.LIBCMT ref: 00007FF6308B2074
                • Part of subcall function 00007FF6308B1494: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6308B14A8
                • Part of subcall function 00007FF6308AE6BC: RtlFreeHeap.NTDLL(?,?,?,00007FF6308B65C2,?,?,?,00007FF6308B693F,?,?,00000000,00007FF6308B6D85,?,?,?,00007FF6308B6CB7), ref: 00007FF6308AE6D2
                • Part of subcall function 00007FF6308AE6BC: GetLastError.KERNEL32(?,?,?,00007FF6308B65C2,?,?,?,00007FF6308B693F,?,?,00000000,00007FF6308B6D85,?,?,?,00007FF6308B6CB7), ref: 00007FF6308AE6DC
              • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF6308B22B4), ref: 00007FF6308B209B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
              • String ID: Eastern Standard Time$Eastern Summer Time
              • API String ID: 3458911817-239921721
              • Opcode ID: d39622db5b0ee5333b178c37cbbab90ca343d8bae9bfc90199294d5daa5d9118
              • Instruction ID: b6e934933ae28e022208124b64bf0902787656a3bc93d4908067b8ecd1fa705e
              • Opcode Fuzzy Hash: d39622db5b0ee5333b178c37cbbab90ca343d8bae9bfc90199294d5daa5d9118
              • Instruction Fuzzy Hash: 77518032A08642A6EF10EF25E8915B97761FF4878CF444236EA4DC7796DF3CE449A780
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: InfoSystem$AddressHandleModuleNativeProc
              • String ID: GetNativeSystemInfo$kernel32.dll
              • API String ID: 3433367815-192647395
              • Opcode ID: 882c301155eb64aee104ed8b19a7cf0e71553aaaeea973eafe02328fb5bce8a2
              • Instruction ID: 5162680a425e45935eb8d0bd218311d7b1fc6ef01c7cfd0bda4a06b2a781176f
              • Opcode Fuzzy Hash: 882c301155eb64aee104ed8b19a7cf0e71553aaaeea973eafe02328fb5bce8a2
              • Instruction Fuzzy Hash: 2FF0FC15E1C68293EE51E714D8042797360FF98708F845332D9CE81B55EF3CE2999600
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: _get_daylight$_isindst$_invalid_parameter_noinfo
              • String ID:
              • API String ID: 1405656091-0
              • Opcode ID: bc1b3b9caf7716422d15d8d8075c51535e8cc771750b1ef0c981aa63b125a24c
              • Instruction ID: 153cdf937fc428c55fd945216e4b87d8b5c654179ef512fd73b8bf0c382525e7
              • Opcode Fuzzy Hash: bc1b3b9caf7716422d15d8d8075c51535e8cc771750b1ef0c981aa63b125a24c
              • Instruction Fuzzy Hash: D091E2B2F04386DBEF588F29C9012A863A1EB54B8CF549435DA0D8BBC9EF3CE4559750
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ControlCreateDeviceFile
              • String ID: L$\\.\
              • API String ID: 107608037-1891537229
              • Opcode ID: 0cbf31d1c7ae4fdc9b9f59bce1c389b46034841fd4249985a256846f0105b842
              • Instruction ID: f3fd1989c27d0c93e6c72e676649d9671f5f6de3d09c74270e35cc45da5f4fcb
              • Opcode Fuzzy Hash: 0cbf31d1c7ae4fdc9b9f59bce1c389b46034841fd4249985a256846f0105b842
              • Instruction Fuzzy Hash: A131D672A0C68091EB009F51B450379BBA0EB86BE8F084335EBA947BC6CF7CC0099B00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Virtual$AllocFreeTimerecvselecttime
              • String ID:
              • API String ID: 1996171534-0
              • Opcode ID: 12d6ea6a5e9638a2a12ebf09b867218817c5d33edb793a075e5ebf3298344bd1
              • Instruction ID: 62f9347ca33659a12321450a959f7565deb608962871e42c75a8e88356b28af2
              • Opcode Fuzzy Hash: 12d6ea6a5e9638a2a12ebf09b867218817c5d33edb793a075e5ebf3298344bd1
              • Instruction Fuzzy Hash: B2716C72A18B8592EB209F29D4042BD3360FB94B8CF549635CF4D87B5AEF38E488D704
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Virtual$AllocFree
              • String ID:
              • API String ID: 2087232378-0
              • Opcode ID: 7adfbc43d79927e24f2f975998fe396b12a3d4926a19e200812a52629311d3ed
              • Instruction ID: cb99aee47dfe4e333f229eb36362e01cb8e841fc5c52590e7973f3f252135b83
              • Opcode Fuzzy Hash: 7adfbc43d79927e24f2f975998fe396b12a3d4926a19e200812a52629311d3ed
              • Instruction Fuzzy Hash: 6041D472B08A459AEF19CF2AE45066AA759FB84F88B044139EE4EC7744EE38D949C740

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 727 7ff630888900-7ff630888938 GetCurrentProcessId OpenProcess 728 7ff630888967-7ff63088896c 727->728 729 7ff63088893a-7ff63088895c OpenProcessToken 727->729 732 7ff630888a9a-7ff630888ab4 728->732 730 7ff63088895e-7ff630888961 CloseHandle 729->730 731 7ff630888971-7ff630888a12 call 7ff630888690 call 7ff6308bd110 CloseHandle * 2 729->731 730->728 737 7ff630888a4f-7ff630888a63 731->737 738 7ff630888a14-7ff630888a2b 731->738 741 7ff630888a65-7ff630888a7c 737->741 742 7ff630888a98 737->742 739 7ff630888a42-7ff630888a47 call 7ff63089de64 738->739 740 7ff630888a2d-7ff630888a40 738->740 739->737 740->739 743 7ff630888abb-7ff630888b39 call 7ff6308a3d58 call 7ff63089ded4 GetCurrentProcessId wsprintfW call 7ff630888900 call 7ff6308bd7b0 GetVersionExW 740->743 745 7ff630888a7e-7ff630888a91 741->745 746 7ff630888a93 call 7ff63089de64 741->746 742->732 761 7ff630888b3f-7ff630888b44 743->761 762 7ff630888c92 743->762 745->746 749 7ff630888ab5-7ff630888aba call 7ff6308a3d58 745->749 746->742 749->743 761->762 764 7ff630888b4a-7ff630888b4f 761->764 763 7ff630888c99-7ff630888ca3 wsprintfW 762->763 765 7ff630888ca9-7ff630888cc0 call 7ff63089de64 763->765 764->762 766 7ff630888b55-7ff630888b7b GetCurrentProcess OpenProcessToken 764->766 766->762 768 7ff630888b81-7ff630888bb0 GetTokenInformation 766->768 770 7ff630888bb6-7ff630888bbf GetLastError 768->770 771 7ff630888c3c-7ff630888c4c CloseHandle 768->771 770->771 773 7ff630888bc1-7ff630888be1 LocalAlloc 770->773 771->762 772 7ff630888c4e-7ff630888c54 771->772 774 7ff630888c56-7ff630888c5c 772->774 775 7ff630888c89-7ff630888c90 772->775 776 7ff630888be3-7ff630888c10 GetTokenInformation 773->776 777 7ff630888c34 773->777 778 7ff630888c5e-7ff630888c64 774->778 779 7ff630888c80-7ff630888c87 774->779 775->763 780 7ff630888c12-7ff630888c29 GetSidSubAuthorityCount GetSidSubAuthority 776->780 781 7ff630888c2b-7ff630888c2e LocalFree 776->781 777->771 782 7ff630888c66-7ff630888c6c 778->782 783 7ff630888c77-7ff630888c7e 778->783 779->763 780->781 781->777 782->765 784 7ff630888c6e-7ff630888c75 782->784 783->763 784->763
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Process$CloseHandleToken$CurrentOpen$AuthorityInformationLocal_invalid_parameter_noinfo_noreturnwsprintf$AllocCountErrorFreeLastVersion
              • String ID: -N/$NO/$None/%s$VenNetwork
              • API String ID: 3589523989-819860926
              • Opcode ID: d42ba7504cebbf2a51a649e7bef0d695714f0f5e07d95865d6b26a32d06dfaba
              • Instruction ID: 8c5d75bc3d6e78d1408a0eceb9815f654df8b5bd977a4db7ce20206df7ea49d2
              • Opcode Fuzzy Hash: d42ba7504cebbf2a51a649e7bef0d695714f0f5e07d95865d6b26a32d06dfaba
              • Instruction Fuzzy Hash: EAA18261A0CB82E2EF609B65E4443BA6361FF84B98F405635DA8D83B99DF3CD94DD700

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 785 7ff6308902a0-7ff630890319 GlobalAlloc GlobalLock call 7ff6308bd110 GlobalUnlock CreateStreamOnHGlobal 788 7ff63089031f-7ff63089037e call 7ff6308861e0 EnterCriticalSection LeaveCriticalSection call 7ff63088c9b0 785->788 789 7ff630890671-7ff63089067a GlobalFree 785->789 795 7ff6308905ee-7ff630890604 788->795 796 7ff630890384-7ff6308903ae GdipCreateBitmapFromStream 788->796 790 7ff63089067d-7ff630890697 789->790 802 7ff630890606-7ff630890624 DeleteObject 795->802 803 7ff63089062a-7ff630890640 call 7ff6308861e0 EnterCriticalSection 795->803 797 7ff6308903b0-7ff6308903b6 GdipDisposeImage 796->797 798 7ff6308903bb-7ff6308903d6 call 7ff63088c340 GdipDisposeImage 796->798 797->795 798->795 805 7ff6308903dc-7ff6308903f3 CreateStreamOnHGlobal 798->805 802->803 808 7ff630890642-7ff630890652 EnterCriticalSection 803->808 809 7ff630890667-7ff63089066b LeaveCriticalSection 803->809 805->795 807 7ff6308903f9-7ff630890428 call 7ff63088c7b0 GetHGlobalFromStream GlobalLock 805->807 814 7ff63089042e-7ff63089044d GlobalFree 807->814 815 7ff6308904bf-7ff630890508 GlobalSize call 7ff63089ded4 call 7ff6308bd110 call 7ff630889e70 807->815 811 7ff630890654 GdiplusShutdown 808->811 812 7ff63089065a-7ff630890661 LeaveCriticalSection 808->812 809->789 811->812 812->809 820 7ff63089044f-7ff63089046b DeleteObject 814->820 821 7ff630890471-7ff630890487 call 7ff6308861e0 EnterCriticalSection 814->821 829 7ff63089055e 815->829 830 7ff63089050a-7ff630890512 815->830 820->821 827 7ff6308904ae-7ff6308904ba LeaveCriticalSection 821->827 828 7ff630890489-7ff630890499 EnterCriticalSection 821->828 827->790 831 7ff6308904a1-7ff6308904a8 LeaveCriticalSection 828->831 832 7ff63089049b GdiplusShutdown 828->832 835 7ff630890562-7ff630890566 829->835 833 7ff630890544-7ff63089055c 830->833 834 7ff630890514-7ff630890521 830->834 831->827 832->831 833->835 838 7ff63089053f call 7ff63089de64 834->838 839 7ff630890523-7ff630890536 834->839 836 7ff630890568-7ff630890579 835->836 837 7ff630890599-7ff6308905ad call 7ff63089de64 835->837 840 7ff630890594 call 7ff63089de64 836->840 841 7ff63089057b-7ff63089058e 836->841 849 7ff6308905af-7ff6308905cd DeleteObject 837->849 850 7ff6308905d3-7ff6308905e1 GlobalUnlock 837->850 838->833 843 7ff630890698-7ff63089069f call 7ff6308a3d58 839->843 844 7ff63089053c 839->844 840->837 841->840 841->843 844->838 849->850 852 7ff6308905e7 850->852 852->795
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CriticalSection$Global$EnterLeave$Stream$CreateGdip$DeleteDisposeFreeFromGdiplusImageLockObjectShutdown$AllocBitmapErrorInitializeLastUnlock_invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 953580087-0
              • Opcode ID: 6a47932f2d824f93bffde5a913d367a737229ea91dfede279ec8d7f768a18219
              • Instruction ID: 36230507a6f53533fdd0e1d48b34d89c4da439f5d6f6ebcb0175f786afccc95f
              • Opcode Fuzzy Hash: 6a47932f2d824f93bffde5a913d367a737229ea91dfede279ec8d7f768a18219
              • Instruction Fuzzy Hash: FEC12A36B08B42AAEB009BA4E4441AD3375FB44B5CB004135DE5D97B99DF38E45DE744

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 853 7ff63088c340-7ff63088c383 GdipGetImagePixelFormat 854 7ff63088c385 853->854 855 7ff63088c387-7ff63088c3a4 853->855 854->855 856 7ff63088c3a6-7ff63088c3b3 855->856 857 7ff63088c3b9-7ff63088c3c4 855->857 856->857 858 7ff63088c3c6-7ff63088c3d4 857->858 859 7ff63088c3db-7ff63088c400 GdipGetImageHeight 857->859 858->859 860 7ff63088c40f-7ff63088c422 GdipGetImageWidth 859->860 861 7ff63088c402-7ff63088c40c 859->861 862 7ff63088c424 860->862 863 7ff63088c426-7ff63088c447 call 7ff63088c160 860->863 861->860 862->863 866 7ff63088c453-7ff63088c45b 863->866 867 7ff63088c449-7ff63088c44e 863->867 869 7ff63088c461-7ff63088c478 GdipGetImagePaletteSize 866->869 870 7ff63088c60d-7ff63088c61c 866->870 868 7ff63088c773-7ff63088c78c 867->868 871 7ff63088c47a 869->871 872 7ff63088c47c-7ff63088c487 869->872 873 7ff63088c6e2-7ff63088c74d GdipCreateBitmapFromScan0 GdipGetImageGraphicsContext GdipDrawImageI GdipDeleteGraphics GdipDisposeImage 870->873 874 7ff63088c622-7ff63088c64e GdipBitmapLockBits 870->874 871->872 875 7ff63088c489-7ff63088c492 call 7ff63088b2e0 872->875 876 7ff63088c4ba-7ff63088c4c6 call 7ff6308a3dd0 872->876 877 7ff63088c753-7ff63088c756 873->877 878 7ff63088c650-7ff63088c65a 874->878 879 7ff63088c66a-7ff63088c686 874->879 875->876 896 7ff63088c494-7ff63088c49b 875->896 892 7ff63088c4c8-7ff63088c4cb 876->892 893 7ff63088c4cd-7ff63088c4d4 876->893 883 7ff63088c770 877->883 884 7ff63088c758 877->884 878->877 880 7ff63088c6c4-7ff63088c6db GdipBitmapUnlockBits 879->880 881 7ff63088c688-7ff63088c68b 879->881 880->877 888 7ff63088c6dd-7ff63088c6e0 880->888 886 7ff63088c6ad-7ff63088c6c2 881->886 887 7ff63088c68d-7ff63088c690 881->887 883->868 890 7ff63088c760-7ff63088c76e call 7ff6308a3938 884->890 886->880 886->881 894 7ff63088c794-7ff63088c7af call 7ff6308a8afc call 7ff6308a3d38 call 7ff6308810f0 887->894 895 7ff63088c696-7ff63088c69f 887->895 888->877 890->883 898 7ff63088c4d7-7ff63088c4da 892->898 893->898 900 7ff63088c6a5-7ff63088c6a8 call 7ff6308bd110 895->900 901 7ff63088c78d-7ff63088c78f call 7ff6308bd7b0 895->901 902 7ff63088c4a7-7ff63088c4b8 call 7ff63089e4e0 896->902 903 7ff63088c49d 896->903 906 7ff63088c4e7-7ff63088c4f9 GdipGetImagePalette 898->906 907 7ff63088c4dc-7ff63088c4e2 898->907 900->886 901->894 902->898 903->902 911 7ff63088c4ff-7ff63088c50a 906->911 912 7ff63088c4fb 906->912 907->877 916 7ff63088c65f-7ff63088c665 911->916 917 7ff63088c510-7ff63088c515 911->917 912->911 916->877 919 7ff63088c555-7ff63088c55d 917->919 920 7ff63088c517 917->920 923 7ff63088c55f-7ff63088c56a call 7ff630886280 919->923 924 7ff63088c5aa-7ff63088c5c2 SetDIBColorTable 919->924 922 7ff63088c520-7ff63088c553 920->922 922->919 922->922 931 7ff63088c570-7ff63088c57d 923->931 925 7ff63088c5c4-7ff63088c5de SelectObject call 7ff630886280 924->925 926 7ff63088c607 924->926 932 7ff63088c5e0-7ff63088c5ea 925->932 926->870 933 7ff63088c58e-7ff63088c5a6 SelectObject 931->933 934 7ff63088c57f-7ff63088c584 931->934 936 7ff63088c5fc-7ff63088c603 932->936 937 7ff63088c5ec-7ff63088c5f1 932->937 933->924 934->931 935 7ff63088c586-7ff63088c588 CreateCompatibleDC 934->935 935->933 936->926 937->932 938 7ff63088c5f3-7ff63088c5f6 DeleteDC 937->938 938->936
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Gdip$Image$Bitmap$BitsCreateDeleteGraphicsObjectPaletteSelect$ColorCompatibleContextDisposeDrawFormatFromHeightLockPixelScan0SizeTableUnlockWidth_invalid_parameter_noinfo
              • String ID: &
              • API String ID: 4034434136-3042966939
              • Opcode ID: dd11024c4d0ee26c12cb960423acbe48478663fb147fae3e010d538c7f7c31a7
              • Instruction ID: 35b90f7a8e0cf64222afee653b58a1cfe9cee5d6882b2188a853cb7630f35dcb
              • Opcode Fuzzy Hash: dd11024c4d0ee26c12cb960423acbe48478663fb147fae3e010d538c7f7c31a7
              • Instruction Fuzzy Hash: D2D1BC72A04A82AAEF609F25D8446BD37A4FB44B9CF018035DF1D97B89DF38E949D740

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: setsockopt$ByteCharMultiWidelstrlen$EventIoctlResetTimeconnectgethostbynamehtonssockettime
              • String ID: 0u
              • API String ID: 3082052849-3203441087
              • Opcode ID: ccce55d91f5f2933dea2ad9c04242a37362f75e3f1846cefbce616602e138f50
              • Instruction ID: 3948f463c5059a2a98efd5e8d49928355141254b7019228e2441b0d041895274
              • Opcode Fuzzy Hash: ccce55d91f5f2933dea2ad9c04242a37362f75e3f1846cefbce616602e138f50
              • Instruction Fuzzy Hash: 7A714D72608B8196DB24CF65F44076BB7A5FB84B58F00423AEA9E47B98DF3CD149DB04

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Process$Token$CurrentOpen$AuthorityCloseHandleInformationLocalwsprintf$AllocCountErrorFreeLastVersion
              • String ID: VenNetwork
              • API String ID: 4155081256-3057682757
              • Opcode ID: 544014d16ea7105ca2918a4ebfd3314dfb4a8e47be3c755dc7ae7334bb45691a
              • Instruction ID: 8a3a8352abd1602035a831d568822f5401085618022cfc49a334bfba4d7c75b2
              • Opcode Fuzzy Hash: 544014d16ea7105ca2918a4ebfd3314dfb4a8e47be3c755dc7ae7334bb45691a
              • Instruction Fuzzy Hash: 5D416031A0DA82E2EFA19B61E8443BA6361EF85B49F444535CA4E83795DF3CD84DE710

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1029 7ff63089bdd0-7ff63089bdf7 1030 7ff63089c190-7ff63089c1a1 CloseHandle 1029->1030 1031 7ff63089bdfd-7ff63089be17 1029->1031 1032 7ff63089be20-7ff63089be3a call 7ff6308a3dd0 1031->1032 1035 7ff63089c170-7ff63089c188 1032->1035 1036 7ff63089be40-7ff63089be7c DeviceIoControl 1032->1036 1035->1030 1037 7ff63089be82-7ff63089be86 1036->1037 1038 7ff63089c168-7ff63089c16b call 7ff6308a3938 1036->1038 1040 7ff63089c15a-7ff63089c160 1037->1040 1041 7ff63089be8c-7ff63089beeb DeviceIoControl 1037->1041 1038->1035 1040->1032 1044 7ff63089c166 1040->1044 1042 7ff63089bef1-7ff63089bef8 1041->1042 1043 7ff63089bf84-7ff63089bf88 1041->1043 1042->1043 1045 7ff63089befe-7ff63089bf06 1042->1045 1046 7ff63089bf8e-7ff63089bfd5 DeviceIoControl 1043->1046 1047 7ff63089c075-7ff63089c0cd call 7ff6308bd7b0 call 7ff63089c5c0 * 2 1043->1047 1044->1035 1045->1043 1048 7ff63089bf08-7ff63089bf1e GlobalAlloc 1045->1048 1046->1047 1050 7ff63089bfdb-7ff63089bfe8 1046->1050 1064 7ff63089c0d2-7ff63089c0f9 call 7ff63089bd70 1047->1064 1048->1043 1051 7ff63089bf20-7ff63089bf64 DeviceIoControl 1048->1051 1050->1047 1053 7ff63089bfee-7ff63089c001 GlobalAlloc 1050->1053 1054 7ff63089bf66-7ff63089bf6c 1051->1054 1055 7ff63089bf7b-7ff63089bf7e GlobalFree 1051->1055 1053->1047 1057 7ff63089c003-7ff63089c03f DeviceIoControl 1053->1057 1054->1055 1058 7ff63089bf6e-7ff63089bf79 1054->1058 1055->1043 1060 7ff63089c041-7ff63089c059 call 7ff63089c520 GlobalFree 1057->1060 1061 7ff63089c06c-7ff63089c06f GlobalFree 1057->1061 1058->1043 1058->1055 1060->1047 1067 7ff63089c05b-7ff63089c06a call 7ff63089c1b0 1060->1067 1061->1047 1071 7ff63089c100-7ff63089c107 1064->1071 1067->1047 1071->1071 1072 7ff63089c109-7ff63089c10d 1071->1072 1073 7ff63089c114-7ff63089c11c 1072->1073 1073->1073 1074 7ff63089c11e-7ff63089c128 1073->1074 1074->1035 1075 7ff63089c12a-7ff63089c12d 1074->1075 1076 7ff63089c130-7ff63089c138 1075->1076 1076->1076 1077 7ff63089c13a-7ff63089c13e 1076->1077 1078 7ff63089c140-7ff63089c14e 1077->1078 1078->1078 1079 7ff63089c150-7ff63089c155 1078->1079 1079->1040
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ControlDeviceGlobal$Free$Alloc
              • String ID: - External Hub$%s-%s|
              • API String ID: 3253977144-729331614
              • Opcode ID: 03081c74bdac7000a7ddd20b442c3762f1845e4c687d354af1ec42045e17da7d
              • Instruction ID: 762922593582aef3933151145aeb68c00b75cb3e8237543d800edfac1d666c27
              • Opcode Fuzzy Hash: 03081c74bdac7000a7ddd20b442c3762f1845e4c687d354af1ec42045e17da7d
              • Instruction Fuzzy Hash: 32B1E472A08B819AEB20DF21E8403AEB7A0FB85798F544135DB8D97BA5DF3CD548C704

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CountInfoInputLastOpenQueryTickValue_invalid_parameter_noinfo_noreturnwsprintf
              • String ID: %d min$Console$IpDatespecial
              • API String ID: 357503962-2712035571
              • Opcode ID: efa53836958f32f8ab0cb54a8671f626514f8aa22354df529298ed1da135f9ea
              • Instruction ID: ec7e819f6e315e9131b0e0bb1f8b27f06d47b106913e2755febe1def5c8d07a9
              • Opcode Fuzzy Hash: efa53836958f32f8ab0cb54a8671f626514f8aa22354df529298ed1da135f9ea
              • Instruction Fuzzy Hash: 22518C73608E85A9EB608F28EC543A927A4EB84B5DF444131DA4C877AADF3DD589D700

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ControlDevice$ByteCharCloseCreateFileHandleMultiWide$wsprintf
              • String ID: \\.\HCD%d
              • API String ID: 2324936672-2696249065
              • Opcode ID: b16b9414ff4f5bba01ca19ea586cfc01d35dadd3bdcc9ae74a2dc0319bdc3a1e
              • Instruction ID: 7eefc96bf97f70c2bfc920ebc18b293661cad52b8b76fe08385bf5e83ad14f99
              • Opcode Fuzzy Hash: b16b9414ff4f5bba01ca19ea586cfc01d35dadd3bdcc9ae74a2dc0319bdc3a1e
              • Instruction Fuzzy Hash: 90517032708781A6EF60EB11B44076AB7A4FB86798F540135EA8E87B95EF3DD009DB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Gdip$Image$BitmapCreateDisposeEncodersFrom$SaveScan0SizeStream
              • String ID: &
              • API String ID: 370471037-3042966939
              • Opcode ID: 4526caf998ada3252c84406b8f766584f007c4df05e28e230d859843c7169577
              • Instruction ID: a8493eaa6e406e62b1298360c2ddb4f922e36b24daa4a478115c8acc66e7ea3d
              • Opcode Fuzzy Hash: 4526caf998ada3252c84406b8f766584f007c4df05e28e230d859843c7169577
              • Instruction Fuzzy Hash: E4517432A08B42A6EF109F65A8005B867A1FF44B9CF444275DE1D97B99DF3CE94AE340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Close$OpenQueryValuelstrcmp
              • String ID:
              • API String ID: 4288439342-0
              • Opcode ID: 898e3f92dd09ced9f59f1214a1bb77de0c366a7caab65dc6ea004482ae0e6425
              • Instruction ID: 2ba5577ab9fe3bf44d1b6b7f786e4d8f50de183173082aa5a54c3deb83e5cc2f
              • Opcode Fuzzy Hash: 898e3f92dd09ced9f59f1214a1bb77de0c366a7caab65dc6ea004482ae0e6425
              • Instruction Fuzzy Hash: 7F31863161CB8192EF608F25E8886AA73A4FB94B98F504231DA5D83BE9DF3DD44DD700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$CreateFactory
              • String ID: %s%s %d %d $%s%s %d*%d
              • API String ID: 2331002265-1924168580
              • Opcode ID: 8fa00d72778a232c14932e728595a13cc51c5fe8bf1a07966f1b6ffb0567861c
              • Instruction ID: f6393d09e81775d848955bb4efbe4f22115b9fbe049d8fa18804c7b383eb8bfa
              • Opcode Fuzzy Hash: 8fa00d72778a232c14932e728595a13cc51c5fe8bf1a07966f1b6ffb0567861c
              • Instruction Fuzzy Hash: D9A19E36B08B859AEB10CF65D4442EE7761FB88B98F540622EE9D97B98DF3CD485C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
              • String ID:
              • API String ID: 2067211477-0
              • Opcode ID: bf8243345e757f2f55ee74e3b164a4444cec9f217b6620c703edaf3e446c73ac
              • Instruction ID: 217136ae9f1b2e4cec008d2a7140a93512fe7aa834701afeab1cfec6e2aee95b
              • Opcode Fuzzy Hash: bf8243345e757f2f55ee74e3b164a4444cec9f217b6620c703edaf3e446c73ac
              • Instruction Fuzzy Hash: 69218335A09741E7EE14DF56A40017AA7A0EF88BD8F184931DE4D83B95DF3CE4089611
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CurrentThreadsend
              • String ID:
              • API String ID: 302076607-0
              • Opcode ID: 8fc84bb4e0a68a1d65a8e1ac48c208ce2ab72bf0ff2939eb6e9be73f1c549aff
              • Instruction ID: e152825703a486443d4e4ae489d9dbb65eba95aa67761ef3663b426109e00804
              • Opcode Fuzzy Hash: 8fc84bb4e0a68a1d65a8e1ac48c208ce2ab72bf0ff2939eb6e9be73f1c549aff
              • Instruction Fuzzy Hash: 3251C132A08B46A7EB149F29E14436AB7B0FB84B8CF048035DB4D87B55EF38E45A9344
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ByteCharMultiWide$ControlDefaultDeviceLangSystemlstrcpy
              • String ID:
              • API String ID: 3058672631-0
              • Opcode ID: 93d17b8bbf808d0062489be832d1c2fe809a10c804b5f1e4639794739b5737c4
              • Instruction ID: dbe1f435ceb26488b4e5507dddb5daf36e8d500d0b32923537bbe17e80c06b00
              • Opcode Fuzzy Hash: 93d17b8bbf808d0062489be832d1c2fe809a10c804b5f1e4639794739b5737c4
              • Instruction Fuzzy Hash: E831C53160CB82A5EF20DB11E4443AAA3A1EB9AB94F544135FA9D87B85DF3DD408DB00
              APIs
                • Part of subcall function 00007FF6308861E0: InitializeCriticalSectionEx.KERNEL32 ref: 00007FF630886231
                • Part of subcall function 00007FF6308861E0: GetLastError.KERNEL32 ref: 00007FF63088623B
              • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF63088C7D4), ref: 00007FF63088C9DA
              • GdiplusStartup.GDIPLUS ref: 00007FF63088CA0F
              • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF63088C7D4), ref: 00007FF63088CA27
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CriticalSection$EnterErrorGdiplusInitializeLastLeaveStartup
              • String ID:
              • API String ID: 2723390537-0
              • Opcode ID: 65629aaaa719a2e99d15e3f5434e13b9281ffa3b8c64cff51ac5a9778f412de6
              • Instruction ID: 6d383069ea8ce0edc9016b7699fd252dfcb96ae56220bafd52f86be619c53f3f
              • Opcode Fuzzy Hash: 65629aaaa719a2e99d15e3f5434e13b9281ffa3b8c64cff51ac5a9778f412de6
              • Instruction Fuzzy Hash: CD019E32A08B84D6EB008F15F44436AB7E1F784B49F481025EA8E83759CF3CD099DB40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: SleepTimetime
              • String ID:
              • API String ID: 346578373-0
              • Opcode ID: 2becff6657bc7d5012ec94526cf32972d5272bc21be79492e35a94961d449a59
              • Instruction ID: fe20e4dc4751cd2037ceaebe25d14413b21824c200685b0b208aa78739e3dac3
              • Opcode Fuzzy Hash: 2becff6657bc7d5012ec94526cf32972d5272bc21be79492e35a94961d449a59
              • Instruction Fuzzy Hash: DA018022B1864197EB644B64E18833D27A0F744789F441234C75E87BD4CF3CD4E9C704
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ErrorExitLastThread
              • String ID:
              • API String ID: 1611280651-0
              • Opcode ID: 86e50ef011b0631a2311c12b12e79fa44030a146f353d628d3291aff0b0405bd
              • Instruction ID: 1c0c2300ba7279cd180e5233b88025eb7a1233aa6c100c0a1694c2c215578c05
              • Opcode Fuzzy Hash: 86e50ef011b0631a2311c12b12e79fa44030a146f353d628d3291aff0b0405bd
              • Instruction Fuzzy Hash: 22F09021F1A642A2FF14ABB4845517D22A0EF58B48F540434D90AD77E2EE3CA8499310
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Concurrency::cancel_current_task
              • String ID:
              • API String ID: 118556049-0
              • Opcode ID: a47e5a6ac0625703f2fd5b566550f71a2f7208a7861a0071670bc6a0f9e7358f
              • Instruction ID: ed53f3c1e910a8ad78f54b72c6a9c4327b2a0bd0b38eabdc502bf9e6243b673a
              • Opcode Fuzzy Hash: a47e5a6ac0625703f2fd5b566550f71a2f7208a7861a0071670bc6a0f9e7358f
              • Instruction Fuzzy Hash: D5E0B660E1A20B75FD6971B6281607810400F6977CE281B30E97E887C3AD3CB49DA118
              APIs
              • RtlFreeHeap.NTDLL(?,?,?,00007FF6308B65C2,?,?,?,00007FF6308B693F,?,?,00000000,00007FF6308B6D85,?,?,?,00007FF6308B6CB7), ref: 00007FF6308AE6D2
              • GetLastError.KERNEL32(?,?,?,00007FF6308B65C2,?,?,?,00007FF6308B693F,?,?,00000000,00007FF6308B6D85,?,?,?,00007FF6308B6CB7), ref: 00007FF6308AE6DC
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ErrorFreeHeapLast
              • String ID:
              • API String ID: 485612231-0
              • Opcode ID: a27750d6ae148c980c7c980f65ba2d3e2e52c6c92a9735542c6e0cceef461146
              • Instruction ID: 4920f2a9e4ce816044f7e0d169b285c32605866e1899ec69669a8536c23a96b5
              • Opcode Fuzzy Hash: a27750d6ae148c980c7c980f65ba2d3e2e52c6c92a9735542c6e0cceef461146
              • Instruction Fuzzy Hash: EAE0C210F18213A3FF186BF658551782250AFA4708F504C34D80DC37E2EE7C784CA724
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Virtual$AllocFree
              • String ID:
              • API String ID: 2087232378-0
              • Opcode ID: 616965ea612f33b462fe03c73724eb49c1abe59c321f00a6c33259c6d796c58f
              • Instruction ID: bac2148856622795530066515599f49a1a47dbb03f818c6323a96e5977a0ebf0
              • Opcode Fuzzy Hash: 616965ea612f33b462fe03c73724eb49c1abe59c321f00a6c33259c6d796c58f
              • Instruction Fuzzy Hash: DF21A731B18A4596DB24DF2EF44012AB7B5FB84B84B144134EB9ED3B18EF3CE4859704
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Virtual$AllocFree
              • String ID:
              • API String ID: 2087232378-0
              • Opcode ID: 0d2589c5e0cc1a94e4b3bf8f4f54a9d1287f00ffced7c8db5b8a82110618710c
              • Instruction ID: 054de24c8a9617eeba69259a9af6b3932c7a951a81366942070e47f392b2b0ac
              • Opcode Fuzzy Hash: 0d2589c5e0cc1a94e4b3bf8f4f54a9d1287f00ffced7c8db5b8a82110618710c
              • Instruction Fuzzy Hash: 5E110831B28A4182DF15CF3AA440129A3A5FF98FC8B144135E94ED3748EF3CD885CB40
              APIs
                • Part of subcall function 00007FF63089DC60: __scrt_dllmain_crt_thread_attach.LIBCMT ref: 00007FF63089DC74
              • __scrt_release_startup_lock.LIBCMT ref: 00007FF63089E057
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: __scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
              • String ID:
              • API String ID: 2217363868-0
              • Opcode ID: cbc0649b0607904615e0344cdc653858b0dfbbed05089a03dbfd93f3e9e99ab1
              • Instruction ID: cd526f254e890b145609c0a7c76fca2ca66d97ca4400f6daad08317bd336105b
              • Opcode Fuzzy Hash: cbc0649b0607904615e0344cdc653858b0dfbbed05089a03dbfd93f3e9e99ab1
              • Instruction Fuzzy Hash: F5316821A0C643A2FE10BB24D4127B92B91AF4178CF944035EA0DC77D7DE7DA80DA200
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Startup
              • String ID:
              • API String ID: 724789610-0
              • Opcode ID: 27a40b9f3cf52b959e37d45274ab80e386b8a2eb9336faf4e796e06ae50c97e7
              • Instruction ID: 33d2b4384ab4cbbc9896b40e8b047fdc53367c1e4c89d89322dcac4a7efca616
              • Opcode Fuzzy Hash: 27a40b9f3cf52b959e37d45274ab80e386b8a2eb9336faf4e796e06ae50c97e7
              • Instruction Fuzzy Hash: 21E08636B09A45EAEB11EF24D4550B47364FB5D308F444171E58D83756DE3CD559DF00
              APIs
              • HeapAlloc.KERNEL32(?,?,?,00007FF6308B252D,?,?,00000000,00007FF6308AA3FB,?,?,?,00007FF6308AC5D3,?,?,?,00007FF6308AC4C9), ref: 00007FF6308AEE0E
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: AllocHeap
              • String ID:
              • API String ID: 4292702814-0
              • Opcode ID: c5d91307553507d7a0b65c4578cb45837d9ca66b83f15ba5a6112bdae37f71ee
              • Instruction ID: f63fe5c0f272dd0abd4c00f07233f4f362b71fce356c67b111c604cfa08dd12a
              • Opcode Fuzzy Hash: c5d91307553507d7a0b65c4578cb45837d9ca66b83f15ba5a6112bdae37f71ee
              • Instruction Fuzzy Hash: 41F08C00F09247A2FEA467A6584137512805F947A8F280E34DC2EC6BC2EE3CB4A86114
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Process$Virtual$AddressLibraryLoadProcProtect$AllocCreateCurrentMemoryOpenThreadTokenWrite$AdjustDirectoryFileLookupModuleNamePrivilegePrivilegesRemoteResumeSleepSystemValue
              • String ID: %s%s$@$ExitProcess$Kernel32.dll$OpenProcess$SeDebugPrivilege$WaitForSingleObject$WinExec$Windows\System32\svchost.exe$h
              • API String ID: 3040193174-4212407401
              • Opcode ID: 0c2d203bb3590072b2790da5483ee898493f9f682a060de060c9115ce93124ea
              • Instruction ID: b154c42c606d0ce0dc27f420a0bf37cb80049f264a175d7766c953e0dbbd2e34
              • Opcode Fuzzy Hash: 0c2d203bb3590072b2790da5483ee898493f9f682a060de060c9115ce93124ea
              • Instruction Fuzzy Hash: 3DA17C32B14B82A5EB219F65E8143E973A4FB48B8CF040135DA4D97B65DF3CD24AD700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: lstrlen$wsprintf$ClipboardFileGlobal$CloseCountTickWindow$CreateDataForegroundHandleLocalLockMutexObjectOpenPointerReleaseSingleSizeSleepStateTextTimeUnlockWaitWrite
              • String ID: [$[$%s%s$%s%s$%s%s$[esc]
              • API String ID: 3669393114-972647286
              • Opcode ID: e6ab48ff98ca9ddfa9a13a1758a8a9b1ffd3d9cd46131382e05cf3f4eced504b
              • Instruction ID: dfcd89a7f8056d0808a4ead75e4240b386e66e4c5433872b7bfef44550904fee
              • Opcode Fuzzy Hash: e6ab48ff98ca9ddfa9a13a1758a8a9b1ffd3d9cd46131382e05cf3f4eced504b
              • Instruction Fuzzy Hash: 25D19E25A08A42A6FF50DB69E8542BA73A1FF9574CF404236D95EC27A1EF3CE54CE700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: lstrlen$CreateEventLocalTimewsprintf
              • String ID: %4d.%2d.%2d-%2d:%2d:%2d$o1:$p1:$t1:
              • API String ID: 2157945651-1225219777
              • Opcode ID: 4ab38958384f3d8ae6ea9e35e84b41bd479a6b61bb859707b2bd8aeb0401d26c
              • Instruction ID: ca62b8e31cf93f066e7d41510a827be5d84cfc05091e805bb1b259abfe0b36b8
              • Opcode Fuzzy Hash: 4ab38958384f3d8ae6ea9e35e84b41bd479a6b61bb859707b2bd8aeb0401d26c
              • Instruction Fuzzy Hash: 51F1E263B18792A6EF249F25E8407BD23A0FB44B9CF404231DA4E97B95DF3CA589D700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: AddressProc$Library$FileFree$CloseCreateHandleLoadSleepWrite
              • String ID: InternetCloseHandle$InternetOpenUrlW$InternetOpenW$InternetReadFile$MSIE 6.0$wininet.dll
              • API String ID: 2977986460-1099148085
              • Opcode ID: b869be42eea26ef83cf2f127258845e1be2102d2018284c86f6782853b1c64bb
              • Instruction ID: 70eda4d6569f7f40c6c3495367ad5e3fbd38650b25e380625a025f65f0b4f7b2
              • Opcode Fuzzy Hash: b869be42eea26ef83cf2f127258845e1be2102d2018284c86f6782853b1c64bb
              • Instruction Fuzzy Hash: 4941D725A09A43A2EF60DB55B9107BA67A0FF89B98F484230DE9E43754EF3CD14DDB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Lockitstd::_$Clipboard$GlobalLockit::_$Lockit::~_$Close_invalid_parameter_noinfo_noreturn$DataLockOpenUnlock$AllocEmptySetgloballocaleSleeplstrlenstd::locale::_
              • String ID:
              • API String ID: 1851032462-0
              • Opcode ID: 57475f5eeade9a15ba90b0c6b2e4b195fe2ff05ea7ed50c1724f462bec61f548
              • Instruction ID: b06e8cc0f9578ad0953b5ad01adda14411276d20a56b87d135e5d39eb85b16cb
              • Opcode Fuzzy Hash: 57475f5eeade9a15ba90b0c6b2e4b195fe2ff05ea7ed50c1724f462bec61f548
              • Instruction Fuzzy Hash: AFD1B462B09B82A6EF10AF69E4442BD6361FF84B98F144135EA5D87BD9DF3CE448D700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Thread$ContextProcess$AllocCreateDirectoryMemoryResumeSystemVirtualWrite
              • String ID: %s %s$%s%s$7e604a66-3b67-4656-8552-1184595e4a9f$@$Windows\System32\svchost.exe$h$nlyloadinmyself$plugmark
              • API String ID: 4033188109-2199735986
              • Opcode ID: 046c22b18b6f5ac0ccc3cac11c7471c69f57d2820ce8935287c8eeb1aafb36af
              • Instruction ID: 1c4d44e9fe071c6d36bc04233baf66d64cfd53a6600843cb0e51ebe31774ebf4
              • Opcode Fuzzy Hash: 046c22b18b6f5ac0ccc3cac11c7471c69f57d2820ce8935287c8eeb1aafb36af
              • Instruction Fuzzy Hash: EF129362B18B82A2EB20CF25D4442BD77A1FB95B48F448136DB4D87B96DF3CE589D700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue$ExitWindows
              • String ID: SeShutdownPrivilege
              • API String ID: 1423298842-3733053543
              • Opcode ID: 207f020c3be7a49f4dae7fd528dd377aaad196edefdcd6a65a6542525f0315a2
              • Instruction ID: 6abb6223bbaf2ba200e3caa0cbf16b0564778ca23fbe37439f61f6638762189b
              • Opcode Fuzzy Hash: 207f020c3be7a49f4dae7fd528dd377aaad196edefdcd6a65a6542525f0315a2
              • Instruction Fuzzy Hash: 45311C35A08E82A5EB209F65E8143AA6370FF84B5AF004035DA4E92B65CF3DD58EE700
              APIs
              • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF63088D242), ref: 00007FF63089A5E5
              • GetNativeSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF63088D242), ref: 00007FF63089A66A
              • VirtualAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF63088D242), ref: 00007FF63089A6BF
              • VirtualAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF63088D242), ref: 00007FF63089A6DE
              • VirtualAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF63088D242), ref: 00007FF63089A741
              • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF63088D242), ref: 00007FF63089A762
              • HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF63088D242), ref: 00007FF63089A776
              • VirtualFree.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF63088D242), ref: 00007FF63089A793
              • VirtualFree.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF63088D242), ref: 00007FF63089A7AF
              • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF63088D242), ref: 00007FF63089A7CC
              • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF63088D242), ref: 00007FF63089AAB2
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Virtual$Alloc$ErrorLast$FreeHeap$InfoNativeProcessSystem
              • String ID:
              • API String ID: 1282860858-0
              • Opcode ID: 88d7adfe9b312bdb6fdf674f549a5cc549a824bf45d913ac83d4f697423f226a
              • Instruction ID: 26e40e6f67f14a4688a5f5f0ac909bab97ac81884b25ab15ae78e5b5d44294b3
              • Opcode Fuzzy Hash: 88d7adfe9b312bdb6fdf674f549a5cc549a824bf45d913ac83d4f697423f226a
              • Instruction Fuzzy Hash: AFD19232B19652A6EF60AF56E4507B977A4FF48B88F054035CA4E87B80EE3CE449E340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue$ExitWindows
              • String ID: SeShutdownPrivilege
              • API String ID: 1423298842-3733053543
              • Opcode ID: eb7aa2d56a82b613c27039d286a92213749df77ba304c44aa2638bc2cb38e150
              • Instruction ID: 8ce838e329512b71ff1e4cd238a4566fe206f8b117620dde0e890b1291916ff5
              • Opcode Fuzzy Hash: eb7aa2d56a82b613c27039d286a92213749df77ba304c44aa2638bc2cb38e150
              • Instruction Fuzzy Hash: CC310C35A08E8295EB209F69EC143AA6371FF84B5AF504035DA4D93B69DF3DD18EDB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue$ExitWindows
              • String ID: SeShutdownPrivilege
              • API String ID: 1423298842-3733053543
              • Opcode ID: 2905a319caa5e6a93b8be62912fe952188e187deaf7a97c308075b004fe8cd81
              • Instruction ID: 8bf231630bcc2e64b21cc7c831539b059b624aa1f0ad0fc902ee296126c74af6
              • Opcode Fuzzy Hash: 2905a319caa5e6a93b8be62912fe952188e187deaf7a97c308075b004fe8cd81
              • Instruction Fuzzy Hash: 5D310C35A08E8295EB209F69EC143AA6370FF84B5AF004035DA4D93B65DF3DD18EDB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
              • API String ID: 808467561-2761157908
              • Opcode ID: 622423286a591ad007cfa081ef015de5a4a39bf13039204cb660433145fa8b31
              • Instruction ID: 4c3ec364a9188457ec36eab0ace4959c5c29410b12d3873c5c05b912bffec750
              • Opcode Fuzzy Hash: 622423286a591ad007cfa081ef015de5a4a39bf13039204cb660433145fa8b31
              • Instruction Fuzzy Hash: C1B2DE72E182929BEB648E68D4407FD37A1FB5438CF505535DA0E97B88DF38EA09DB40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Create$Event$CountCriticalInitializeSectionSpin$Heap$ProcessTimetime
              • String ID: <$<
              • API String ID: 2446585644-213342407
              • Opcode ID: b1ad8ba58de1e0846612e2a068909c756507ce6fc06109a86d1a20cc9e8294d7
              • Instruction ID: ff8ae65c57040db5d22b649a6fd9e3a6063831b334fd6b7c64da6e3c735fa403
              • Opcode Fuzzy Hash: b1ad8ba58de1e0846612e2a068909c756507ce6fc06109a86d1a20cc9e8294d7
              • Instruction Fuzzy Hash: 62B15B72605B819AEB44DF79E8843A933A9FB44B0CF58413CCB5C4B799DF38A068D718
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Close$OpenQueryValuelstrcpy
              • String ID: %08X
              • API String ID: 2032971926-3773563069
              • Opcode ID: 5daa38b5fec1510e7cc40f4dc4df9c16a8fb62c5527b438061e7080e78411b39
              • Instruction ID: 7940b6f3d278f238920e748dbca71f1d94cfdd4305118306d6903157f0e041ca
              • Opcode Fuzzy Hash: 5daa38b5fec1510e7cc40f4dc4df9c16a8fb62c5527b438061e7080e78411b39
              • Instruction Fuzzy Hash: 3E515E6260CA81A5EB70DB25E8443ABB3A0FB85758F904135D78DC3BA9DF3CD549DB04
              APIs
                • Part of subcall function 00007FF6308AEA70: GetLastError.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEA7F
                • Part of subcall function 00007FF6308AEA70: FlsGetValue.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEA94
                • Part of subcall function 00007FF6308AEA70: SetLastError.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEB1F
              • TranslateName.LIBCMT ref: 00007FF6308B7746
              • TranslateName.LIBCMT ref: 00007FF6308B7781
              • GetACP.KERNEL32(?,?,?,00000000,00000092,00007FF6308AD4D8), ref: 00007FF6308B77C8
              • IsValidCodePage.KERNEL32(?,?,?,00000000,00000092,00007FF6308AD4D8), ref: 00007FF6308B7800
              • GetLocaleInfoW.KERNEL32 ref: 00007FF6308B79BD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ErrorLastNameTranslate$CodeInfoLocalePageValidValue
              • String ID: utf8
              • API String ID: 3069159798-905460609
              • Opcode ID: 8c099eda83a5c1324d953c8da46f7dcfc7382bd5fb40a4303c146f7c8692acb4
              • Instruction ID: acb99498da6fb3ba8c4ddf7ab1fc83aae817955eb7471faacad16e72d406c6cb
              • Opcode Fuzzy Hash: 8c099eda83a5c1324d953c8da46f7dcfc7382bd5fb40a4303c146f7c8692acb4
              • Instruction Fuzzy Hash: 6691BE32A08742A1EF24AF21D4416BA27A4FF44B88F444531DA5DD7BD6DF3CEA59E340
              APIs
                • Part of subcall function 00007FF6308AEA70: GetLastError.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEA7F
                • Part of subcall function 00007FF6308AEA70: FlsGetValue.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEA94
                • Part of subcall function 00007FF6308AEA70: SetLastError.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEB1F
                • Part of subcall function 00007FF6308AEA70: FlsSetValue.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEAB5
              • GetUserDefaultLCID.KERNEL32(00000000,00000092,?,?), ref: 00007FF6308B8294
                • Part of subcall function 00007FF6308AEA70: FlsSetValue.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEAE2
                • Part of subcall function 00007FF6308AEA70: FlsSetValue.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEAF3
                • Part of subcall function 00007FF6308AEA70: FlsSetValue.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEB04
              • EnumSystemLocalesW.KERNEL32(00000000,00000092,?,?,00000000,?,?,00007FF6308AD4D1), ref: 00007FF6308B827B
              • ProcessCodePage.LIBCMT ref: 00007FF6308B82BE
              • IsValidCodePage.KERNEL32 ref: 00007FF6308B82D0
              • IsValidLocale.KERNEL32 ref: 00007FF6308B82E6
              • GetLocaleInfoW.KERNEL32 ref: 00007FF6308B8342
              • GetLocaleInfoW.KERNEL32 ref: 00007FF6308B835E
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Value$Locale$CodeErrorInfoLastPageValid$DefaultEnumLocalesProcessSystemUser
              • String ID:
              • API String ID: 2591520935-0
              • Opcode ID: f1a69095846091a71a20ee3ef6c788d879191f60c9ca7d1b933c088628ba7f76
              • Instruction ID: 7751e56d529aef43da5d53fd1db0c442b4c512e639a7f90ab9a8afbb5c85bf32
              • Opcode Fuzzy Hash: f1a69095846091a71a20ee3ef6c788d879191f60c9ca7d1b933c088628ba7f76
              • Instruction Fuzzy Hash: 64714832B19A12AAFF519B64D8506BD33A0FF48B48F484935CA1D93795EF3CE449E350
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
              • String ID:
              • API String ID: 3140674995-0
              • Opcode ID: 18c7dfee12948f11b2b1ef149d65aa3e1b9c7e2d1ea7ed06afb51cbb3a88d299
              • Instruction ID: 4b615b8de047511eb48da11f66674ca7ac3fc19d4c4df39b6e2ae84b55226fce
              • Opcode Fuzzy Hash: 18c7dfee12948f11b2b1ef149d65aa3e1b9c7e2d1ea7ed06afb51cbb3a88d299
              • Instruction Fuzzy Hash: 84313E72609B819AEB609FA0E8907ED7364FB84748F44403ADB4E87B95EF38D54CC714
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Event$ClearCloseOpen
              • String ID: Application$Security$System
              • API String ID: 1391105993-2169399579
              • Opcode ID: 2cf3709b3cb76df16a2a92579992847c2f846cbe0948eda6c13293e34c808135
              • Instruction ID: 8ef0e5c01c98212ea4dbc9edc5f39e0e3d14d64b79f1926b51bd8a15614b7937
              • Opcode Fuzzy Hash: 2cf3709b3cb76df16a2a92579992847c2f846cbe0948eda6c13293e34c808135
              • Instruction Fuzzy Hash: 2DF0FF36E4DF4291EE15DB19F84026AA3A4FF897A9F040136C94E83765EE3CD49AA700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
              • String ID:
              • API String ID: 1239891234-0
              • Opcode ID: e6fb25ffa18b66ffda036dc74a26e2becfae59b68bb230e1827b5a608bc93c87
              • Instruction ID: bebb7fa6f8b9da13d49bbb6f1269a224941c01abad2e6a04c32d053194b3f5e6
              • Opcode Fuzzy Hash: e6fb25ffa18b66ffda036dc74a26e2becfae59b68bb230e1827b5a608bc93c87
              • Instruction Fuzzy Hash: 50315032618F81A6DB60CF65E8503AE73A4FB89758F540136EA9D83B95EF3CD549CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: FileFindFirst_invalid_parameter_noinfo
              • String ID:
              • API String ID: 2227656907-0
              • Opcode ID: 116a84698524b3bcd43aaaa4f2cca2c7c536e0f4c45a8280c933762a24cf8a5b
              • Instruction ID: 1c37c5fc460e03eb4d2bfa47cb6193138502e87eb0eabbe57d8be4242e87f869
              • Opcode Fuzzy Hash: 116a84698524b3bcd43aaaa4f2cca2c7c536e0f4c45a8280c933762a24cf8a5b
              • Instruction Fuzzy Hash: CCB1E622F1869261EE609B65E8012B973A0EF54BE8F546131EE5D87FC5DF7CE449E300
              APIs
              Strings
              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF63089C78F
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: DebugDebuggerErrorLastOutputPresentString
              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
              • API String ID: 389471666-631824599
              • Opcode ID: efbf15865cd5c1087f73e292c5c5f3e8b2dd5a504a7ddbe30f15df4fd023cf7f
              • Instruction ID: 741ae5996d1a9346f62314b44b7aac59d1e022cea61f24226a5a69c6016cc820
              • Opcode Fuzzy Hash: efbf15865cd5c1087f73e292c5c5f3e8b2dd5a504a7ddbe30f15df4fd023cf7f
              • Instruction Fuzzy Hash: 49113A32A14B42B7EB449B66E6543B933A4FF48749F404135CA4D82B51EF7DE0689710
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: memcpy_s
              • String ID:
              • API String ID: 1502251526-0
              • Opcode ID: a3a34dc7f104a5757306e0e4006adbba08ef9a00a3e13a0073f806107d450ba3
              • Instruction ID: 9053f5398606b4c966a74e7a19961b28a0c268d92fca12426b1b133044a152e9
              • Opcode Fuzzy Hash: a3a34dc7f104a5757306e0e4006adbba08ef9a00a3e13a0073f806107d450ba3
              • Instruction Fuzzy Hash: 41C11872B296C597EB24CF19A04467AB791FB98B88F548134DB4E83B85DF3DE805DB00
              APIs
                • Part of subcall function 00007FF6308AEA70: GetLastError.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEA7F
                • Part of subcall function 00007FF6308AEA70: FlsGetValue.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEA94
                • Part of subcall function 00007FF6308AEA70: SetLastError.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEB1F
                • Part of subcall function 00007FF6308AEA70: FlsSetValue.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEAB5
              • GetLocaleInfoW.KERNEL32 ref: 00007FF6308B7C0C
                • Part of subcall function 00007FF6308B3D2C: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6308B3D49
              • GetLocaleInfoW.KERNEL32 ref: 00007FF6308B7C55
                • Part of subcall function 00007FF6308B3D2C: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6308B3DA2
              • GetLocaleInfoW.KERNEL32 ref: 00007FF6308B7D1D
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: InfoLocale$ErrorLastValue_invalid_parameter_noinfo
              • String ID:
              • API String ID: 1791019856-0
              • Opcode ID: 605c002cd1232363f8b97f7bb09a672fc6956a026fdc72186da3fd3d1de90a13
              • Instruction ID: 659694e2180394933971903c3d79464ecff77d9d8eb2528c6c01fa17a74cccac
              • Opcode Fuzzy Hash: 605c002cd1232363f8b97f7bb09a672fc6956a026fdc72186da3fd3d1de90a13
              • Instruction Fuzzy Hash: 22618F32A08642AAEF748F21D4902BA77A1FB84788F448139CB9ED7795DE3CE559D700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: InfoLocale
              • String ID: GetLocaleInfoEx
              • API String ID: 2299586839-2904428671
              • Opcode ID: 053289818baea42516c59c341b95a57cf593464f2c81e046735848086310e6c4
              • Instruction ID: dc12a710892ec8e04ab7c0a7cf2f953df3b6b54e7cf069ce133678b8e4ffe6d7
              • Opcode Fuzzy Hash: 053289818baea42516c59c341b95a57cf593464f2c81e046735848086310e6c4
              • Instruction Fuzzy Hash: 4801A720B08B41A6FF049B56B4401A6A760EF84BD4F584135DE4E87BA6CE3CD5499740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ExceptionRaise_clrfp
              • String ID:
              • API String ID: 15204871-0
              • Opcode ID: d1d57c0b9bdf7be1867346d5e9c7cf9c26021b93baf768b42c1e913034eff148
              • Instruction ID: afa259f6d433f409528e3c2778d30e147d26b0f5d8a30eb8cc912f23ea866070
              • Opcode Fuzzy Hash: d1d57c0b9bdf7be1867346d5e9c7cf9c26021b93baf768b42c1e913034eff148
              • Instruction Fuzzy Hash: D9B16A73A04B898BEB15CF29C8463687BA0F784B4CF188922DBAD837A4CF79D455C704
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID:
              • String ID: $
              • API String ID: 0-227171996
              • Opcode ID: f4d1caadcdf6a988165dfb6027386ea397a00727bebf28c93510380ffb834353
              • Instruction ID: 9234acbe72efe80a018afb9eabe38dd922140ff06b60be628927c6a927a0c6ac
              • Opcode Fuzzy Hash: f4d1caadcdf6a988165dfb6027386ea397a00727bebf28c93510380ffb834353
              • Instruction Fuzzy Hash: EEE18332A0964696EF688E29885013E37A0FF49B4CF345135DA4E87BD4DF39E859F740
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID:
              • String ID: e+000$gfff
              • API String ID: 0-3030954782
              • Opcode ID: 7a480f9cb63785b231e93cdb4053ba6ead140b4a31814c2e6dd1f53a1ff5a9d1
              • Instruction ID: 54180a075c59e2852c2103811227ad48b75d8c1c5ce1980a43768424447ea123
              • Opcode Fuzzy Hash: 7a480f9cb63785b231e93cdb4053ba6ead140b4a31814c2e6dd1f53a1ff5a9d1
              • Instruction Fuzzy Hash: ED518A22F182C596EB208E759801769BB91EB44B98F58D231CBAC87FC6CF3DD049D700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Info
              • String ID:
              • API String ID: 1807457897-0
              • Opcode ID: 7f0259b4a75c2d79dd05197e9e3c50a83c61ba8df8d38db5a1941d1f165b01d3
              • Instruction ID: 6c661084a329f822ac4000826275472af6fce2647be765a7f7c2cb217d64e440
              • Opcode Fuzzy Hash: 7f0259b4a75c2d79dd05197e9e3c50a83c61ba8df8d38db5a1941d1f165b01d3
              • Instruction Fuzzy Hash: C4128122A08BD196EB51CF2895443FD73A4FB68748F159235EB9C82B92DF39E189D700
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a2a91221a961958e25f62bfb1168308d288fd5f56a1465658bce0cb830e97a7a
              • Instruction ID: f62d0dc926d27262c5c694d5fd1769d95e2eae257fff50ddf71c5b4cb9723b13
              • Opcode Fuzzy Hash: a2a91221a961958e25f62bfb1168308d288fd5f56a1465658bce0cb830e97a7a
              • Instruction Fuzzy Hash: 67E17132A08B8196EB20DB61E4502EE77A4FB54788F404635DF9D93B96EF3CE249D344
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID:
              • String ID: [RO] %ld bytes
              • API String ID: 0-772938740
              • Opcode ID: 2a2e8e66bac2129e6156a5cab3092c46a0c869edfc0550a0c0319ad8eb13d815
              • Instruction ID: afccbfe8a67da4a692f168b9ee1de162efe5fb294069e0ea6b504fc4c2cba5ec
              • Opcode Fuzzy Hash: 2a2e8e66bac2129e6156a5cab3092c46a0c869edfc0550a0c0319ad8eb13d815
              • Instruction Fuzzy Hash: 9542BF336093C5DFC729CF28E44026E7BA0F765B48F448129DB8A87B46DB38E959CB51
              APIs
                • Part of subcall function 00007FF6308AEA70: GetLastError.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEA7F
                • Part of subcall function 00007FF6308AEA70: FlsGetValue.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEA94
                • Part of subcall function 00007FF6308AEA70: SetLastError.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEB1F
                • Part of subcall function 00007FF6308AEA70: FlsSetValue.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEAB5
              • GetLocaleInfoW.KERNEL32 ref: 00007FF6308B7E50
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ErrorLastValue$InfoLocale
              • String ID:
              • API String ID: 673564084-0
              • Opcode ID: b88317f099404d3c0d10a5a24cf9ae58312b9b643a33a099b411d16474a7bbc4
              • Instruction ID: ad222d38061df67771c56a2dbb3a42676028755565eaecba72474cb1bae4b44f
              • Opcode Fuzzy Hash: b88317f099404d3c0d10a5a24cf9ae58312b9b643a33a099b411d16474a7bbc4
              • Instruction Fuzzy Hash: 01318E32A0878296EF648B25E4413AA73A1FF48B88F448535EA4DC7796DF3CE8499700
              APIs
                • Part of subcall function 00007FF6308AEA70: GetLastError.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEA7F
                • Part of subcall function 00007FF6308AEA70: FlsGetValue.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEA94
                • Part of subcall function 00007FF6308AEA70: SetLastError.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEB1F
              • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF6308B8227,00000000,00000092,?,?,00000000,?,?,00007FF6308AD4D1), ref: 00007FF6308B7AD6
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ErrorLast$EnumLocalesSystemValue
              • String ID:
              • API String ID: 3029459697-0
              • Opcode ID: ddf0bcd54fee30cee3c2fa2f3cf32a3156214357c3b61558b17e74e9ba4e1d34
              • Instruction ID: c62d519b90819df5fc00b1960611a20b23d5017d43ac61d2a49050ef960bd662
              • Opcode Fuzzy Hash: ddf0bcd54fee30cee3c2fa2f3cf32a3156214357c3b61558b17e74e9ba4e1d34
              • Instruction Fuzzy Hash: 5B11E167E087459AEF548F25D0806AD7BA1FB90FE8F549135C62A833C0DE38E6D9D740
              APIs
                • Part of subcall function 00007FF6308AEA70: GetLastError.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEA7F
                • Part of subcall function 00007FF6308AEA70: FlsGetValue.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEA94
                • Part of subcall function 00007FF6308AEA70: SetLastError.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEB1F
              • GetLocaleInfoW.KERNEL32(?,?,?,00007FF6308B7D9A), ref: 00007FF6308B8027
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ErrorLast$InfoLocaleValue
              • String ID:
              • API String ID: 3796814847-0
              • Opcode ID: 4756a55a6f6df2e1738916ac1a71c6225747ce609875c26223506d2cfc4742c0
              • Instruction ID: 104aba5ea4aace31bc385e71a560965f49170c5769f4a7af9f57ce4d6672193e
              • Opcode Fuzzy Hash: 4756a55a6f6df2e1738916ac1a71c6225747ce609875c26223506d2cfc4742c0
              • Instruction Fuzzy Hash: 22112732F18952D3EB64A625A04067A62A1EB507E8F144A31D66E837C5DE3AD88EE700
              APIs
                • Part of subcall function 00007FF6308AEA70: GetLastError.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEA7F
                • Part of subcall function 00007FF6308AEA70: FlsGetValue.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEA94
                • Part of subcall function 00007FF6308AEA70: SetLastError.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEB1F
              • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF6308B81E3,00000000,00000092,?,?,00000000,?,?,00007FF6308AD4D1), ref: 00007FF6308B7B86
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ErrorLast$EnumLocalesSystemValue
              • String ID:
              • API String ID: 3029459697-0
              • Opcode ID: bc703af400f14b42b20c9fcb5047461b7f50c903457c8d4997ca4285d83e45ea
              • Instruction ID: 04794323d95053258593ac23d5ef4a31ab8797f502749bb1450adee2e8ebcf6d
              • Opcode Fuzzy Hash: bc703af400f14b42b20c9fcb5047461b7f50c903457c8d4997ca4285d83e45ea
              • Instruction Fuzzy Hash: D601B572F0C38556EF104F15E4407BA76A2EF50BB8F559231D629873C4DF789489AB00
              APIs
              • EnumSystemLocalesW.KERNEL32(?,?,00000000,00007FF6308B0CDF,?,?,?,?,?,?,?,?,00000000,00007FF6308B7088), ref: 00007FF6308B0887
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: EnumLocalesSystem
              • String ID:
              • API String ID: 2099609381-0
              • Opcode ID: 0da49028f00012ccddbac4aa6a8129618cfbebd136c027dc8325545b3ece71c8
              • Instruction ID: b4303b003cf92a966e9efda9b0cdfbf879eed8ca8ce68d36b12ddf0c155cc73d
              • Opcode Fuzzy Hash: 0da49028f00012ccddbac4aa6a8129618cfbebd136c027dc8325545b3ece71c8
              • Instruction Fuzzy Hash: 17F08C72B08B4193EB00DB59E8902A93362EF88B84F548136DA4DC37A5CF3CD899D740
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID:
              • String ID: gfffffff
              • API String ID: 0-1523873471
              • Opcode ID: 172941b2f1d4039ba21c6dc8853c143536a16ca8654b5df5f12dde2487208479
              • Instruction ID: 95fe053da8953418978a2959e6f815cb4a0fe8691092e5d7091bd2152b859842
              • Opcode Fuzzy Hash: 172941b2f1d4039ba21c6dc8853c143536a16ca8654b5df5f12dde2487208479
              • Instruction Fuzzy Hash: F0A14662B0978696EF21CF6AA0407AE7791AF54B88F248131DE8D87BC2DE3DD509D701
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID: 0-3916222277
              • Opcode ID: 6871d27396c91e0bed272bc22aae0ea20e11987830d478801ef476eeb5b70fb8
              • Instruction ID: ab7292ee1c23840c9fdeb2d09410166c1c248b5c42f3006608c023b9b0be79ef
              • Opcode Fuzzy Hash: 6871d27396c91e0bed272bc22aae0ea20e11987830d478801ef476eeb5b70fb8
              • Instruction Fuzzy Hash: 0FB18C72A0869596EF648F39C05423C3BA4EB49B4CF384235CA4E87BD9CF39D469E744
              APIs
              • GetLastError.KERNEL32 ref: 00007FF6308B27E9
                • Part of subcall function 00007FF6308B0788: HeapAlloc.KERNEL32(?,?,00000000,00007FF6308AEC4A,?,?,0000114ED97129F6,00007FF6308A8B05,?,?,?,?,00007FF6308B2546,?,?,00000000), ref: 00007FF6308B07DD
                • Part of subcall function 00007FF6308AE6BC: RtlFreeHeap.NTDLL(?,?,?,00007FF6308B65C2,?,?,?,00007FF6308B693F,?,?,00000000,00007FF6308B6D85,?,?,?,00007FF6308B6CB7), ref: 00007FF6308AE6D2
                • Part of subcall function 00007FF6308AE6BC: GetLastError.KERNEL32(?,?,?,00007FF6308B65C2,?,?,?,00007FF6308B693F,?,?,00000000,00007FF6308B6D85,?,?,?,00007FF6308B6CB7), ref: 00007FF6308AE6DC
                • Part of subcall function 00007FF6308B9FAC: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6308B9FDF
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ErrorHeapLast$AllocFree_invalid_parameter_noinfo
              • String ID:
              • API String ID: 916656526-0
              • Opcode ID: c069c10827176b9df77e9eacd146a24f3ebe0e1c557e8cf5116eb7accc2f9201
              • Instruction ID: 54a64324fd153329d456fa458f7ee1177175fbdfdeb14aba40ad9177defcc609
              • Opcode Fuzzy Hash: c069c10827176b9df77e9eacd146a24f3ebe0e1c557e8cf5116eb7accc2f9201
              • Instruction Fuzzy Hash: D641F321F0D24361FE705A2668117BAA680FF957C8F544539EE8DCBBC6EE3CE409A740
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f9d3e26cd520c0d7484bca21c75386a0081201fe8f2cf936fcf25e5b7a4aa551
              • Instruction ID: 6eaab0d200a2720ef0257cfc42710b5469d2d695536d98b8edda293361fb8c78
              • Opcode Fuzzy Hash: f9d3e26cd520c0d7484bca21c75386a0081201fe8f2cf936fcf25e5b7a4aa551
              • Instruction Fuzzy Hash: BC22CEB7B3805047D36DCB1DEC52FA97692B7A5308748A02CFA07C3F45EA3DEA458A44
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2dbab6f601d912f7832fe87e6cb8010b159b99cec89eaaed4f22644e13967388
              • Instruction ID: c6cf87e3b90bd6b20f70d09ddc9ee3f709aa0aa7b75c9d9fe3e6122b2ad5b026
              • Opcode Fuzzy Hash: 2dbab6f601d912f7832fe87e6cb8010b159b99cec89eaaed4f22644e13967388
              • Instruction Fuzzy Hash: 5CC11373B0869197EB49CF26D95057AB792FBC4BE8B55C134DA4A47B88DE3CD805CB00
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4fe8ec01f60584a1ee149ae2a08fff37cdae008ac808ef4f9df4273de0df04db
              • Instruction ID: dff3723d2c9c53bb029c998ed91dd1c34883df0a161dfda69d8a97ce16c09bed
              • Opcode Fuzzy Hash: 4fe8ec01f60584a1ee149ae2a08fff37cdae008ac808ef4f9df4273de0df04db
              • Instruction Fuzzy Hash: 2ED1B322A08A42A5EF688E25985027F37A0EB45B4CF344235DE4D87FD5DF39E859F740
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ErrorLastNameTranslate$CodePageValidValue_invalid_parameter_noinfo
              • String ID:
              • API String ID: 4023145424-0
              • Opcode ID: 8a64524f1fb9e6959651956f91e34aa30073aa11383fd560e196b95c26644943
              • Instruction ID: bc3d4ab0df8c799ce5602ad943280bffd6e99bd63c862b59b496f6c7ee60cf2c
              • Opcode Fuzzy Hash: 8a64524f1fb9e6959651956f91e34aa30073aa11383fd560e196b95c26644943
              • Instruction Fuzzy Hash: 65C1C266A08782A5EF649B6198103BA37A0FB9478CF604035DE9EC7BD5EF3CE549D700
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ErrorLast$Value_invalid_parameter_noinfo
              • String ID:
              • API String ID: 1500699246-0
              • Opcode ID: 40463cb8fd89e5f38144c8e404f20e2a32259e43623898d7ad92a87b920fc9c4
              • Instruction ID: 749024beedff7869680452ec516f37c0568ed7779f451ca50e9180b85938dd22
              • Opcode Fuzzy Hash: 40463cb8fd89e5f38144c8e404f20e2a32259e43623898d7ad92a87b920fc9c4
              • Instruction Fuzzy Hash: 1CB1FF22A08746A2EF649F21D4116BB33A0EB84B8CF544231EE5AC37C9DF7CE549A740
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4fe3a20954eaf19cca18b720aca6cea66dcaf64d55a17c7986fbc43ae61592d0
              • Instruction ID: 715c47326f3b486d080901dfef2a120cced249a9e9c1ad35593b17339f2546f9
              • Opcode Fuzzy Hash: 4fe3a20954eaf19cca18b720aca6cea66dcaf64d55a17c7986fbc43ae61592d0
              • Instruction Fuzzy Hash: 9AB16A72909A8596EF648F29C05027C3BA0EB49F4CF385139CA4E87BD9CF39D469E744
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo
              • String ID:
              • API String ID: 3215553584-0
              • Opcode ID: 7c967eb539ab6c81368948c69a9b6320c10fa2f7b73efbe3c4b6df7895ae468e
              • Instruction ID: fe6914360543cf15c9c33134cf1469338f59bf548009860e752b7d3ce301ce58
              • Opcode Fuzzy Hash: 7c967eb539ab6c81368948c69a9b6320c10fa2f7b73efbe3c4b6df7895ae468e
              • Instruction Fuzzy Hash: 19818C72A04A51A6EF648E29D4813B92360FB84B9CF244A36EE5ED7FC5DF3CD4599300
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: aa2f4ae56baf169408e60df2444458542a3c73068db43e6345bf2ec4a63d4b14
              • Instruction ID: 7de33f9327c5bb1975cef6086251f5966c5089f32ef14f26c0ac6cc70f5fdcf8
              • Opcode Fuzzy Hash: aa2f4ae56baf169408e60df2444458542a3c73068db43e6345bf2ec4a63d4b14
              • Instruction Fuzzy Hash: D881D272A087815AEB74CF59944036A7A91FF86798F244235EA8D87FDADF3CD4089B00
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f6f6a1a1a1cf9baf0de81f1e4df80e775a01d7d2970379cd065fadcfc056c7f6
              • Instruction ID: 8e6e0fb072db24d4a128f1a6e46b10bea0efbec1640e7d4cc35918420ebcf76a
              • Opcode Fuzzy Hash: f6f6a1a1a1cf9baf0de81f1e4df80e775a01d7d2970379cd065fadcfc056c7f6
              • Instruction Fuzzy Hash: E6610662B18B8992DF209F19E4412B9A370FB99784F549231EF9C97B94EF3DE184C340
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
              • Instruction ID: bbd1b7e74ca56173cef511c273a0e9a269394e82a0bd899bc7c376dc1a8a5eb8
              • Opcode Fuzzy Hash: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
              • Instruction Fuzzy Hash: 2D517172A1AA5196EF248B29C05422833B1EB49B6CF345131DE4D97BD4DF3AE8C7D740
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
              • Instruction ID: b06606ab5a3d8e579cb8c82dfd006f6a1648dd8506e437ba9c3863aeb9efd128
              • Opcode Fuzzy Hash: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
              • Instruction Fuzzy Hash: 62518436A19A5196EF248B29C04023833B0EB85B5CF345131DA4D97FD4CF7AE897D780
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
              • Instruction ID: 589098adb778f59d7aa41d59498d83306ec48a7e93c598a293484eb9a8df76f6
              • Opcode Fuzzy Hash: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
              • Instruction Fuzzy Hash: 38515F76A19A51D6EB248B29D05422937B0EB44B6CF388131CE4D97BD4CF3AE88BD740
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f6a3dccb135ddd09f63c505db29ff29986bf9dd63497299e7c799fac6b959aa4
              • Instruction ID: cc34c6376fa511846bce752f905e27eba256465774938729da402c572ca4221b
              • Opcode Fuzzy Hash: f6a3dccb135ddd09f63c505db29ff29986bf9dd63497299e7c799fac6b959aa4
              • Instruction Fuzzy Hash: 4E519032A1A65196EF248B29D04033837B0EB59B5CF745131CE4D97BD4DF3AE98AE780
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: db363646d287334b7a31293e9082935613ba5dde14aee32d187fc7345eaa1eeb
              • Instruction ID: 3c7d7f9e8c6c07034bad70600709acf08cf6ef452f21d78477f509295e9a85b4
              • Opcode Fuzzy Hash: db363646d287334b7a31293e9082935613ba5dde14aee32d187fc7345eaa1eeb
              • Instruction Fuzzy Hash: CA517F36A1865196EF248B29C04023837A0EB95F6CF346131CE4D97FD4DF7AE85AD780
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e46230d8c0bb23a9b26f12389beaf27d8e9063d4bba2e4d98de2a57eaa924be5
              • Instruction ID: a097721c2c27600ff3287c2ef541f43323d0ec14b8747ff08336d08927fc99ef
              • Opcode Fuzzy Hash: e46230d8c0bb23a9b26f12389beaf27d8e9063d4bba2e4d98de2a57eaa924be5
              • Instruction Fuzzy Hash: 9F51B136A1AA5196EB248B29C04023937B1EB54F5CF744131CE4D97BE5CF3AE88AD740
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ErrorFreeHeapLast
              • String ID:
              • API String ID: 485612231-0
              • Opcode ID: 4d1d88932efd7b63ecfdde29945dfc17fd218d95b7e0763bafd054a92f058063
              • Instruction ID: c269363f6d6d23aa8ce68c14ca68443fcab0fc79ee59a6e5dd41526233acd9c5
              • Opcode Fuzzy Hash: 4d1d88932efd7b63ecfdde29945dfc17fd218d95b7e0763bafd054a92f058063
              • Instruction Fuzzy Hash: 2C41F172B14A5492EF04CF2AD9242A973A1BB48FD8B59A037EE0DD7B98DE3CD4459340
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8325bb8896eb9c8ae2d46c5932a003c3c7f8bfc008283704c68a5069cd28ac66
              • Instruction ID: 769bcd93eab44ae713936e3ce8c70169194a45e83a4663b89c5bfdc87bb2d8bc
              • Opcode Fuzzy Hash: 8325bb8896eb9c8ae2d46c5932a003c3c7f8bfc008283704c68a5069cd28ac66
              • Instruction Fuzzy Hash: DFF068717182559ADF94AF28A442A2977D5FB08384F40853AE58DC3B04DF3C94659F04
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 174bfe62ffdb35f0a8b82215b8c446e4258c47945d5cfe3425f7157a53489505
              • Instruction ID: 67b4ca929ab9bf6f59e711d6bb9db30a6535b929c1541ed6218098df17d16ab4
              • Opcode Fuzzy Hash: 174bfe62ffdb35f0a8b82215b8c446e4258c47945d5cfe3425f7157a53489505
              • Instruction Fuzzy Hash: EDA0026190CC06F0EE049B84E9555307770FF54309F410031D11EC1361AF3CB508E302
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Event$Message$Reset$CloseCriticalErrorLastPeekSectionThread$CurrentDispatchEnterHandleLeaveMultipleObjectsSwitchTranslateWaitclosesocketsendshutdown
              • String ID:
              • API String ID: 4058177064-0
              • Opcode ID: 1d5cc57fb7fbf7527f04433d1c2939eb4b1b6e6938b0e21f75a258dbfa576023
              • Instruction ID: 958f78fff81257451a2f19864cc3081adca657945ada2c332cc046ec19ea7421
              • Opcode Fuzzy Hash: 1d5cc57fb7fbf7527f04433d1c2939eb4b1b6e6938b0e21f75a258dbfa576023
              • Instruction Fuzzy Hash: 6F917D73B08A82A7EB689F25D9446A973A5FB44758F005535CB6DC3B91CF3CE4A8E700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: lstrcatlstrlen$CreateEnvironmentExpandProcessStringslstrcpywsprintf
              • String ID: "%1$%s\shell\open\command$WinSta0\Default$h
              • API String ID: 1783372451-551013563
              • Opcode ID: 2aa4d3ebf5c45bd74505c1267e1058c2c24ed9b570e41b1434e0a24903c1c98a
              • Instruction ID: 525060c9ca2fef2889906e0e76538aa42a5a5fb10dc6113e51b6b5eb3cfdd02d
              • Opcode Fuzzy Hash: 2aa4d3ebf5c45bd74505c1267e1058c2c24ed9b570e41b1434e0a24903c1c98a
              • Instruction Fuzzy Hash: A8615122E18B42A9FF20EB64D8502FD6361FB8974CF444135DA4D96B99EF3CD548DB40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ByteCharEventMultiWidelstrlensetsockopt$CreateErrorIoctlLastSelectconnectgethostbynamehtonssocket
              • String ID:
              • API String ID: 1455939504-0
              • Opcode ID: 6f0a85a34c6bb75636ccf932ec56d1350418621ff62b1755ad958c4a4e8ec29f
              • Instruction ID: 6cfa6eb2bb3932efbacd58d0b6ffbe8bcad6d1ad5830e64f1ff6ee68cc7e3e4a
              • Opcode Fuzzy Hash: 6f0a85a34c6bb75636ccf932ec56d1350418621ff62b1755ad958c4a4e8ec29f
              • Instruction Fuzzy Hash: 45518432608B9196EB20DF65F84026A77A5FB84BA8F100235EE9D87F99CF3CD549D704
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
              • String ID:
              • API String ID: 2081738530-0
              • Opcode ID: 86a4ff4925cbc545ad5961b211c5cb2ede80d6a6447645a52bcc9b3ede11fd42
              • Instruction ID: 987481f817598c8cfe3706ca044c2a0026f463cf6933540acab0ae3e217cbb5b
              • Opcode Fuzzy Hash: 86a4ff4925cbc545ad5961b211c5cb2ede80d6a6447645a52bcc9b3ede11fd42
              • Instruction Fuzzy Hash: A2518436A0CA42A5EE15EB19E44417973A1FF54B98F580232DA5E837A5DF3CE44AE700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ErrorLast$EventTimetime$EnumEventsNetworkResetSelectsend
              • String ID:
              • API String ID: 957247320-3916222277
              • Opcode ID: 70faab5df619376ecbd789658116d1a95d03484d4b81b7d6c2cb32eb3eab3399
              • Instruction ID: af942291e8e6e5e23817381e9505e30831133ee3139cc9cc789c856380f88a4d
              • Opcode Fuzzy Hash: 70faab5df619376ecbd789658116d1a95d03484d4b81b7d6c2cb32eb3eab3399
              • Instruction Fuzzy Hash: DB715B72A08682ABEB608F69D58436977E0FB44B4CF145035CB4DC3B95DF7DE849AB40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CriticalSection$EnterErrorLastLeave
              • String ID:
              • API String ID: 4082018349-0
              • Opcode ID: ce0fa88aebe3efe6d4cfa5056a018ff2338e1d011f624170396f62e2d62db8ee
              • Instruction ID: f7a4d3c7cc8822be8ea4ff05e7eb8f64053a8860068fd25f4ce02691d64be6ee
              • Opcode Fuzzy Hash: ce0fa88aebe3efe6d4cfa5056a018ff2338e1d011f624170396f62e2d62db8ee
              • Instruction Fuzzy Hash: AE619F32B09A42A2EF689B25D55467E73A6FB84B88F804035CA1EC7791DF3CE559E700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CriticalSection$EnterErrorLastLeave
              • String ID:
              • API String ID: 4082018349-0
              • Opcode ID: b12bcef403b9db2977f705d0ecef41abbd2038a6eeb512479f31e0cb207d576e
              • Instruction ID: 72da00aa1c931fa89d694e431d784a528d4271140d2669bc1d262ca646eb6411
              • Opcode Fuzzy Hash: b12bcef403b9db2977f705d0ecef41abbd2038a6eeb512479f31e0cb207d576e
              • Instruction Fuzzy Hash: 36315F25B0DA42A2EF989B59998C27A7365FF44B89F140034DA5EC6792CF3CE84DE704
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CloseValue$CreateDeleteOpenlstrlen
              • String ID: Software$VenNetwork
              • API String ID: 3197061591-1820303132
              • Opcode ID: 977d34d6a8543d540e474d7a41a606a027e4303f67bb5f64f5b8d5885a1a35b1
              • Instruction ID: cabef6bf9386efb4d6b515bf6bf9b46cd3b1eb866d8e7c61743b48115304253b
              • Opcode Fuzzy Hash: 977d34d6a8543d540e474d7a41a606a027e4303f67bb5f64f5b8d5885a1a35b1
              • Instruction Fuzzy Hash: E0215136618A8096EB10DB66F84435AB361FB88BE9F444131DE4D83B6ADF7CD14EDB04
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CriticalErrorLastSection$EnterLeave
              • String ID:
              • API String ID: 2124651672-0
              • Opcode ID: 1e7b01e8061498853063041e14b47fd2e59aeeeabd15da1d9f1fa77a953021b1
              • Instruction ID: b4d5bab7e98bf831311fdf332d789a9508daab4d494634b43848ee38b0d2e25e
              • Opcode Fuzzy Hash: 1e7b01e8061498853063041e14b47fd2e59aeeeabd15da1d9f1fa77a953021b1
              • Instruction Fuzzy Hash: 8D51DD36A08A469BEB649F19E44467D77A5FB48B88F054139DE4EC7392DF3CE809D700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo
              • String ID: f$f$p$p$f
              • API String ID: 3215553584-1325933183
              • Opcode ID: 338c2a64cdc3021812c5b6ddca5db7159329e9a17ba8d876efc02d9e71b2fbd5
              • Instruction ID: 07e242f9bb61456ac882ae2e426b0337f068962d4a0f2cbb20d49cf49fac9c4e
              • Opcode Fuzzy Hash: 338c2a64cdc3021812c5b6ddca5db7159329e9a17ba8d876efc02d9e71b2fbd5
              • Instruction Fuzzy Hash: E312A622A0C193A6FF249E14E0447BA7651FBD0758FB85131E68987FC8DF3CE499AB14
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ErrorLast$setsockopt$CreateEventResetTimerWaitable
              • String ID:
              • API String ID: 2911610646-0
              • Opcode ID: 38ec76155e6582f6451855719efb9cc3d848e3c7da57bc883881785bdfc9cc07
              • Instruction ID: 0e76bc9b0a93dc69d893b54188bd8992f56fdcbfae27a69428d43c10e3719027
              • Opcode Fuzzy Hash: 38ec76155e6582f6451855719efb9cc3d848e3c7da57bc883881785bdfc9cc07
              • Instruction Fuzzy Hash: 1C518D72A09A82A7EB148F69E90436E77A0FB48759F100135DB4DC7B91DF7DE06ADB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CriticalSection$Leave$ErrorLastTimetime$EnterEvent
              • String ID:
              • API String ID: 3019579578-0
              • Opcode ID: 0f5c7540d6a6d13954bf3b0610fbdb20e4227d3d9c7ae04a05d2493569245aae
              • Instruction ID: aaca6dd5b41af2b8897e6130bd2f90f583ff068766bdef3825b3acff00d82862
              • Opcode Fuzzy Hash: 0f5c7540d6a6d13954bf3b0610fbdb20e4227d3d9c7ae04a05d2493569245aae
              • Instruction Fuzzy Hash: C6411932A09A42A7EF708B15E94423EB7A1FB94748F144135DB8E83B95DF3CF9899740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CriticalSection$EnterErrorLastLeave
              • String ID:
              • API String ID: 4082018349-0
              • Opcode ID: 67fb679d431cd07a0a75245ad9faae6b58536de87acf8e54a525854fe2ab2b98
              • Instruction ID: f73b573e8c62788ffb07db77ab2e6925a89dd4af9c2aa6794c8ca851a5879e6d
              • Opcode Fuzzy Hash: 67fb679d431cd07a0a75245ad9faae6b58536de87acf8e54a525854fe2ab2b98
              • Instruction Fuzzy Hash: 62313A32A19982AAEB908F68D84827D33A4FF44B4DF441031DA0EC6796DF3CE85DE701
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
              • String ID: csm$csm$csm
              • API String ID: 849930591-393685449
              • Opcode ID: 2b2ef099c7c498c1f83d83cf8365c45f4a2add1e44776cae4b3bb5ec5925f551
              • Instruction ID: 6a65eeb3353b55d76dc8c218a8fb77b8685709b8f60fb173dddf5a2baf10d944
              • Opcode Fuzzy Hash: 2b2ef099c7c498c1f83d83cf8365c45f4a2add1e44776cae4b3bb5ec5925f551
              • Instruction Fuzzy Hash: F3D18132A08B41AAEF209B65D4403AD77A0FB5579CF200135EE8D97BD6DF38E599DB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: AddressFreeLibraryProc
              • String ID: api-ms-$ext-ms-
              • API String ID: 3013587201-537541572
              • Opcode ID: 7440c042807cac739352953deb803b73dd017de38a4217708bea05fa604c5186
              • Instruction ID: 30c3aa0b3a261bcbb1a9a1b45f301dceee2c293eedacfb6aa724dbe0b537c0e9
              • Opcode Fuzzy Hash: 7440c042807cac739352953deb803b73dd017de38a4217708bea05fa604c5186
              • Instruction Fuzzy Hash: 9B412121B1DB02A5FE66CB16A8102762790FF04BA8F185636DD0DD7785EF3CE44DA700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Filelstrcatlstrlenwsprintf$CloseCreateEnvironmentExpandHandleStringsWritelstrcpy
              • String ID: %s %s
              • API String ID: 958574092-2939940506
              • Opcode ID: eceb82c3cd3af4ca55499d5fe9bd5fadc0488819e054981a88d383308b1fa06d
              • Instruction ID: 8a3ad4400b766678df04a288b22fadaa9c3a4a5c5ecb97c7a2e486923b73eb95
              • Opcode Fuzzy Hash: eceb82c3cd3af4ca55499d5fe9bd5fadc0488819e054981a88d383308b1fa06d
              • Instruction Fuzzy Hash: CF413F26A18BC691EB118F28D9042FD2320FBA5B4CF55A325DB4C56762EF39E2D9D700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CriticalSection$EnterLeave$ErrorLastsend
              • String ID:
              • API String ID: 3480985631-0
              • Opcode ID: dcbfb0b2159904ea6d1c624c1834ef820b2325ccb56d393d0a5f1f6bb36a758c
              • Instruction ID: 565f7b5ae502bf4e59be6483d901b7337e2b7b8aaedfa741849f36bef9491392
              • Opcode Fuzzy Hash: dcbfb0b2159904ea6d1c624c1834ef820b2325ccb56d393d0a5f1f6bb36a758c
              • Instruction Fuzzy Hash: 4E417B32608B81A2EB54CF66E5402AC73A4FB08F9CF181135CE1D8BB59DF38E599E704
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo
              • String ID: f$p$p
              • API String ID: 3215553584-1995029353
              • Opcode ID: 42fb3e65d0f17d18353857ebdda260012259b146ac6ef5ada1715a4ca3ec7708
              • Instruction ID: 586a076beb98a548cee642eee75804a05f19a672cef47225950da61957c2c961
              • Opcode Fuzzy Hash: 42fb3e65d0f17d18353857ebdda260012259b146ac6ef5ada1715a4ca3ec7708
              • Instruction Fuzzy Hash: A312A332E0C153A6FF205A15E0542BA7691FB90758FA84036E6DD86FC4DF3CE58AEB14
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CriticalSection$ErrorLast$EnterLeave$CurrentThread$EventsMultipleTimerWaitWaitablesend
              • String ID:
              • API String ID: 2807917265-0
              • Opcode ID: 495490e7d3477735b75ad2edb0a11b0efccf73ea01b4538bcbeaf1220e2ab4c3
              • Instruction ID: f98cae654720ddcc97b33eebb81b30a549fad00afc798eda075b9356eb4b8f6d
              • Opcode Fuzzy Hash: 495490e7d3477735b75ad2edb0a11b0efccf73ea01b4538bcbeaf1220e2ab4c3
              • Instruction Fuzzy Hash: C2516D72A0864296FF60CF25A84027D23A4FB55B5CF146635DE2EC7B95EF38E448A700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: std::_$Lockit$GetctypeGetwctypeLocinfo::_Locinfo_ctorLockit::_Lockit::~_
              • String ID: bad locale name
              • API String ID: 1386471777-1405518554
              • Opcode ID: 1e5e98c9536fad76aa215f10c33411828afcd6fe37bfa1046ea3f08e32c02a87
              • Instruction ID: 84df99b368f95a7dc97753d352fcc0271ade6bacec95b4d990a937f0869b38ec
              • Opcode Fuzzy Hash: 1e5e98c9536fad76aa215f10c33411828afcd6fe37bfa1046ea3f08e32c02a87
              • Instruction Fuzzy Hash: 7E517A22B09B41AAFF14DBB4D4502BC2370EF9575CF444138DE8D66B9ADF38E55AA304
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: std::_$Lockit$GetcollLocinfo::_Locinfo_ctorLockit::_Lockit::~__invalid_parameter_noinfo_noreturn
              • String ID: bad locale name
              • API String ID: 3908275632-1405518554
              • Opcode ID: b631740363b0e831fde9baf712990589db3f9d8b5b5567fa3c7a7b01eb85b2e8
              • Instruction ID: 53b7160f6bcbe1e4cb89b37f692744803803b6120731673aaaf6fc9aeaec9530
              • Opcode Fuzzy Hash: b631740363b0e831fde9baf712990589db3f9d8b5b5567fa3c7a7b01eb85b2e8
              • Instruction Fuzzy Hash: E4515832B09B81A9FF10EBB4D4503AC33A5AF4574CF444135EE4DA7B99DF38A44AA304
              APIs
              • LoadLibraryExW.KERNEL32(?,?,?,00007FF6308A37DE,?,?,?,00007FF6308A34D0,?,?,?,00007FF6308A0109), ref: 00007FF6308A35B1
              • GetLastError.KERNEL32(?,?,?,00007FF6308A37DE,?,?,?,00007FF6308A34D0,?,?,?,00007FF6308A0109), ref: 00007FF6308A35BF
              • LoadLibraryExW.KERNEL32(?,?,?,00007FF6308A37DE,?,?,?,00007FF6308A34D0,?,?,?,00007FF6308A0109), ref: 00007FF6308A35E9
              • FreeLibrary.KERNEL32(?,?,?,00007FF6308A37DE,?,?,?,00007FF6308A34D0,?,?,?,00007FF6308A0109), ref: 00007FF6308A3657
              • GetProcAddress.KERNEL32(?,?,?,00007FF6308A37DE,?,?,?,00007FF6308A34D0,?,?,?,00007FF6308A0109), ref: 00007FF6308A3663
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Library$Load$AddressErrorFreeLastProc
              • String ID: api-ms-
              • API String ID: 2559590344-2084034818
              • Opcode ID: 79f1708f0d73a3895a2fe6d32fc30880b345232a89ca131bb8ab1f3b75cbd6b1
              • Instruction ID: 46c6670847ed427a7268d1f96b7e3485fe5dc187813477a5f8bc01e1f0ec38d8
              • Opcode Fuzzy Hash: 79f1708f0d73a3895a2fe6d32fc30880b345232a89ca131bb8ab1f3b75cbd6b1
              • Instruction Fuzzy Hash: 0831E321B1AB42B1EE61DB56A8001792394FF58BA8F690536ED1DC7BD0FF3CE449A704
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: AttributesCreateErrorFileLastProcesslstrlen
              • String ID: WinSta0\Default$h
              • API String ID: 591566999-1620045033
              • Opcode ID: 9328811ce07eccb9baa46191bf573199de9204eba7fc0589a085695e6e112cb4
              • Instruction ID: f0c4c8b6245abf0e85fbe8e6af31598f2897f04e3e635fcc6103f9d418204b97
              • Opcode Fuzzy Hash: 9328811ce07eccb9baa46191bf573199de9204eba7fc0589a085695e6e112cb4
              • Instruction Fuzzy Hash: 8B316821E0C7C296DA709B15B90137E6391FB95798F405335E69DC7B95EF3CE0989B00
              APIs
              • GetLastError.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEA7F
              • FlsGetValue.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEA94
              • FlsSetValue.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEAB5
              • FlsSetValue.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEAE2
              • FlsSetValue.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEAF3
              • FlsSetValue.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEB04
              • SetLastError.KERNEL32(?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F,?,?,?,00007FF6308A6443), ref: 00007FF6308AEB1F
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Value$ErrorLast
              • String ID:
              • API String ID: 2506987500-0
              • Opcode ID: 0e252fc1aa08c509f0e93816402eca9f1f65028cc0729f634b753678d4cd798a
              • Instruction ID: a3816d1378a779e6eade3531306693b1bcce6b5ba9c2cb99472d347ec06556c3
              • Opcode Fuzzy Hash: 0e252fc1aa08c509f0e93816402eca9f1f65028cc0729f634b753678d4cd798a
              • Instruction Fuzzy Hash: B4218E20F0D61662FE68677155652396242AF547BCF244B35E83EC7FD6EE3CB809A700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
              • String ID: CONOUT$
              • API String ID: 3230265001-3130406586
              • Opcode ID: c477bea2d07ef44c7e07df60decfd2619db83e7f0bc9226f08f6201d8069434b
              • Instruction ID: dae3e1306025555c2bbd5e88875d451ac81552f8fffe179225131ac51855fed7
              • Opcode Fuzzy Hash: c477bea2d07ef44c7e07df60decfd2619db83e7f0bc9226f08f6201d8069434b
              • Instruction Fuzzy Hash: 0B115E21A28B4196EB608B56E854329B7A1FF88FE8F444334EA5DC77A5DF3CD8488744
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: File$CloseCreateHandleMutexObjectPointerReleaseSingleWaitWritelstrlen
              • String ID:
              • API String ID: 4202892810-0
              • Opcode ID: 6d311e261bfe59e5949d3104aa2c883e73ffb96b44e413d4cc9c1204dacd56c9
              • Instruction ID: 10e1ec7292a5e833ded448ef94ca19e02bc38babb009cf275055e9d8f133ea1f
              • Opcode Fuzzy Hash: 6d311e261bfe59e5949d3104aa2c883e73ffb96b44e413d4cc9c1204dacd56c9
              • Instruction Fuzzy Hash: 1C115E71608A4292FB109B55F9087667360EF88BA8F104331DA6E43BE5CF7CD44D9B04
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Value$CloseDeleteOpen
              • String ID: Console$IpDatespecial
              • API String ID: 3183427449-1840232981
              • Opcode ID: f23957102dd5c337703c86b23f0909451c31f6d4053b1f337106711f9d04a52f
              • Instruction ID: d00255f65c0234683ae64de90bfdcacb898f3e5ff410a5fdcf323655a899cfc0
              • Opcode Fuzzy Hash: f23957102dd5c337703c86b23f0909451c31f6d4053b1f337106711f9d04a52f
              • Instruction Fuzzy Hash: AE015E36608EC196EB219F24EC107697760FB84B69F044122CA4D8376ADF3CD59EDB04
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Process$CommandCreateExitFileInfoLineModuleNameStartup
              • String ID:
              • API String ID: 3421218197-3916222277
              • Opcode ID: 190dd20226834de6593c2658ef490eeec5e65b5d977b517c4b94419b13326a92
              • Instruction ID: 4a1b183193142fa248da66712170958143c79f83fa95a146291d49f531956f94
              • Opcode Fuzzy Hash: 190dd20226834de6593c2658ef490eeec5e65b5d977b517c4b94419b13326a92
              • Instruction Fuzzy Hash: 94F03132618A82D6DB608F68F84875FB7A4FB88758F500235E68E87B64DF3CC149CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ErrorLast$recv
              • String ID:
              • API String ID: 316788870-0
              • Opcode ID: 4d768c99772465553fa61935876ff201d4a32ce5a3f2b2de379ff66690b2a509
              • Instruction ID: b843a943d9e30b935987fd4b9dbfe5187db3f50264e3352fb10daf83f44b5696
              • Opcode Fuzzy Hash: 4d768c99772465553fa61935876ff201d4a32ce5a3f2b2de379ff66690b2a509
              • Instruction Fuzzy Hash: 06318E36A0864292EF648F78E48437D27A1FB84B4CF541536CA0DC77A9EF3DD888A705
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
              • String ID: csm$csm$csm
              • API String ID: 3523768491-393685449
              • Opcode ID: 89a7cbb458af1ec799ed0823309e47d85c371afd6e512bd69dcc86c67ccd7e4c
              • Instruction ID: e4966d85a4d34b158702932af8c41c90b9741cf8863420c6c3e0b60274d300f6
              • Opcode Fuzzy Hash: 89a7cbb458af1ec799ed0823309e47d85c371afd6e512bd69dcc86c67ccd7e4c
              • Instruction Fuzzy Hash: 98E19173D086829AEF60DF69D4803AD37A0FB4574CF244135DA8D87B96DE38E589D740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: EventReset$Thread$CurrentErrorLastObjectSingleSwitchTimeWait_invalid_parameter_noinfotime
              • String ID:
              • API String ID: 2235205178-0
              • Opcode ID: dd32348ce441aaf97619a2f265975deae253349b76a9a1e61c24f21497cea129
              • Instruction ID: fe3b47a8907ae19e42bcfbe4aeab13f44394fb4a60a631859083c921bb93b1f3
              • Opcode Fuzzy Hash: dd32348ce441aaf97619a2f265975deae253349b76a9a1e61c24f21497cea129
              • Instruction Fuzzy Hash: 15218932A08A8292EB50CF25E8402AE73A4FB88F98F184131DE4DC7769CF38D489D754
              APIs
              • GetLastError.KERNEL32(?,?,0000114ED97129F6,00007FF6308A8B05,?,?,?,?,00007FF6308B2546,?,?,00000000,00007FF6308AA3FB,?,?,?), ref: 00007FF6308AEBF7
              • FlsSetValue.KERNEL32(?,?,0000114ED97129F6,00007FF6308A8B05,?,?,?,?,00007FF6308B2546,?,?,00000000,00007FF6308AA3FB,?,?,?), ref: 00007FF6308AEC2D
              • FlsSetValue.KERNEL32(?,?,0000114ED97129F6,00007FF6308A8B05,?,?,?,?,00007FF6308B2546,?,?,00000000,00007FF6308AA3FB,?,?,?), ref: 00007FF6308AEC5A
              • FlsSetValue.KERNEL32(?,?,0000114ED97129F6,00007FF6308A8B05,?,?,?,?,00007FF6308B2546,?,?,00000000,00007FF6308AA3FB,?,?,?), ref: 00007FF6308AEC6B
              • FlsSetValue.KERNEL32(?,?,0000114ED97129F6,00007FF6308A8B05,?,?,?,?,00007FF6308B2546,?,?,00000000,00007FF6308AA3FB,?,?,?), ref: 00007FF6308AEC7C
              • SetLastError.KERNEL32(?,?,0000114ED97129F6,00007FF6308A8B05,?,?,?,?,00007FF6308B2546,?,?,00000000,00007FF6308AA3FB,?,?,?), ref: 00007FF6308AEC97
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Value$ErrorLast
              • String ID:
              • API String ID: 2506987500-0
              • Opcode ID: c7396dbfbcb47cfb6cfc33ed0fb29296ace80fe16ba5d506c85f3ecfa09c6d8f
              • Instruction ID: 8436e3e2dd5f870af231c068c9d636a438cf5fbb3966151a9d06dfd84988bdff
              • Opcode Fuzzy Hash: c7396dbfbcb47cfb6cfc33ed0fb29296ace80fe16ba5d506c85f3ecfa09c6d8f
              • Instruction Fuzzy Hash: 00116D20F1D64262FE546B75566123966429F447B8F240B34D83EC6BD6EE3CB409B600
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: AddressFreeHandleLibraryModuleProc
              • String ID: CorExitProcess$mscoree.dll
              • API String ID: 4061214504-1276376045
              • Opcode ID: 4e200ac4912f663bf200d97a0492af6b570e41165da9f834e6f0b0fe5145a0ad
              • Instruction ID: 34c75cf3e1cedd87cedebba6ce3c65c9cebd077d777b06262c42c3fbc28e5154
              • Opcode Fuzzy Hash: 4e200ac4912f663bf200d97a0492af6b570e41165da9f834e6f0b0fe5145a0ad
              • Instruction Fuzzy Hash: 0EF06D61A29B02A1EE248B68E4847796320EF89779F540335CA6E857F5DF3CD08DE300
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CloseDeleteOpenValue
              • String ID: Console$IpDatespecial
              • API String ID: 849931509-1840232981
              • Opcode ID: 6e7d2c7a670a32b5de56c4a84771261a6cdbf4bc2880aa7204407435697e958c
              • Instruction ID: edf2c12495504d17a5066bdf6c39f70a5cc504aa12ac7121d9175709a3fff953
              • Opcode Fuzzy Hash: 6e7d2c7a670a32b5de56c4a84771261a6cdbf4bc2880aa7204407435697e958c
              • Instruction Fuzzy Hash: ABF0F936A08DC195EB208B28EC107A96360EB8476AF000231C90D97769DE39E59E9B04
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: AdjustPointer
              • String ID:
              • API String ID: 1740715915-0
              • Opcode ID: f957c6767cf5b81622e8ff6fae34e0b794288dc4cc0809d74a0a7b197e878a35
              • Instruction ID: 6fbbe7dc39f09e21f43da29ffc73606cad57808ec0e7a36154dcb6e441c26987
              • Opcode Fuzzy Hash: f957c6767cf5b81622e8ff6fae34e0b794288dc4cc0809d74a0a7b197e878a35
              • Instruction Fuzzy Hash: 2CB1E322E0AB42A1FEA59F1194402396790EF94BCCF288435DE4D87FD6DE3CE459AF40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: _set_statfp
              • String ID:
              • API String ID: 1156100317-0
              • Opcode ID: 3a9c703ea5aaac55ee3dcba71a43574e980d604707a0521e319b1fc91c9c8b59
              • Instruction ID: e9eaf26cd002d3d1fa495b156891cacaaf462f2c0889d7d878214d5ebf3c225f
              • Opcode Fuzzy Hash: 3a9c703ea5aaac55ee3dcba71a43574e980d604707a0521e319b1fc91c9c8b59
              • Instruction Fuzzy Hash: B2119E22E98A5321FFE8116CE4423791141EF55378E090635EA7EC67DAAF7CAC49660C
              APIs
              • FlsGetValue.KERNEL32(?,?,?,00007FF6308A39FB,?,?,00000000,00007FF6308A3C96,?,?,?,?,?,00007FF6308A3C22), ref: 00007FF6308AECCF
              • FlsSetValue.KERNEL32(?,?,?,00007FF6308A39FB,?,?,00000000,00007FF6308A3C96,?,?,?,?,?,00007FF6308A3C22), ref: 00007FF6308AECEE
              • FlsSetValue.KERNEL32(?,?,?,00007FF6308A39FB,?,?,00000000,00007FF6308A3C96,?,?,?,?,?,00007FF6308A3C22), ref: 00007FF6308AED16
              • FlsSetValue.KERNEL32(?,?,?,00007FF6308A39FB,?,?,00000000,00007FF6308A3C96,?,?,?,?,?,00007FF6308A3C22), ref: 00007FF6308AED27
              • FlsSetValue.KERNEL32(?,?,?,00007FF6308A39FB,?,?,00000000,00007FF6308A3C96,?,?,?,?,?,00007FF6308A3C22), ref: 00007FF6308AED38
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Value
              • String ID:
              • API String ID: 3702945584-0
              • Opcode ID: 8e80255def71e26e38969c6b9ad95fb919b46607e2d80395ee43e046c775e245
              • Instruction ID: efc2c28b658555c8847354ba5ff74fc198688cb803811b06c2cc3f95867a99a0
              • Opcode Fuzzy Hash: 8e80255def71e26e38969c6b9ad95fb919b46607e2d80395ee43e046c775e245
              • Instruction Fuzzy Hash: 96119820F0D60661FE98672595612796241AF447BCF385B35E87DC6BE6EE3CF409B600
              APIs
              • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F), ref: 00007FF6308AEB55
              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F), ref: 00007FF6308AEB74
              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F), ref: 00007FF6308AEB9C
              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F), ref: 00007FF6308AEBAD
              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF6308B6E73,?,?,?,00007FF6308AF1A4,?,?,?,00007FF6308A819F), ref: 00007FF6308AEBBE
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Value
              • String ID:
              • API String ID: 3702945584-0
              • Opcode ID: be4a96ff5b18d49a05f4adbf766956ae433ebef540c65d26a29db4b7139a2023
              • Instruction ID: 63230e1dcbe7bb57363e2fec072b9502794e6175575868ee1fd1e681da42d57b
              • Opcode Fuzzy Hash: be4a96ff5b18d49a05f4adbf766956ae433ebef540c65d26a29db4b7139a2023
              • Instruction Fuzzy Hash: 8F11FA50E0D20771FEA86661547527922418F5537CF280F39E93EDABD2ED3CB40AB610
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CriticalSection$EnterLeave
              • String ID:
              • API String ID: 3168844106-0
              • Opcode ID: ec8515e0b6118a22be018e0c36bf8043355ac570717b599eb6440d7a0495df03
              • Instruction ID: e1eae79562a1f60a1700ceaac44f24df45eb6d3fb33453cf5449bcceeb837393
              • Opcode Fuzzy Hash: ec8515e0b6118a22be018e0c36bf8043355ac570717b599eb6440d7a0495df03
              • Instruction Fuzzy Hash: 5011FE32A2898193EF909B69F4943AA73A0FB44749F445031DB8F82B56DF3CE48AD704
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CriticalSection$Enter$DeleteGdiplusLeaveObjectShutdown
              • String ID:
              • API String ID: 1513102227-0
              • Opcode ID: cdd56314798a8dc9bb9b375cd871b4762f9b413abb23fcd634828e7dcd198d12
              • Instruction ID: a75f794400437fcb576d7479556e5a28b831e651048c178096683c3fee6902a4
              • Opcode Fuzzy Hash: cdd56314798a8dc9bb9b375cd871b4762f9b413abb23fcd634828e7dcd198d12
              • Instruction Fuzzy Hash: 9A113632905B52D1EF108F69E88406973B4FB48FACB284236D69D827A6DF3CD95BD344
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CloseHandleObjectSingleThreadWait$CurrentErrorLastSleepSwitch
              • String ID:
              • API String ID: 1535946027-0
              • Opcode ID: 6bee8a0a4dea1eafbbaf25a2cc800b23e58b43f259c7b6e2f946ecae76c8c5a2
              • Instruction ID: 6c946a265d20cc547e359826c794b465da67b1802724e5dddc1420872811ccc1
              • Opcode Fuzzy Hash: 6bee8a0a4dea1eafbbaf25a2cc800b23e58b43f259c7b6e2f946ecae76c8c5a2
              • Instruction Fuzzy Hash: 4DF01D36A04A4596EF049F65EC541793321EB89F69F184230DE2EC73A5DF3CD889D364
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CallEncodePointerTranslator
              • String ID: MOC$RCC
              • API String ID: 3544855599-2084237596
              • Opcode ID: a53d2363c14758023286afc4a6ab41b9c25c1dd74b553e4400a7d45858c9584b
              • Instruction ID: 34d5e0b583d89f3f9e0b23fc9d12c9acef9a9fc9076be3653c1122b2d186d3cc
              • Opcode Fuzzy Hash: a53d2363c14758023286afc4a6ab41b9c25c1dd74b553e4400a7d45858c9584b
              • Instruction Fuzzy Hash: 1A91B273A087919AEF50DF68D4402AD7BA0FB4478CF24413AEA4D97B95DF38D199DB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
              • String ID: csm
              • API String ID: 2395640692-1018135373
              • Opcode ID: 97e6136df740a7f50eb7a5892aa497e90dc07242db7e08e9cb4e882c62b2f360
              • Instruction ID: 27588f2a15217e2220f34598f39e1e7dc0dee626e193939832ce8f67aa0141d4
              • Opcode Fuzzy Hash: 97e6136df740a7f50eb7a5892aa497e90dc07242db7e08e9cb4e882c62b2f360
              • Instruction Fuzzy Hash: 7C51C132B19612AADF18EF15E454A787391EB44B9CF108131EE4E8778ADF7CE849E700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
              • String ID: csm$csm
              • API String ID: 3896166516-3733052814
              • Opcode ID: 1c7f32590a0a5e31803e0cd6c6efa8edac5466215bfbb7b2d07330e269dc0479
              • Instruction ID: 501911b20d0730c1d3850b3af0a8e71d7fa43283d8644c4c41b46654f61a9e53
              • Opcode Fuzzy Hash: 1c7f32590a0a5e31803e0cd6c6efa8edac5466215bfbb7b2d07330e269dc0479
              • Instruction Fuzzy Hash: EF515E32A08282AAEF748F1A954437877A0EB54B9CF244135DA9D87FD5CF3CE469DB01
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CallEncodePointerTranslator
              • String ID: MOC$RCC
              • API String ID: 3544855599-2084237596
              • Opcode ID: b953805b3f16366bb71475c1063139944ec3feeea47b818f87e78a0e56bad00b
              • Instruction ID: c923c687a9dc3651e666e6cba108359e98c68b5411e19f146cf3c3eae068389b
              • Opcode Fuzzy Hash: b953805b3f16366bb71475c1063139944ec3feeea47b818f87e78a0e56bad00b
              • Instruction Fuzzy Hash: 4F61C532908BC591DF619F19E4407AAB7A0FB95B88F144235EB9C83B95DF7CE198CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: FileWrite$ConsoleErrorLastOutput
              • String ID:
              • API String ID: 2718003287-0
              • Opcode ID: 77dd5d4aa20de0d79966c3f830593b01910af74af4cc21fda2ecf357b99f0be0
              • Instruction ID: de85300666a8aa48888ff13f462303d469bf93f7e58b4776db70e8e05412b18c
              • Opcode Fuzzy Hash: 77dd5d4aa20de0d79966c3f830593b01910af74af4cc21fda2ecf357b99f0be0
              • Instruction Fuzzy Hash: B6D1D432B08A819AEB21CF69D4502EC3BB6FB447DCB544236DE5D97B99DE38D44AD300
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 3668304517-0
              • Opcode ID: 7d7153dc9ae7d5b3424c28ff14d58aef55a80775f13d9447e24f61463487f32c
              • Instruction ID: f2cbf695a10e48451fb5cd2c5cbe92cfee048d9d9a8561606aaa36fecbcfb05e
              • Opcode Fuzzy Hash: 7d7153dc9ae7d5b3424c28ff14d58aef55a80775f13d9447e24f61463487f32c
              • Instruction Fuzzy Hash: 15B1AC62F14B55A5FF009BA4C4487AD2372FB04BACF409225DE6C67B99DF78A885D304
              APIs
              • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00007FF6308BB0CF), ref: 00007FF6308BB200
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00007FF6308BB0CF), ref: 00007FF6308BB28B
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ConsoleErrorLastMode
              • String ID:
              • API String ID: 953036326-0
              • Opcode ID: 8d852cd364b953300601feb318994bc5f66eb9b85f3205e0d4ed1d6cdd918134
              • Instruction ID: db210b7d34bcfb6be06f97003ea568a68658aff14e5e3b367bfc42f3d2d0849c
              • Opcode Fuzzy Hash: 8d852cd364b953300601feb318994bc5f66eb9b85f3205e0d4ed1d6cdd918134
              • Instruction Fuzzy Hash: D991A122E08652A5FF608F6994502BD2BE0FF04B9CF544139DE4E97B95DEB8E44AE700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
              • String ID:
              • API String ID: 3936042273-0
              • Opcode ID: aa83a4776d611bfa6910a88996202f0a13839e5925797b86addcbd2790bd8b35
              • Instruction ID: 041271d0f4e6a0da6c02464b88e0deeaa64617f57292777a9f8238ee1dfd918a
              • Opcode Fuzzy Hash: aa83a4776d611bfa6910a88996202f0a13839e5925797b86addcbd2790bd8b35
              • Instruction Fuzzy Hash: F571B062B18B86A6EE04EB25D40437C6760EB84FE8F548A31EE6C57BD5DF38E485D300
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Process32$CreateFirstNextSnapshotToolhelp32_invalid_parameter_noinfo_invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 4260596558-0
              • Opcode ID: 7762ce93aa6985307a259bfb251e473b870e7df6f058cf487220d00444a178a1
              • Instruction ID: eee484e8a6165859d2b0bcb61f9adff828a3c44e774f435ff611f2701390da48
              • Opcode Fuzzy Hash: 7762ce93aa6985307a259bfb251e473b870e7df6f058cf487220d00444a178a1
              • Instruction Fuzzy Hash: 6871D462A08B86A1EE209B25D44427E6361FB85BA8F508331EA6E837D5DF7CE548D700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: Virtual$AllocInfoProtectQuerySystem
              • String ID:
              • API String ID: 3562403962-0
              • Opcode ID: 8276b17d3f0086b027f55cc71dd443fed715192864dd3a3d0b6a65bee2902499
              • Instruction ID: 5842a0adacd3f5d57b7ca4dd54457e3163164f6df5a4d9b316b2276785423c16
              • Opcode Fuzzy Hash: 8276b17d3f0086b027f55cc71dd443fed715192864dd3a3d0b6a65bee2902499
              • Instruction Fuzzy Hash: AF313932718A81AEDB20CF35D8547E933A5FB48788F944036EA4D87B59DF38E64AD700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CriticalSection$Leave$EnterEvent
              • String ID:
              • API String ID: 3394196147-0
              • Opcode ID: ee59a16ddcb61b2f30476306e2c70f7e991c931b41d410101ed0a7d795a74e2b
              • Instruction ID: 4d5cc1566f898b755ddab28cd5840deb70ae8d16cb1a0b54b6ca80be111c5252
              • Opcode Fuzzy Hash: ee59a16ddcb61b2f30476306e2c70f7e991c931b41d410101ed0a7d795a74e2b
              • Instruction Fuzzy Hash: 4D21F836704B81A7DB48CF2AE5802ADB3A4FB48B88F544135DB6D83766DF38E4A5C740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
              • String ID:
              • API String ID: 2933794660-0
              • Opcode ID: cc56691cd60568e6146a7dde9c83608ec099c6c6a56f3e0ff612a8b3836fe06a
              • Instruction ID: fc42bcea54b87e160da34f52148d97ecf848ea39426c6978c0502f6fec7c4a2f
              • Opcode Fuzzy Hash: cc56691cd60568e6146a7dde9c83608ec099c6c6a56f3e0ff612a8b3836fe06a
              • Instruction Fuzzy Hash: 16117C26B15F019AEF00DFA0E8542B833A4FB1975CF440E32EA2D867A4DF3CD1588380
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CancelEventclosesocketsetsockopt
              • String ID:
              • API String ID: 852421847-0
              • Opcode ID: 2fb1975f05564cd4b635324778d61c2216334fb941b2a99bb5b0bfd9df8af0fc
              • Instruction ID: dc13bdb3d72bf3596dff18b8ef12196c9c817c7464727a5384305936e9eaa633
              • Opcode Fuzzy Hash: 2fb1975f05564cd4b635324778d61c2216334fb941b2a99bb5b0bfd9df8af0fc
              • Instruction Fuzzy Hash: 7BF06932604A8197DB108F69E45432AB330FB84BA8F504335CBAC87BA4CF39D0698B04
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ObjectSingleWait$Sleep
              • String ID:
              • API String ID: 2961732021-0
              • Opcode ID: 4ede45267323656183b3c0ec57ef8ecec2c46d3b5a24cc8965c2015fc5653a59
              • Instruction ID: 3300d5a6944f4848a1cabc5ddfa6b68199a49cdbeb463b93aa2dbf3482609e76
              • Opcode Fuzzy Hash: 4ede45267323656183b3c0ec57ef8ecec2c46d3b5a24cc8965c2015fc5653a59
              • Instruction Fuzzy Hash: D0F0FE72704A459ADB409F79D8542293361EF89B39F154330CA2D873E5CF38C489D358
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: ^(T[A-Za-z0-9]*|0x[A-Za-z0-9]*)$
              • API String ID: 3668304517-660079095
              • Opcode ID: 1a7bd3f9ad1e2be3bb215426da79a080b2b48fcb5330e2929561e3c4d22847e3
              • Instruction ID: 4f7ee0126317ed945ba19c5f8b99484c76f7de038483dc534d3b33b46c6d3117
              • Opcode Fuzzy Hash: 1a7bd3f9ad1e2be3bb215426da79a080b2b48fcb5330e2929561e3c4d22847e3
              • Instruction Fuzzy Hash: A281BE72B19B41AAEF50EF68D0503AC33A5EB48B9CF444235EA5D83B88DF38D954D304
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: __except_validate_context_record
              • String ID: csm$csm
              • API String ID: 1467352782-3733052814
              • Opcode ID: 2e13650262a6f61ea207b4025eb27adbf5cb157b43e28d55221f4b040b54e9a1
              • Instruction ID: 3c6882e1922a57a0dc5cf125014524984baf6a003db1d46296121028351eb53a
              • Opcode Fuzzy Hash: 2e13650262a6f61ea207b4025eb27adbf5cb157b43e28d55221f4b040b54e9a1
              • Instruction Fuzzy Hash: 6A717F72508681A6DF708F6994407B9BBA1FB05B89F248135DA8C87FC9CE3CD569D740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CloseHandlewsprintf
              • String ID: %s_bin
              • API String ID: 3088109604-2665034546
              • Opcode ID: bf08d8ccf84c14e0f8f08288333c875e1effe39fc0f5fec286a8512f3a06db3b
              • Instruction ID: 3e53c0f8d7a74ccc164837d5cc450f890f9711c7f8eee6efcd7f013ddd68d662
              • Opcode Fuzzy Hash: bf08d8ccf84c14e0f8f08288333c875e1effe39fc0f5fec286a8512f3a06db3b
              • Instruction Fuzzy Hash: 8D51D162B19BA6A2EF60DB21C414BBD2365EF84B4CF568136DA0D877C5EE3CD809D301
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: _get_daylight$_invalid_parameter_noinfo
              • String ID: ?
              • API String ID: 1286766494-1684325040
              • Opcode ID: 0b7c1d742c13ddddedbe4d6e2c5e7ad1023c035335ca7369220edd5dde904ae5
              • Instruction ID: 5aa95c94bd839bc1d82c005518f297c502630fc0a17e7bf5262c1d00914f7445
              • Opcode Fuzzy Hash: 0b7c1d742c13ddddedbe4d6e2c5e7ad1023c035335ca7369220edd5dde904ae5
              • Instruction Fuzzy Hash: 66415B22A0878262FF609B29D45137A6661EF80BACF544235EF5E8BBD5DF3CE449D700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: CreateFrameInfo__except_validate_context_record
              • String ID: csm
              • API String ID: 2558813199-1018135373
              • Opcode ID: 503767daf86984436527780b72ab736630531d0d6d2b9058069c45c3b2766ca2
              • Instruction ID: afe1bac7182e1984a2f99ff9884c006b4722e9fc99ac81fe43270458af97e992
              • Opcode Fuzzy Hash: 503767daf86984436527780b72ab736630531d0d6d2b9058069c45c3b2766ca2
              • Instruction Fuzzy Hash: BF517033A19741A6EA20EF15E44026D77A4FB89B94F240134EF8D87B96CF3CE469DB00
              APIs
              • _invalid_parameter_noinfo.LIBCMT ref: 00007FF6308ABFB6
                • Part of subcall function 00007FF6308AE6BC: RtlFreeHeap.NTDLL(?,?,?,00007FF6308B65C2,?,?,?,00007FF6308B693F,?,?,00000000,00007FF6308B6D85,?,?,?,00007FF6308B6CB7), ref: 00007FF6308AE6D2
                • Part of subcall function 00007FF6308AE6BC: GetLastError.KERNEL32(?,?,?,00007FF6308B65C2,?,?,?,00007FF6308B693F,?,?,00000000,00007FF6308B6D85,?,?,?,00007FF6308B6CB7), ref: 00007FF6308AE6DC
              • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF63089DF31), ref: 00007FF6308ABFD4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
              • String ID: C:\Users\user\Desktop\WgnsGjhA3P.exe
              • API String ID: 3580290477-2952926942
              • Opcode ID: 3a5b6248115956fb8c5867fcb2c099a73d6e8c573ad95eb16c3a51b61da9d299
              • Instruction ID: 95aa9ec4cbc65c3cc93ad01db274e1727c658bc37d728c6740acd9cdbbab1bac
              • Opcode Fuzzy Hash: 3a5b6248115956fb8c5867fcb2c099a73d6e8c573ad95eb16c3a51b61da9d299
              • Instruction Fuzzy Hash: E9417F36A08B12E6EF14EF2998401B93794EF4479CB644436EA4E87FC5DF3CE4499340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ErrorFileLastWrite
              • String ID: U
              • API String ID: 442123175-4171548499
              • Opcode ID: 54112263acd02f42df0a8cef6501b04abbfb211da2f70ad802a6942ee1910395
              • Instruction ID: 58a288da4eb0d4c52c6e563c215f2fe3da4b83d56bb7be2468eb6a0f5848f77a
              • Opcode Fuzzy Hash: 54112263acd02f42df0a8cef6501b04abbfb211da2f70ad802a6942ee1910395
              • Instruction Fuzzy Hash: 7541B072A18A81A1DB209F65E4443FA7BA0FB88798F414032EE4DC7798EF3CD449D740
              APIs
              • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF630881111), ref: 00007FF6308A00A0
              • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF630881111), ref: 00007FF6308A00E1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ExceptionFileHeaderRaise
              • String ID: csm
              • API String ID: 2573137834-1018135373
              • Opcode ID: 3c98ac448948905eff4ad47a47963f754950c65019d46630b15deedf807f34ab
              • Instruction ID: d220f718ebd9bdcca12dc0ef82c137b8a6d0a48c148dc89725252d75b967cf47
              • Opcode Fuzzy Hash: 3c98ac448948905eff4ad47a47963f754950c65019d46630b15deedf807f34ab
              • Instruction Fuzzy Hash: C4113D32618B8192EB218F15F440369B7E5FB88B98F684231DF8C87B99DF3DD5559B00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3503940103.00007FF630881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF630880000, based on PE: true
              • Associated: 00000000.00000002.3503926231.00007FF630880000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3503989197.00007FF6308BF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504027915.00007FF6308D5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504046773.00007FF6308D8000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504067876.00007FF6308DC000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3504114261.00007FF6308E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff630880000_WgnsGjhA3P.jbxd
              Similarity
              • API ID: ErrorLastRead
              • String ID:
              • API String ID: 4100373531-0
              • Opcode ID: e0e517c51036cec7b570afbeb596ed896a79d3929b09d4426d0e27ecdcf8b3b8
              • Instruction ID: b046c7bc32349a6cb00c8215fc358f09fb8b14352a848db540c004954b15635c
              • Opcode Fuzzy Hash: e0e517c51036cec7b570afbeb596ed896a79d3929b09d4426d0e27ecdcf8b3b8
              • Instruction Fuzzy Hash: 00413862B09B42A6EF109B66E4442A933A0FB48B98F054435CF4E87B94DF7CE4A9D740