Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
yIR0BZUT2A.exe

Overview

General Information

Sample name:yIR0BZUT2A.exe
renamed because original name is a hash value
Original sample name:d290cccbc59f0fa1d5e5d36a88785795.exe
Analysis ID:1585729
MD5:d290cccbc59f0fa1d5e5d36a88785795
SHA1:426910443aec2075365cece2514801ea3254d0ca
SHA256:061f46e583ce23f357dba77ee0f455e31304231538a6820b0948f9bddc1e9b6e
Tags:exeValleyRATuser-abuse_ch
Infos:

Detection

GhostRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GhostRat
AI detected suspicious sample
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Found evasive API chain (may stop execution after checking mutex)
Found stalling execution ending in API Sleep call
Sample is not signed and drops a device driver
Sigma detected: Potentially Suspicious Malware Callback Communication
Tries to detect sandboxes / dynamic malware analysis system (QueryWinSAT)
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Creates driver files
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain checking for process token information
Installs a global mouse hook
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Stores large binary data to the registry

Classification

  • System is w10x64
  • yIR0BZUT2A.exe (PID: 7056 cmdline: "C:\Users\user\Desktop\yIR0BZUT2A.exe" MD5: D290CCCBC59F0FA1D5E5D36A88785795)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
yIR0BZUT2A.exeJoeSecurity_GhostRatYara detected GhostRatJoe Security
    SourceRuleDescriptionAuthorStrings
    Process Memory Space: yIR0BZUT2A.exe PID: 7056JoeSecurity_GhostRatYara detected GhostRatJoe Security
      SourceRuleDescriptionAuthorStrings
      0.2.yIR0BZUT2A.exe.7ff62a970000.0.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security
        0.0.yIR0BZUT2A.exe.7ff62a970000.0.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security

          System Summary

          barindex
          Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 154.91.90.234, DestinationIsIpv6: false, DestinationPort: 4433, EventID: 3, Image: C:\Users\user\Desktop\yIR0BZUT2A.exe, Initiated: true, ProcessId: 7056, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-08T05:52:01.260779+010020528751A Network Trojan was detected192.168.2.449730154.91.90.2344433TCP
          2025-01-08T05:53:07.512968+010020528751A Network Trojan was detected192.168.2.449730154.91.90.2344433TCP
          2025-01-08T05:54:08.867603+010020528751A Network Trojan was detected192.168.2.454649154.91.90.2344433TCP
          2025-01-08T05:55:51.557688+010020528751A Network Trojan was detected192.168.2.454653154.91.90.2344433TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: yIR0BZUT2A.exeReversingLabs: Detection: 52%
          Source: yIR0BZUT2A.exeVirustotal: Detection: 68%Perma Link
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
          Source: yIR0BZUT2A.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile opened: z:Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile opened: x:Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile opened: v:Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile opened: t:Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile opened: r:Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile opened: p:Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile opened: n:Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile opened: l:Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile opened: j:Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile opened: h:Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile opened: f:Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile opened: b:Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile opened: y:Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile opened: w:Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile opened: u:Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile opened: s:Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile opened: q:Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile opened: o:Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile opened: m:Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile opened: k:Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile opened: i:Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile opened: g:Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile opened: e:Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile opened: [:Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A97F410 GetLastInputInfo,GetTickCount,wsprintfW,GetForegroundWindow,GetWindowTextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,SHGetFolderPathW,lstrcatW,CreateFileW,lstrlenW,WriteFile,CloseHandle,FindFirstFileW,FindClose,_invalid_parameter_noinfo_noreturn,0_2_00007FF62A97F410
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9A4190 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF62A9A4190
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A976370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF62A976370

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:49730 -> 154.91.90.234:4433
          Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:54649 -> 154.91.90.234:4433
          Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:54653 -> 154.91.90.234:4433
          Source: global trafficTCP traffic: 192.168.2.4:49730 -> 154.91.90.234:4433
          Source: global trafficTCP traffic: 192.168.2.4:54380 -> 162.159.36.2:53
          Source: Joe Sandbox ViewASN Name: ITACE-AS-APItaceInternationalLimitedHK ITACE-AS-APItaceInternationalLimitedHK
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
          Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
          Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
          Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: unknownTCP traffic detected without corresponding DNS query: 154.91.90.234
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A973B00 select,recv,timeGetTime,0_2_00007FF62A973B00

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: [esc]0_2_00007FF62A97ADB0
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A980DA0 _invalid_parameter_noinfo_noreturn,lstrlenW,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,CloseClipboard,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF62A980DA0
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A980DA0 _invalid_parameter_noinfo_noreturn,lstrlenW,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,CloseClipboard,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF62A980DA0
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A980DA0 _invalid_parameter_noinfo_noreturn,lstrlenW,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,CloseClipboard,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF62A980DA0
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A97FD10 GetDesktopWindow,GetDC,CreateCompatibleDC,GetDC,GetDeviceCaps,GetDeviceCaps,ReleaseDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,CreateCompatibleBitmap,SelectObject,SetStretchBltMode,GetSystemMetrics,GetSystemMetrics,StretchBlt,GetDIBits,DeleteObject,DeleteObject,ReleaseDC,DeleteObject,DeleteObject,ReleaseDC,_invalid_parameter_noinfo_noreturn,0_2_00007FF62A97FD10
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9772D0 MultiByteToWideChar,MultiByteToWideChar,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,CreateMutexExW,GetLastError,Sleep,CreateMutexW,GetLastError,lstrlenW,lstrcmpW,SleepEx,GetModuleHandleW,GetConsoleWindow,SHGetFolderPathW,lstrcatW,CreateMutexW,WaitForSingleObject,CreateFileW,GetFileSize,CloseHandle,DeleteFileW,ReleaseMutex,DirectInput8Create,GetTickCount,GetKeyState,0_2_00007FF62A9772D0
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeWindows user hook set: 0 mouse low level C:\Windows\SYSTEM32\DINPUT8.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeProcess Stats: CPU usage > 49%
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A98C400: wsprintfW,CreateFileW,DeviceIoControl,DeviceIoControl,DeviceIoControl,DeviceIoControl,CloseHandle,CloseHandle,0_2_00007FF62A98C400
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A97E3E9 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,0_2_00007FF62A97E3E9
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A97E4EE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00007FF62A97E4EE
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A97E46D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00007FF62A97E46D
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile created: C:\ProgramData\kernelquick.sysJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A97B4100_2_00007FF62A97B410
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A97F4100_2_00007FF62A97F410
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9763700_2_00007FF62A976370
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9715000_2_00007FF62A971500
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A97FD100_2_00007FF62A97FD10
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9772D00_2_00007FF62A9772D0
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A977A600_2_00007FF62A977A60
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9780C00_2_00007FF62A9780C0
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9A20480_2_00007FF62A9A2048
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A98B5E00_2_00007FF62A98B5E0
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A98AE600_2_00007FF62A98AE60
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A998EB00_2_00007FF62A998EB0
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9A73EC0_2_00007FF62A9A73EC
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9954080_2_00007FF62A995408
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A97D4100_2_00007FF62A97D410
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A99F4BC0_2_00007FF62A99F4BC
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9964C80_2_00007FF62A9964C8
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9794800_2_00007FF62A979480
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9A29E40_2_00007FF62A9A29E4
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9971DC0_2_00007FF62A9971DC
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9879D00_2_00007FF62A9879D0
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A995A1C0_2_00007FF62A995A1C
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9A3A000_2_00007FF62A9A3A00
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9951FC0_2_00007FF62A9951FC
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A99F9500_2_00007FF62A99F950
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9A41900_2_00007FF62A9A4190
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9A22C40_2_00007FF62A9A22C4
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9893300_2_00007FF62A989330
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A99C7BC0_2_00007FF62A99C7BC
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A99FFD00_2_00007FF62A99FFD0
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9A5FD40_2_00007FF62A9A5FD4
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9A88240_2_00007FF62A9A8824
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9958180_2_00007FF62A995818
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A994FF80_2_00007FF62A994FF8
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A99A7980_2_00007FF62A99A798
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A982FA00_2_00007FF62A982FA0
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9799000_2_00007FF62A979900
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A99684C0_2_00007FF62A99684C
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9808800_2_00007FF62A980880
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9975E00_2_00007FF62A9975E0
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A99B5F00_2_00007FF62A99B5F0
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A99D5C00_2_00007FF62A99D5C0
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A99560C0_2_00007FF62A99560C
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A97CD400_2_00007FF62A97CD40
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A97ADB00_2_00007FF62A97ADB0
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A99AF200_2_00007FF62A99AF20
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A972E500_2_00007FF62A972E50
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A98A6800_2_00007FF62A98A680
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/1@0/1
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A98B5E0 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF62A98B5E0
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A97E3E9 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,0_2_00007FF62A97E3E9
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A97E4EE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00007FF62A97E4EE
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A97E46D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00007FF62A97E46D
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A979480 GetSystemDirectoryA,CreateProcessA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,0_2_00007FF62A979480
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A976370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF62A976370
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A97F410 GetLastInputInfo,GetTickCount,wsprintfW,GetForegroundWindow,GetWindowTextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,SHGetFolderPathW,lstrcatW,CreateFileW,lstrlenW,WriteFile,CloseHandle,FindFirstFileW,FindClose,_invalid_parameter_noinfo_noreturn,0_2_00007FF62A97F410
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A976370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF62A976370
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeMutant created: \Sessions\1\BaseNamedObjects\????
          Source: yIR0BZUT2A.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: yIR0BZUT2A.exeReversingLabs: Detection: 52%
          Source: yIR0BZUT2A.exeVirustotal: Detection: 68%
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: dxgi.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: dinput8.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: inputhost.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: napinsp.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: pnrpnsp.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: wshbth.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: nlaapi.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: winrnr.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: resourcepolicyclient.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: devenum.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: devobj.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: msdmo.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{62BE5D10-60EB-11d0-BD3B-00A0C911CE86}\InprocServer32Jump to behavior
          Source: yIR0BZUT2A.exeStatic PE information: Image base 0x140000000 > 0x60000000
          Source: yIR0BZUT2A.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Source: yIR0BZUT2A.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A976370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF62A976370

          Persistence and Installation Behavior

          barindex
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile created: C:\ProgramData\kernelquick.sysJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A97E36A OpenEventLogW,ClearEventLogW,CloseEventLog,0_2_00007FF62A97E36A
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE VenkernalData_infoJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_0-21653
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeStalling execution: Execution stalls by calling Sleepgraph_0-21131
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{05DF8D13-C355-47F4-A11E-851B338CEFB8}Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A976370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF62A976370
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeWindow / User API: threadDelayed 2708Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeWindow / User API: threadDelayed 3336Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeWindow / User API: threadDelayed 3434Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-21738
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exe TID: 6312Thread sleep count: 2708 > 30Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exe TID: 6312Thread sleep time: -2708000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exe TID: 6460Thread sleep count: 3336 > 30Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exe TID: 6460Thread sleep time: -33360s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exe TID: 6312Thread sleep count: 3434 > 30Jump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exe TID: 6312Thread sleep time: -3434000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A97F410 GetLastInputInfo,GetTickCount,wsprintfW,GetForegroundWindow,GetWindowTextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,SHGetFolderPathW,lstrcatW,CreateFileW,lstrlenW,WriteFile,CloseHandle,FindFirstFileW,FindClose,_invalid_parameter_noinfo_noreturn,0_2_00007FF62A97F410
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9A4190 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF62A9A4190
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A976370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF62A976370
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A976370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF62A976370
          Source: yIR0BZUT2A.exe, 00000000.00000002.4109685737.0000020F2BE3C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A98B5E0 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF62A98B5E0
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A98C82C GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF62A98C82C
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A976370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF62A976370
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A976370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF62A976370
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A978710 SysAllocString,SysAllocString,GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,LookupAccountSidW,GetLastError,SysAllocString,SysAllocString,GetProcessHeap,HeapFree,GetCurrentProcessId,OpenProcess,OpenProcessToken,CloseHandle,0_2_00007FF62A978710
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A98B5E0 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF62A98B5E0
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A98BDF0 SetUnhandledExceptionFilter,GetConsoleWindow,ShowWindow,GetCurrentThreadId,PostThreadMessageA,GetInputState,CreateThread,WaitForSingleObject,CloseHandle,Sleep,0_2_00007FF62A98BDF0
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A993D0C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF62A993D0C
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A98EA00 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF62A98EA00
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A98E814 SetUnhandledExceptionFilter,0_2_00007FF62A98E814
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A98E66C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF62A98E66C

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A979480 GetSystemDirectoryA,CreateProcessA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,0_2_00007FF62A979480
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A979480 GetSystemDirectoryA,CreateProcessA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,0_2_00007FF62A979480
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: GetSystemDirectoryA,CreateProcessA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\System32\svchost.exe0_2_00007FF62A979480
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A98B5E0 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF62A98B5E0
          Source: yIR0BZUT2A.exe, 00000000.00000003.3405277748.0000020F2BF0D000.00000004.00000020.00020000.00000000.sdmp, yIR0BZUT2A.exe, 00000000.00000003.3794875123.0000020F2BECB000.00000004.00000020.00020000.00000000.sdmp, yIR0BZUT2A.exe, 00000000.00000003.2773094836.0000020F2BEBF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0 minProgram Manager
          Source: yIR0BZUT2A.exe, 00000000.00000003.3419747333.0000020F2BF0A000.00000004.00000020.00020000.00000000.sdmp, yIR0BZUT2A.exe, 00000000.00000002.4109685737.0000020F2BF02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9ACB60 cpuid 0_2_00007FF62A9ACB60
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF62A976370
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF62A9A83C4
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: EnumSystemLocalesW,0_2_00007FF62A9A7CD8
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00007FF62A9A81E0
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,0_2_00007FF62A9A797C
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: EnumSystemLocalesW,0_2_00007FF62A9A0AD8
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: GetLocaleInfoW,0_2_00007FF62A9A8290
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: GetLocaleInfoW,0_2_00007FF62A9A0FB0
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: GetLocaleInfoW,0_2_00007FF62A9A8088
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: EnumSystemLocalesW,0_2_00007FF62A9A7DA8
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF62A9A7E40
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A976370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF62A976370
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A9A2048 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,0_2_00007FF62A9A2048
          Source: C:\Users\user\Desktop\yIR0BZUT2A.exeCode function: 0_2_00007FF62A978A40 GetCurrentProcessId,OpenProcess,OpenProcessToken,CloseHandle,SysStringLen,SysStringLen,CloseHandle,CloseHandle,SysFreeString,SysFreeString,GetCurrentProcessId,wsprintfW,GetVersionExW,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,wsprintfW,0_2_00007FF62A978A40
          Source: yIR0BZUT2A.exe, 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmp, yIR0BZUT2A.exe, 00000000.00000000.1650507673.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: KSafeTray.exe

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: yIR0BZUT2A.exe, type: SAMPLE
          Source: Yara matchFile source: 0.2.yIR0BZUT2A.exe.7ff62a970000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.0.yIR0BZUT2A.exe.7ff62a970000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: Process Memory Space: yIR0BZUT2A.exe PID: 7056, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: yIR0BZUT2A.exe, type: SAMPLE
          Source: Yara matchFile source: 0.2.yIR0BZUT2A.exe.7ff62a970000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.0.yIR0BZUT2A.exe.7ff62a970000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: Process Memory Space: yIR0BZUT2A.exe PID: 7056, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure1
          Replication Through Removable Media
          12
          Native API
          1
          Windows Service
          1
          Access Token Manipulation
          1
          Modify Registry
          121
          Input Capture
          2
          System Time Discovery
          Remote Services1
          Screen Capture
          1
          Encrypted Channel
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          1
          Windows Service
          1
          Virtualization/Sandbox Evasion
          LSASS Memory151
          Security Software Discovery
          Remote Desktop Protocol121
          Input Capture
          1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)211
          Process Injection
          1
          Access Token Manipulation
          Security Account Manager1
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
          DLL Side-Loading
          211
          Process Injection
          NTDS3
          Process Discovery
          Distributed Component Object Model3
          Clipboard Data
          Protocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Indicator Removal
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          DLL Side-Loading
          Cached Domain Credentials11
          Peripheral Device Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync2
          File and Directory Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem26
          System Information Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          yIR0BZUT2A.exe53%ReversingLabsWin64.Trojan.SpywareX
          yIR0BZUT2A.exe68%VirustotalBrowse
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          154.91.90.234
          unknownSeychelles
          134705ITACE-AS-APItaceInternationalLimitedHKtrue
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1585729
          Start date and time:2025-01-08 05:51:05 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 6m 40s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:5
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:yIR0BZUT2A.exe
          renamed because original name is a hash value
          Original Sample Name:d290cccbc59f0fa1d5e5d36a88785795.exe
          Detection:MAL
          Classification:mal100.troj.spyw.evad.winEXE@1/1@0/1
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 44
          • Number of non-executed functions: 117
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Override analysis time to 240000 for current running targets taking high CPU consumption
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
          • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.45
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, 7.4.8.4.4.3.1.4.0.0.0.0.0.0.0.0.0.0.0.a.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtEnumerateKey calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          TimeTypeDescription
          23:52:28API Interceptor5861694x Sleep call for process: yIR0BZUT2A.exe modified
          No context
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          ITACE-AS-APItaceInternationalLimitedHKU02LaPwnkd.exeGet hashmaliciousValleyRATBrowse
          • 154.91.226.158
          Fantazy.i486.elfGet hashmaliciousUnknownBrowse
          • 156.227.127.123
          http://www.rr8844.comGet hashmaliciousUnknownBrowse
          • 154.91.91.54
          hoEtvOOrYH.exeGet hashmaliciousSmokeLoaderBrowse
          • 45.118.248.184
          vcimanagement.armv4l.elfGet hashmaliciousGafgyt, MiraiBrowse
          • 156.237.86.202
          vcimanagement.powerpc.elfGet hashmaliciousGafgyt, MiraiBrowse
          • 156.235.45.173
          vcimanagement.x86.elfGet hashmaliciousGafgyt, MiraiBrowse
          • 156.227.127.146
          vcimanagement.m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
          • 156.235.45.170
          spc.elfGet hashmaliciousMirai, MoobotBrowse
          • 154.194.208.251
          db0fa4b8db0333367e9bda3ab68b8042.spc.elfGet hashmaliciousMirai, GafgytBrowse
          • 156.235.45.132
          No context
          No context
          Process:C:\Users\user\Desktop\yIR0BZUT2A.exe
          File Type:data
          Category:dropped
          Size (bytes):30
          Entropy (8bit):2.6616157143988106
          Encrypted:false
          SSDEEP:3:tblM6lEjln:tbhEZn
          MD5:AE50B29A0B8DCC411F24F1863B0EAFDE
          SHA1:D415A55627B1ADED8E4B2CBBA402F816B0461155
          SHA-256:6B4BBBCE480FBC50D39A8EC4B72CDB7D781B151921E063DD899FD9B736ADCF68
          SHA-512:D9A9BA42D99BE32D26667060BE1D523DCD20EAFA187A67F7919002CC6DA349FD058053C9C6F721D6FDB730EA02FBAA3013E51C0C653368BD6B3F57A4C0FCABA8
          Malicious:true
          Reputation:moderate, very likely benign file
          Preview:C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.
          File type:PE32+ executable (GUI) x86-64, for MS Windows
          Entropy (8bit):6.060232935611435
          TrID:
          • Win64 Executable GUI (202006/5) 92.65%
          • Win64 Executable (generic) (12005/4) 5.51%
          • Generic Win/DOS Executable (2004/3) 0.92%
          • DOS Executable Generic (2002/1) 0.92%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:yIR0BZUT2A.exe
          File size:390'656 bytes
          MD5:d290cccbc59f0fa1d5e5d36a88785795
          SHA1:426910443aec2075365cece2514801ea3254d0ca
          SHA256:061f46e583ce23f357dba77ee0f455e31304231538a6820b0948f9bddc1e9b6e
          SHA512:3c431febb985275a84da02263d67b7cc2b98fd1fc7f9e7c8f1bcb442e6d790f929047670862cf6da2e450366c75cb6c4271156c27fa8e32035588dceb5e38238
          SSDEEP:6144:rvy/g/Oe2CZNHfXmv9m7tvT7DYewsPJimci9vrBP2kbLjNy:2/KlpTXmv9mpvv0iPJPBr9zNy
          TLSH:3D847E49FB9409F8E467C138C9A34916EBB27C5913A09BDF33A4466A2F237D05D3EB11
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B..R............M.......M.......M.......M........O.......O.......O..S...M.......M...........3...MN......MN......Rich...........
          Icon Hash:90cececece8e8eb0
          Entrypoint:0x14001e25c
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x140000000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Time Stamp:0x6763E626 [Thu Dec 19 09:23:50 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:0
          File Version Major:6
          File Version Minor:0
          Subsystem Version Major:6
          Subsystem Version Minor:0
          Import Hash:1db3bac59c066f9b53b8b3b6b99b874b
          Instruction
          dec eax
          sub esp, 28h
          call 00007F5BF4835680h
          dec eax
          add esp, 28h
          jmp 00007F5BF4834ED7h
          int3
          int3
          dec eax
          sub esp, 28h
          dec ebp
          mov eax, dword ptr [ecx+38h]
          dec eax
          mov ecx, edx
          dec ecx
          mov edx, ecx
          call 00007F5BF4835072h
          mov eax, 00000001h
          dec eax
          add esp, 28h
          ret
          int3
          int3
          int3
          inc eax
          push ebx
          inc ebp
          mov ebx, dword ptr [eax]
          dec eax
          mov ebx, edx
          inc ecx
          and ebx, FFFFFFF8h
          dec esp
          mov ecx, ecx
          inc ecx
          test byte ptr [eax], 00000004h
          dec esp
          mov edx, ecx
          je 00007F5BF4835075h
          inc ecx
          mov eax, dword ptr [eax+08h]
          dec ebp
          arpl word ptr [eax+04h], dx
          neg eax
          dec esp
          add edx, ecx
          dec eax
          arpl ax, cx
          dec esp
          and edx, ecx
          dec ecx
          arpl bx, ax
          dec edx
          mov edx, dword ptr [eax+edx]
          dec eax
          mov eax, dword ptr [ebx+10h]
          mov ecx, dword ptr [eax+08h]
          dec eax
          mov eax, dword ptr [ebx+08h]
          test byte ptr [ecx+eax+03h], 0000000Fh
          je 00007F5BF483506Dh
          movzx eax, byte ptr [ecx+eax+03h]
          and eax, FFFFFFF0h
          dec esp
          add ecx, eax
          dec esp
          xor ecx, edx
          dec ecx
          mov ecx, ecx
          pop ebx
          jmp 00007F5BF483507Ah
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          nop word ptr [eax+eax+00000000h]
          dec eax
          cmp ecx, dword ptr [00036D39h]
          jne 00007F5BF4835072h
          dec eax
          rol ecx, 10h
          test cx, FFFFh
          jne 00007F5BF4835063h
          ret
          dec eax
          ror ecx, 10h
          jmp 00007F5BF483577Bh
          int3
          int3
          dec eax
          mov dword ptr [esp+00h], ebx
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x524000x104.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x600000x3450.pdata
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x640000xc8c.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x4c7c00x38.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x4c9800x28.rdata
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x4c6800x140.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x3f0000x920.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x3df700x3e0002b6c6c8b93239d65e2449c4cc33eda20False0.5452683971774194data6.461526088950339IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x3f0000x151e80x152000f93661560d08fd5133b1ecad98a47aaFalse0.4156804733727811data4.936195594835422IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x550000xaa9c0x7c0002896d874f254d4521f959657c33941dFalse0.10650831653225806DOS executable (block device driver \377\3)1.586961638922988IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .pdata0x600000x34500x3600b6a68cd5b1e86136baf9e34e01cfad8bFalse0.4622395833333333data5.530289196450094IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x640000xc8c0xe00a952b87812e4781581800f8699e0d5a4False0.49302455357142855data5.228153224182403IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          DLLImport
          KERNEL32.dllQueryDosDeviceW, WriteProcessMemory, GetCommandLineW, GetCurrentProcess, WriteFile, OutputDebugStringA, GetModuleFileNameW, GetProcessId, CreateMutexW, GetLocaleInfoW, LocalAlloc, CreateFileW, GetVersionExW, K32GetProcessImageFileNameW, GetSystemDirectoryW, ResumeThread, GetModuleHandleA, OpenProcess, GetLogicalDriveStringsW, CreateToolhelp32Snapshot, MultiByteToWideChar, Process32NextW, GetDiskFreeSpaceExW, GetSystemDirectoryA, LoadLibraryA, lstrcatW, GlobalAlloc, Process32FirstW, GlobalFree, GetSystemInfo, LoadLibraryW, GetLocalTime, VirtualProtectEx, GetThreadContext, GetProcAddress, VirtualAllocEx, LocalFree, ExitProcess, GetCurrentProcessId, GlobalMemoryStatusEx, CreateProcessW, GetModuleHandleW, FreeLibrary, GetConsoleWindow, lstrcpyW, CreateRemoteThread, CreateProcessA, SetThreadContext, GetModuleFileNameA, GetTickCount, lstrcmpW, GetDriveTypeW, GetExitCodeProcess, SetFilePointer, ReleaseMutex, GlobalSize, DeleteFileW, GlobalLock, GetFileSize, GlobalUnlock, FindFirstFileW, ExpandEnvironmentStringsW, FindClose, GetFileAttributesW, TerminateThread, VirtualProtect, IsBadReadPtr, CreateThread, IsDebuggerPresent, SetUnhandledExceptionFilter, WriteConsoleW, GetCurrentThreadId, GetConsoleMode, GetConsoleOutputCP, FlushFileBuffers, SetFilePointerEx, SetStdHandle, SetEnvironmentVariableW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetOEMCP, GetACP, IsValidCodePage, FindNextFileW, FindFirstFileExW, GetTimeZoneInformation, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, LCMapStringW, CompareStringW, FlsFree, FlsSetValue, GetStartupInfoW, CreateWaitableTimerW, SetWaitableTimer, TryEnterCriticalSection, WideCharToMultiByte, ResetEvent, CreateEventW, lstrlenW, CancelIo, GetNativeSystemInfo, SetLastError, lstrcmpiW, CreateEventA, CloseHandle, SetEvent, Sleep, WaitForSingleObject, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, EnterCriticalSection, HeapCreate, HeapFree, GetProcessHeap, DeleteCriticalSection, HeapDestroy, DecodePointer, HeapAlloc, HeapReAlloc, GetLastError, HeapSize, InitializeCriticalSectionEx, VirtualAlloc, VirtualFree, FlsGetValue, FlsAlloc, GetFileType, GetCommandLineA, GetStdHandle, VirtualQuery, GetModuleHandleExW, FreeLibraryAndExitThread, ExitThread, LoadLibraryExW, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, RtlPcToFileHeader, RtlUnwindEx, lstrcpyA, CreateFileA, GetSystemDefaultLangID, DeviceIoControl, TerminateProcess, InitializeSListHead, GetSystemTimeAsFileTime, QueryPerformanceCounter, IsProcessorFeaturePresent, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, SleepConditionVariableSRW, WakeAllConditionVariable, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, GetCPInfo, LCMapStringEx, EncodePointer, CompareStringEx, GetStringTypeW, RaiseException, OutputDebugStringW, SwitchToThread
          USER32.dllGetForegroundWindow, GetLastInputInfo, GetClipboardData, GetWindowTextW, GetKeyState, ReleaseDC, GetDesktopWindow, SetClipboardData, CloseClipboard, wsprintfW, ExitWindowsEx, ShowWindow, PostThreadMessageA, GetInputState, GetDC, GetSystemMetrics, EmptyClipboard, MsgWaitForMultipleObjects, DispatchMessageW, PeekMessageW, TranslateMessage, OpenClipboard
          GDI32.dllCreateCompatibleBitmap, SelectObject, CreateDIBSection, SetDIBColorTable, CreateCompatibleDC, StretchBlt, GetDIBits, GetDeviceCaps, GetObjectW, SetStretchBltMode, DeleteObject, DeleteDC
          ADVAPI32.dllRegQueryInfoKeyW, RegQueryValueExW, AllocateAndInitializeSid, FreeSid, CheckTokenMembership, ClearEventLogW, CloseEventLog, OpenEventLogW, LookupPrivilegeValueW, AdjustTokenPrivileges, GetCurrentHwProfileW, RegCloseKey, GetSidSubAuthorityCount, GetSidSubAuthority, RegEnumKeyExW, RegSetValueExW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyW, RegDeleteValueW, LookupAccountSidW, GetTokenInformation
          SHELL32.dllSHGetFolderPathW
          ole32.dllCreateStreamOnHGlobal, GetHGlobalFromStream, CoCreateInstance, CoUninitialize, CoInitialize
          OLEAUT32.dllSysFreeString, SysAllocString, SysStringLen
          WS2_32.dllselect, WSAStartup, send, socket, connect, recv, htons, setsockopt, WSAIoctl, gethostbyname, WSAGetLastError, WSAEnumNetworkEvents, WSAWaitForMultipleEvents, WSAResetEvent, WSAEventSelect, WSASetLastError, WSACloseEvent, shutdown, gethostname, inet_ntoa, WSACleanup, closesocket, WSACreateEvent
          WINMM.dlltimeGetTime
          gdiplus.dllGdipDisposeImage, GdipCreateBitmapFromHBITMAP, GdipGetImagePixelFormat, GdiplusShutdown, GdipDrawImageI, GdipFree, GdipSaveImageToStream, GdipGetImageWidth, GdipGetImagePalette, GdipDeleteGraphics, GdipGetImageEncodersSize, GdipGetImageGraphicsContext, GdipBitmapLockBits, GdipCreateBitmapFromScan0, GdipAlloc, GdiplusStartup, GdipGetImageHeight, GdipGetImageEncoders, GdipGetImagePaletteSize, GdipCloneImage, GdipBitmapUnlockBits, GdipCreateBitmapFromStream
          dxgi.dllCreateDXGIFactory
          DINPUT8.dllDirectInput8Create
          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
          2025-01-08T05:52:01.260779+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.449730154.91.90.2344433TCP
          2025-01-08T05:53:07.512968+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.449730154.91.90.2344433TCP
          2025-01-08T05:54:08.867603+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.454649154.91.90.2344433TCP
          2025-01-08T05:55:51.557688+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.454653154.91.90.2344433TCP
          TimestampSource PortDest PortSource IPDest IP
          Jan 8, 2025 05:52:00.089695930 CET497304433192.168.2.4154.91.90.234
          Jan 8, 2025 05:52:00.094626904 CET443349730154.91.90.234192.168.2.4
          Jan 8, 2025 05:52:00.094722033 CET497304433192.168.2.4154.91.90.234
          Jan 8, 2025 05:52:00.863348007 CET497304433192.168.2.4154.91.90.234
          Jan 8, 2025 05:52:00.868350029 CET443349730154.91.90.234192.168.2.4
          Jan 8, 2025 05:52:00.868391037 CET443349730154.91.90.234192.168.2.4
          Jan 8, 2025 05:52:00.868437052 CET443349730154.91.90.234192.168.2.4
          Jan 8, 2025 05:52:00.868459940 CET443349730154.91.90.234192.168.2.4
          Jan 8, 2025 05:52:01.172449112 CET443349730154.91.90.234192.168.2.4
          Jan 8, 2025 05:52:01.215883017 CET497304433192.168.2.4154.91.90.234
          Jan 8, 2025 05:52:01.255769968 CET497304433192.168.2.4154.91.90.234
          Jan 8, 2025 05:52:01.260691881 CET443349730154.91.90.234192.168.2.4
          Jan 8, 2025 05:52:01.260704994 CET443349730154.91.90.234192.168.2.4
          Jan 8, 2025 05:52:01.260714054 CET443349730154.91.90.234192.168.2.4
          Jan 8, 2025 05:52:01.260718107 CET443349730154.91.90.234192.168.2.4
          Jan 8, 2025 05:52:01.260778904 CET497304433192.168.2.4154.91.90.234
          Jan 8, 2025 05:52:01.265573025 CET443349730154.91.90.234192.168.2.4
          Jan 8, 2025 05:52:17.028435946 CET497304433192.168.2.4154.91.90.234
          Jan 8, 2025 05:52:17.033441067 CET443349730154.91.90.234192.168.2.4
          Jan 8, 2025 05:52:17.367533922 CET443349730154.91.90.234192.168.2.4
          Jan 8, 2025 05:52:17.418977976 CET497304433192.168.2.4154.91.90.234
          Jan 8, 2025 05:52:33.622212887 CET497304433192.168.2.4154.91.90.234
          Jan 8, 2025 05:52:33.627137899 CET443349730154.91.90.234192.168.2.4
          Jan 8, 2025 05:52:33.928493023 CET443349730154.91.90.234192.168.2.4
          Jan 8, 2025 05:52:33.981506109 CET497304433192.168.2.4154.91.90.234
          Jan 8, 2025 05:52:40.301570892 CET5438053192.168.2.4162.159.36.2
          Jan 8, 2025 05:52:40.306420088 CET5354380162.159.36.2192.168.2.4
          Jan 8, 2025 05:52:40.306487083 CET5438053192.168.2.4162.159.36.2
          Jan 8, 2025 05:52:40.311338902 CET5354380162.159.36.2192.168.2.4
          Jan 8, 2025 05:52:40.770030975 CET5438053192.168.2.4162.159.36.2
          Jan 8, 2025 05:52:40.775059938 CET5354380162.159.36.2192.168.2.4
          Jan 8, 2025 05:52:40.775113106 CET5438053192.168.2.4162.159.36.2
          Jan 8, 2025 05:52:50.325372934 CET497304433192.168.2.4154.91.90.234
          Jan 8, 2025 05:52:50.330284119 CET443349730154.91.90.234192.168.2.4
          Jan 8, 2025 05:52:50.631928921 CET443349730154.91.90.234192.168.2.4
          Jan 8, 2025 05:52:50.684770107 CET497304433192.168.2.4154.91.90.234
          Jan 8, 2025 05:53:07.512968063 CET497304433192.168.2.4154.91.90.234
          Jan 8, 2025 05:53:07.517818928 CET443349730154.91.90.234192.168.2.4
          Jan 8, 2025 05:53:07.819251060 CET443349730154.91.90.234192.168.2.4
          Jan 8, 2025 05:53:07.872179031 CET497304433192.168.2.4154.91.90.234
          Jan 8, 2025 05:53:24.794329882 CET497304433192.168.2.4154.91.90.234
          Jan 8, 2025 05:53:24.800461054 CET443349730154.91.90.234192.168.2.4
          Jan 8, 2025 05:53:25.112510920 CET443349730154.91.90.234192.168.2.4
          Jan 8, 2025 05:53:25.325321913 CET497304433192.168.2.4154.91.90.234
          Jan 8, 2025 05:53:41.309736013 CET497304433192.168.2.4154.91.90.234
          Jan 8, 2025 05:53:41.309777975 CET497304433192.168.2.4154.91.90.234
          Jan 8, 2025 05:53:41.314587116 CET443349730154.91.90.234192.168.2.4
          Jan 8, 2025 05:53:41.317359924 CET497304433192.168.2.4154.91.90.234
          Jan 8, 2025 05:53:46.263338089 CET5464810443192.168.2.4154.91.90.234
          Jan 8, 2025 05:53:46.268227100 CET1044354648154.91.90.234192.168.2.4
          Jan 8, 2025 05:53:46.271362066 CET5464810443192.168.2.4154.91.90.234
          Jan 8, 2025 05:53:47.156785965 CET5464810443192.168.2.4154.91.90.234
          Jan 8, 2025 05:53:47.161753893 CET1044354648154.91.90.234192.168.2.4
          Jan 8, 2025 05:53:47.161766052 CET1044354648154.91.90.234192.168.2.4
          Jan 8, 2025 05:53:47.161773920 CET1044354648154.91.90.234192.168.2.4
          Jan 8, 2025 05:53:47.161802053 CET1044354648154.91.90.234192.168.2.4
          Jan 8, 2025 05:53:47.725117922 CET1044354648154.91.90.234192.168.2.4
          Jan 8, 2025 05:53:47.778529882 CET5464810443192.168.2.4154.91.90.234
          Jan 8, 2025 05:53:47.834391117 CET5464810443192.168.2.4154.91.90.234
          Jan 8, 2025 05:53:47.839265108 CET1044354648154.91.90.234192.168.2.4
          Jan 8, 2025 05:53:47.839277029 CET1044354648154.91.90.234192.168.2.4
          Jan 8, 2025 05:53:47.839308977 CET1044354648154.91.90.234192.168.2.4
          Jan 8, 2025 05:53:47.839315891 CET5464810443192.168.2.4154.91.90.234
          Jan 8, 2025 05:53:47.839329004 CET1044354648154.91.90.234192.168.2.4
          Jan 8, 2025 05:53:47.844156027 CET1044354648154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:02.122626066 CET5464810443192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:02.122658968 CET5464810443192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:02.127501011 CET1044354648154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:02.127567053 CET5464810443192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:07.093420029 CET546494433192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:07.098400116 CET443354649154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:07.098476887 CET546494433192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:08.421977043 CET546494433192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:08.427301884 CET443354649154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:08.427405119 CET443354649154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:08.427414894 CET443354649154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:08.427423954 CET443354649154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:08.783978939 CET443354649154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:08.825350046 CET546494433192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:08.862683058 CET546494433192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:08.867554903 CET443354649154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:08.867564917 CET443354649154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:08.867573023 CET443354649154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:08.867597103 CET443354649154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:08.867603064 CET546494433192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:08.872359037 CET443354649154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:23.138140917 CET546494433192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:23.138237000 CET546494433192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:23.143124104 CET443354649154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:23.143186092 CET546494433192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:28.092073917 CET5465010443192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:28.096945047 CET1044354650154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:28.097141027 CET5465010443192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:29.079698086 CET5465010443192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:29.084651947 CET1044354650154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:29.084665060 CET1044354650154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:29.084675074 CET1044354650154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:29.084882021 CET1044354650154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:29.635668039 CET1044354650154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:29.684748888 CET5465010443192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:29.967488050 CET5465010443192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:29.972436905 CET1044354650154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:29.972449064 CET1044354650154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:29.972460985 CET1044354650154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:29.972527981 CET1044354650154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:30.035533905 CET5465010443192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:30.040626049 CET1044354650154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:44.528723955 CET5465010443192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:44.528877020 CET5465010443192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:44.533576965 CET1044354650154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:44.535387039 CET5465010443192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:49.482064962 CET546514433192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:49.487061024 CET443354651154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:49.487397909 CET546514433192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:50.411772966 CET546514433192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:50.416695118 CET443354651154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:50.416717052 CET443354651154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:50.416753054 CET443354651154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:50.416790962 CET443354651154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:50.793350935 CET443354651154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:50.841021061 CET546514433192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:50.938977957 CET546514433192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:50.943788052 CET443354651154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:50.943799019 CET443354651154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:50.943809032 CET443354651154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:50.943927050 CET443354651154.91.90.234192.168.2.4
          Jan 8, 2025 05:54:50.958345890 CET546514433192.168.2.4154.91.90.234
          Jan 8, 2025 05:54:50.963279009 CET443354651154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:05.966101885 CET546514433192.168.2.4154.91.90.234
          Jan 8, 2025 05:55:05.970989943 CET443354651154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:06.273088932 CET443354651154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:06.372289896 CET546514433192.168.2.4154.91.90.234
          Jan 8, 2025 05:55:23.497359037 CET546514433192.168.2.4154.91.90.234
          Jan 8, 2025 05:55:23.497396946 CET546514433192.168.2.4154.91.90.234
          Jan 8, 2025 05:55:23.502289057 CET443354651154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:23.503403902 CET546514433192.168.2.4154.91.90.234
          Jan 8, 2025 05:55:28.480648994 CET5465210443192.168.2.4154.91.90.234
          Jan 8, 2025 05:55:28.485526085 CET1044354652154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:28.485603094 CET5465210443192.168.2.4154.91.90.234
          Jan 8, 2025 05:55:29.298566103 CET5465210443192.168.2.4154.91.90.234
          Jan 8, 2025 05:55:29.303502083 CET1044354652154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:29.303514957 CET1044354652154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:29.303523064 CET1044354652154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:29.303742886 CET1044354652154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:29.865904093 CET1044354652154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:29.919202089 CET5465210443192.168.2.4154.91.90.234
          Jan 8, 2025 05:55:30.021357059 CET5465210443192.168.2.4154.91.90.234
          Jan 8, 2025 05:55:30.026828051 CET1044354652154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:30.026839972 CET1044354652154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:30.026850939 CET1044354652154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:30.026860952 CET1044354652154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:30.026902914 CET5465210443192.168.2.4154.91.90.234
          Jan 8, 2025 05:55:30.031788111 CET1044354652154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:45.122459888 CET5465210443192.168.2.4154.91.90.234
          Jan 8, 2025 05:55:45.122613907 CET5465210443192.168.2.4154.91.90.234
          Jan 8, 2025 05:55:45.127371073 CET1044354652154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:45.129604101 CET5465210443192.168.2.4154.91.90.234
          Jan 8, 2025 05:55:50.091464043 CET546534433192.168.2.4154.91.90.234
          Jan 8, 2025 05:55:50.096494913 CET443354653154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:50.096566916 CET546534433192.168.2.4154.91.90.234
          Jan 8, 2025 05:55:50.887164116 CET546534433192.168.2.4154.91.90.234
          Jan 8, 2025 05:55:50.892015934 CET443354653154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:50.892026901 CET443354653154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:50.892041922 CET443354653154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:50.892348051 CET443354653154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:51.465368986 CET443354653154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:51.512984991 CET546534433192.168.2.4154.91.90.234
          Jan 8, 2025 05:55:51.551748037 CET546534433192.168.2.4154.91.90.234
          Jan 8, 2025 05:55:51.557617903 CET443354653154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:51.557687998 CET546534433192.168.2.4154.91.90.234
          Jan 8, 2025 05:55:51.557728052 CET443354653154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:51.557738066 CET443354653154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:51.557745934 CET443354653154.91.90.234192.168.2.4
          Jan 8, 2025 05:55:51.563563108 CET443354653154.91.90.234192.168.2.4
          TimestampSource PortDest PortSource IPDest IP
          Jan 8, 2025 05:52:40.301124096 CET5350440162.159.36.2192.168.2.4
          Jan 8, 2025 05:52:41.058515072 CET53572481.1.1.1192.168.2.4

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Target ID:0
          Start time:23:51:52
          Start date:07/01/2025
          Path:C:\Users\user\Desktop\yIR0BZUT2A.exe
          Wow64 process (32bit):false
          Commandline:"C:\Users\user\Desktop\yIR0BZUT2A.exe"
          Imagebase:0x7ff62a970000
          File size:390'656 bytes
          MD5 hash:D290CCCBC59F0FA1D5E5D36A88785795
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Reset < >

            Execution Graph

            Execution Coverage:8%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:45%
            Total number of Nodes:1152
            Total number of Limit Nodes:47
            execution_graph 22410 7ff62a9acfe0 RtlUnwindEx __GSHandlerCheck_SEH __GSHandlerCheckCommon 21092 7ff62a98e0e0 21115 7ff62a98dd80 21092->21115 21095 7ff62a98e101 21098 7ff62a98e241 21095->21098 21100 7ff62a98e11f 21095->21100 21096 7ff62a98e237 21135 7ff62a98e66c 7 API calls 2 library calls 21096->21135 21136 7ff62a98e66c 7 API calls 2 library calls 21098->21136 21101 7ff62a98e144 21100->21101 21106 7ff62a98e161 __scrt_release_startup_lock 21100->21106 21121 7ff62a99cde4 21100->21121 21102 7ff62a98e24c BuildCatchObjectHelperInternal 21104 7ff62a98e1ca 21125 7ff62a99c6ec 21104->21125 21106->21104 21132 7ff62a99bfd4 47 API calls 21106->21132 21108 7ff62a98e1cf 21131 7ff62a98bdf0 10 API calls 21108->21131 21110 7ff62a98e1ec 21133 7ff62a98e7c0 GetModuleHandleW 21110->21133 21112 7ff62a98e1f3 21112->21102 21134 7ff62a98df04 7 API calls 21112->21134 21114 7ff62a98e20a 21114->21101 21116 7ff62a98dd88 21115->21116 21117 7ff62a98dd94 __scrt_dllmain_crt_thread_attach 21116->21117 21118 7ff62a98dd9d 21117->21118 21119 7ff62a98dda1 21117->21119 21118->21095 21118->21096 21119->21118 21137 7ff62a9903c8 7 API calls 2 library calls 21119->21137 21122 7ff62a99cde9 21121->21122 21123 7ff62a99ce1a 21121->21123 21122->21123 21138 7ff62a971000 WSAStartup 21122->21138 21123->21106 21126 7ff62a99c6fc 21125->21126 21129 7ff62a99c711 21125->21129 21126->21129 21145 7ff62a99c3a8 50 API calls __free_lconv_num 21126->21145 21128 7ff62a99c71a 21128->21129 21146 7ff62a99c578 12 API calls 3 library calls 21128->21146 21129->21108 21131->21110 21132->21104 21133->21112 21134->21114 21135->21098 21136->21102 21137->21118 21141 7ff62a98df6c 21138->21141 21144 7ff62a98df30 50 API calls 21141->21144 21143 7ff62a97103a 21143->21122 21144->21143 21145->21128 21146->21129 21147 7ff62a98b5e0 21205 7ff62a999ebc 21147->21205 21150 7ff62a98b653 21153 7ff62a98b72f GetLocalTime wsprintfW SetUnhandledExceptionFilter 21150->21153 21154 7ff62a98b660 GetCurrentProcess OpenProcessToken 21150->21154 21151 7ff62a98b623 21152 7ff62a98dfb8 std::_Facet_Register 49 API calls 21151->21152 21155 7ff62a98b62d 21152->21155 21213 7ff62a998be0 21153->21213 21156 7ff62a98b67f LookupPrivilegeValueW AdjustTokenPrivileges CloseHandle 21154->21156 21157 7ff62a98b6d4 GetModuleHandleA GetProcAddress 21154->21157 21159 7ff62a998be0 52 API calls 21155->21159 21156->21157 21157->21153 21160 7ff62a98b6f9 GetCurrentProcessId OpenProcess 21157->21160 21162 7ff62a98b64a CloseHandle 21159->21162 21160->21153 21162->21150 21166 7ff62a98b7cc 21167 7ff62a98dfb8 std::_Facet_Register 49 API calls 21166->21167 21168 7ff62a98b7d9 21167->21168 21238 7ff62a97b410 CreateEventW 21168->21238 21170 7ff62a98b7e8 21271 7ff62a98ae60 RegOpenKeyExW 21170->21271 21173 7ff62a98b888 21177 7ff62a98b891 RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 21173->21177 21187 7ff62a98b90c 21173->21187 21174 7ff62a98b85a CheckTokenMembership 21175 7ff62a98b874 21174->21175 21176 7ff62a98b87b FreeSid 21174->21176 21175->21176 21176->21173 21177->21187 21178 7ff62a998a40 47 API calls std::_Locinfo::_Locinfo_ctor 21178->21187 21179 7ff62a999ebc ProcessCodePage 47 API calls 21180 7ff62a98ba23 SleepEx 21179->21180 21181 7ff62a999ebc ProcessCodePage 47 API calls 21180->21181 21181->21187 21182 7ff62a999ebc ProcessCodePage 47 API calls 21182->21187 21183 7ff62a98ba98 CreateEventA 21317 7ff62a998a40 21183->21317 21186 7ff62a98bb49 Sleep 21190 7ff62a98bb3d 21186->21190 21187->21178 21187->21179 21187->21182 21187->21183 21188 7ff62a98bbe9 CloseHandle 21187->21188 21187->21190 21191 7ff62a98bbfd 21187->21191 21304 7ff62a973820 ResetEvent timeGetTime socket 21187->21304 21326 7ff62a976370 21187->21326 21188->21187 21189 7ff62a98bb7f Sleep 21189->21187 21190->21186 21190->21188 21190->21189 21451 7ff62a993ff8 21191->21451 21206 7ff62a999eec 21205->21206 21456 7ff62a999720 21206->21456 21209 7ff62a999f40 21211 7ff62a98b60b SleepEx 21209->21211 21476 7ff62a993bec 47 API calls 2 library calls 21209->21476 21211->21150 21211->21151 21214 7ff62a998c00 21213->21214 21215 7ff62a998c17 21213->21215 21492 7ff62a998d9c 11 API calls _get_daylight 21214->21492 21485 7ff62a998b7c 21215->21485 21218 7ff62a998c05 21493 7ff62a993fd8 47 API calls _invalid_parameter_noinfo_noreturn 21218->21493 21221 7ff62a98b7aa CloseHandle 21231 7ff62a98dfb8 21221->21231 21222 7ff62a998c2a CreateThread 21222->21221 21223 7ff62a998c5a GetLastError 21222->21223 21494 7ff62a998d10 11 API calls 2 library calls 21223->21494 21225 7ff62a998c67 21226 7ff62a998c70 CloseHandle 21225->21226 21227 7ff62a998c76 21225->21227 21226->21227 21228 7ff62a998c7f FreeLibrary 21227->21228 21229 7ff62a998c85 21227->21229 21228->21229 21495 7ff62a99e95c 21229->21495 21232 7ff62a98dfc3 21231->21232 21232->21231 21233 7ff62a98b7bd 21232->21233 21513 7ff62a99ccd0 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 21232->21513 21514 7ff62a98ccb0 RtlPcToFileHeader RaiseException _com_raise_error std::bad_alloc::bad_alloc 21232->21514 21515 7ff62a9719d0 49 API calls 2 library calls 21232->21515 21237 7ff62a9736e0 WSAStartup CreateEventW 21233->21237 21237->21166 21239 7ff62a97b457 21238->21239 21269 7ff62a97b7b0 21238->21269 21516 7ff62a971200 21239->21516 21243 7ff62a97b7bb 21534 7ff62a9710f0 RtlPcToFileHeader RaiseException _com_raise_error 21243->21534 21245 7ff62a97b7c6 21535 7ff62a9710f0 RtlPcToFileHeader RaiseException _com_raise_error 21245->21535 21246 7ff62a97b4d2 HeapCreate 21246->21245 21247 7ff62a97b521 __std_exception_destroy 21246->21247 21249 7ff62a97b560 InitializeCriticalSectionAndSpinCount 21247->21249 21250 7ff62a97b7d1 21249->21250 21251 7ff62a97b57d CreateEventW 21249->21251 21536 7ff62a9710f0 RtlPcToFileHeader RaiseException _com_raise_error 21250->21536 21253 7ff62a97b7dc 21251->21253 21254 7ff62a97b5b8 CreateEventW 21251->21254 21537 7ff62a9710f0 RtlPcToFileHeader RaiseException _com_raise_error 21253->21537 21255 7ff62a97b7e7 21254->21255 21256 7ff62a97b5d8 CreateEventW 21254->21256 21538 7ff62a9710f0 RtlPcToFileHeader RaiseException _com_raise_error 21255->21538 21258 7ff62a97b5f8 InitializeCriticalSectionAndSpinCount 21256->21258 21259 7ff62a97b7f2 21256->21259 21261 7ff62a97b6c1 InitializeCriticalSectionAndSpinCount 21258->21261 21262 7ff62a97b7fd 21258->21262 21539 7ff62a9710f0 RtlPcToFileHeader RaiseException _com_raise_error 21259->21539 21265 7ff62a97b7a6 21261->21265 21266 7ff62a97b6d5 timeGetTime CreateEventW CreateEventW 21261->21266 21540 7ff62a9710f0 RtlPcToFileHeader RaiseException _com_raise_error 21262->21540 21532 7ff62a9710f0 RtlPcToFileHeader RaiseException _com_raise_error 21265->21532 21270 7ff62a97b77e 21266->21270 21533 7ff62a9710f0 RtlPcToFileHeader RaiseException _com_raise_error 21269->21533 21270->21170 21272 7ff62a98ae9f RegQueryValueExW 21271->21272 21273 7ff62a98aecc memcpy_s 21271->21273 21272->21273 21274 7ff62a98af02 RegQueryValueExW lstrlenW 21273->21274 21302 7ff62a98b551 AllocateAndInitializeSid 21273->21302 21543 7ff62a9ada50 21274->21543 21276 7ff62a98af50 lstrlenW lstrlenW 21277 7ff62a98aff8 lstrlenW 21276->21277 21284 7ff62a98af79 BuildCatchObjectHelperInternal 21276->21284 21278 7ff62a9ada50 memcpy_s 21277->21278 21279 7ff62a98b01d lstrlenW lstrlenW 21278->21279 21280 7ff62a98b0c8 lstrlenW lstrlenW 21279->21280 21283 7ff62a98b04a BuildCatchObjectHelperInternal 21279->21283 21281 7ff62a98b15a lstrlenW 21280->21281 21289 7ff62a98b0f1 21280->21289 21282 7ff62a9ada50 memcpy_s 21281->21282 21285 7ff62a98b17f lstrlenW lstrlenW 21282->21285 21283->21280 21284->21277 21286 7ff62a98b228 lstrlenW 21285->21286 21292 7ff62a98b1ac BuildCatchObjectHelperInternal 21285->21292 21287 7ff62a9ada50 memcpy_s 21286->21287 21288 7ff62a98b24d lstrlenW lstrlenW 21287->21288 21290 7ff62a98b2f8 lstrlenW lstrlenW 21288->21290 21297 7ff62a98b27a BuildCatchObjectHelperInternal 21288->21297 21289->21281 21291 7ff62a98b38a lstrlenW 21290->21291 21299 7ff62a98b321 21290->21299 21293 7ff62a9ada50 memcpy_s 21291->21293 21292->21286 21294 7ff62a98b3af lstrlenW lstrlenW 21293->21294 21295 7ff62a98b458 lstrlenW 21294->21295 21301 7ff62a98b3dc BuildCatchObjectHelperInternal 21294->21301 21296 7ff62a9ada50 memcpy_s 21295->21296 21298 7ff62a98b47d lstrlenW lstrlenW 21296->21298 21297->21290 21300 7ff62a98b528 lstrlenW lstrlenW 21298->21300 21303 7ff62a98b4aa BuildCatchObjectHelperInternal 21298->21303 21299->21291 21300->21302 21301->21295 21302->21173 21302->21174 21303->21300 21305 7ff62a973ad9 21304->21305 21306 7ff62a973893 lstrlenW WideCharToMultiByte 21304->21306 21305->21187 21307 7ff62a98dff4 21306->21307 21308 7ff62a9738d4 lstrlenW WideCharToMultiByte gethostbyname 21307->21308 21309 7ff62a97391d 21308->21309 21309->21305 21310 7ff62a97392e htons connect 21309->21310 21310->21305 21311 7ff62a973971 setsockopt setsockopt setsockopt setsockopt 21310->21311 21312 7ff62a973a86 21311->21312 21313 7ff62a973a37 WSAIoctl 21311->21313 21314 7ff62a998be0 52 API calls 21312->21314 21313->21312 21315 7ff62a973ab0 21314->21315 21316 7ff62a998be0 52 API calls 21315->21316 21316->21305 21318 7ff62a998a57 21317->21318 21319 7ff62a998a4d 21317->21319 21545 7ff62a998d9c 11 API calls _get_daylight 21318->21545 21319->21318 21323 7ff62a998a73 21319->21323 21322 7ff62a998a6b 21322->21187 21323->21322 21547 7ff62a998d9c 11 API calls _get_daylight 21323->21547 21325 7ff62a998a5f 21546 7ff62a993fd8 47 API calls _invalid_parameter_noinfo_noreturn 21325->21546 21327 7ff62a97639d std::_Locinfo::_Locinfo_ctor 21326->21327 21328 7ff62a98dfb8 std::_Facet_Register 49 API calls 21327->21328 21329 7ff62a9763aa memcpy_s 21328->21329 21330 7ff62a9763de memcpy_s 21329->21330 21331 7ff62a998a40 std::_Locinfo::_Locinfo_ctor 47 API calls 21329->21331 21332 7ff62a9763f6 gethostname gethostbyname 21330->21332 21331->21330 21333 7ff62a976432 inet_ntoa 21332->21333 21334 7ff62a9764cf 8 API calls 21332->21334 21687 7ff62a9991f8 47 API calls 2 library calls 21333->21687 21335 7ff62a9766dc GetSystemInfo wsprintfW 21334->21335 21336 7ff62a9765be GetProcAddress 21334->21336 21340 7ff62a976720 GetDriveTypeW 21335->21340 21338 7ff62a9765d7 21336->21338 21339 7ff62a9766d3 FreeLibrary 21336->21339 21548 7ff62a973670 21338->21548 21339->21335 21342 7ff62a976778 21340->21342 21343 7ff62a976741 GetDiskFreeSpaceExW 21340->21343 21341 7ff62a976455 21688 7ff62a9991f8 47 API calls 2 library calls 21341->21688 21342->21340 21345 7ff62a97677f GlobalMemoryStatusEx 21342->21345 21343->21342 21347 7ff62a973670 50 API calls 21345->21347 21349 7ff62a9767e2 21347->21349 21348 7ff62a976620 21552 7ff62a979300 GetModuleHandleW GetProcAddress 21348->21552 21351 7ff62a973670 50 API calls 21349->21351 21350 7ff62a976480 inet_ntoa 21689 7ff62a9991f8 47 API calls 2 library calls 21350->21689 21354 7ff62a976806 21351->21354 21353 7ff62a97646d 21353->21334 21353->21350 21690 7ff62a9991f8 47 API calls 2 library calls 21353->21690 21556 7ff62a978f60 CreateDXGIFactory 21354->21556 21358 7ff62a976819 GetForegroundWindow 21360 7ff62a97683a lstrlenW 21358->21360 21361 7ff62a976824 GetWindowTextW 21358->21361 21568 7ff62a978e30 21360->21568 21361->21360 21363 7ff62a9766a2 21364 7ff62a9766c0 RegCloseKey 21363->21364 21368 7ff62a9994e8 std::_Locinfo::_Locinfo_ctor 47 API calls 21363->21368 21366 7ff62a98df84 21364->21366 21366->21339 21367 7ff62a97687a 21369 7ff62a9768a3 21367->21369 21370 7ff62a97687f GetLocalTime wsprintfW 21367->21370 21368->21364 21371 7ff62a998a40 std::_Locinfo::_Locinfo_ctor 47 API calls 21369->21371 21370->21369 21372 7ff62a9768bb lstrlenW 21371->21372 21373 7ff62a978e30 6 API calls 21372->21373 21374 7ff62a9768df 21373->21374 21375 7ff62a9768f8 GetModuleHandleW GetProcAddress 21374->21375 21376 7ff62a998a40 std::_Locinfo::_Locinfo_ctor 47 API calls 21374->21376 21377 7ff62a97692d GetNativeSystemInfo 21375->21377 21378 7ff62a976931 GetSystemInfo 21375->21378 21376->21375 21379 7ff62a976937 wsprintfW 21377->21379 21378->21379 21577 7ff62a978c30 21379->21577 21382 7ff62a976986 GetCurrentProcessId 21383 7ff62a97699c OpenProcess 21382->21383 21384 7ff62a976ade CoInitializeEx CoCreateInstance 21382->21384 21386 7ff62a9769bd K32GetProcessImageFileNameW 21383->21386 21387 7ff62a976ad7 21383->21387 21385 7ff62a976c0f 21384->21385 21415 7ff62a976b15 21384->21415 21390 7ff62a998a40 std::_Locinfo::_Locinfo_ctor 47 API calls 21385->21390 21388 7ff62a9769db GetLogicalDriveStringsW 21386->21388 21389 7ff62a976ace CloseHandle 21386->21389 21387->21384 21391 7ff62a976abe lstrcpyW 21388->21391 21406 7ff62a9769f5 21388->21406 21389->21387 21392 7ff62a976c2b memcpy_s 21390->21392 21391->21389 21394 7ff62a976c46 RegOpenKeyExW 21392->21394 21393 7ff62a976a10 lstrcmpiW 21395 7ff62a976a32 lstrcmpiW 21393->21395 21393->21406 21396 7ff62a976c75 RegQueryInfoKeyW 21394->21396 21397 7ff62a976dd2 lstrlenW 21394->21397 21398 7ff62a976a46 QueryDosDeviceW 21395->21398 21395->21406 21399 7ff62a976e02 21396->21399 21409 7ff62a976cd5 memcpy_s 21396->21409 21397->21399 21400 7ff62a976de4 21397->21400 21398->21389 21401 7ff62a976a80 lstrlenW 21398->21401 21606 7ff62a977a60 21399->21606 21597 7ff62a9994e8 21400->21597 21691 7ff62a99934c 53 API calls 3 library calls 21401->21691 21404 7ff62a976bfe CoUninitialize 21404->21385 21406->21391 21406->21393 21408 7ff62a976f0d lstrcpyW lstrcatW 21406->21408 21408->21389 21409->21397 21412 7ff62a976dc7 RegCloseKey 21409->21412 21419 7ff62a976d34 RegEnumKeyExW lstrlenW 21409->21419 21422 7ff62a998dc4 47 API calls std::_Locinfo::_Locinfo_ctor 21409->21422 21410 7ff62a9994e8 std::_Locinfo::_Locinfo_ctor 47 API calls 21411 7ff62a976e21 GetTickCount 21410->21411 21624 7ff62a998e3c GetSystemTimeAsFileTime 21411->21624 21412->21397 21415->21385 21415->21404 21418 7ff62a976bb6 SysFreeString 21415->21418 21418->21415 21419->21409 21421 7ff62a976d77 lstrlenW 21419->21421 21420 7ff62a976eff 21631 7ff62a9772d0 21420->21631 21421->21409 21422->21409 21424 7ff62a976f51 lstrlenW 21425 7ff62a978e30 6 API calls 21424->21425 21426 7ff62a976f8a 21425->21426 21427 7ff62a977067 CreateToolhelp32Snapshot 21426->21427 21428 7ff62a976f93 6 API calls 21426->21428 21431 7ff62a977108 CreateToolhelp32Snapshot 21427->21431 21432 7ff62a977081 memcpy_s 21427->21432 21429 7ff62a97705a RegCloseKey 21428->21429 21430 7ff62a977018 lstrlenW RegSetValueExW 21428->21430 21429->21427 21430->21429 21434 7ff62a97704d RegCloseKey 21430->21434 21436 7ff62a97712b memcpy_s 21431->21436 21437 7ff62a9771b8 CreateToolhelp32Snapshot 21431->21437 21435 7ff62a977095 Process32FirstW 21432->21435 21434->21429 21435->21431 21443 7ff62a9770b3 21435->21443 21441 7ff62a97713f Process32FirstW 21436->21441 21439 7ff62a9771db memcpy_s 21437->21439 21440 7ff62a977264 21437->21440 21445 7ff62a9771ef Process32FirstW 21439->21445 21671 7ff62a973e30 GetCurrentThreadId 21440->21671 21441->21437 21446 7ff62a97715d 21441->21446 21442 7ff62a97729c 21442->21187 21443->21431 21444 7ff62a9770f4 Process32NextW 21443->21444 21444->21431 21444->21443 21445->21440 21448 7ff62a97720d 21445->21448 21446->21437 21447 7ff62a9771a4 Process32NextW 21446->21447 21447->21437 21447->21446 21448->21440 21449 7ff62a977250 Process32NextW 21448->21449 21449->21440 21449->21448 21989 7ff62a993e70 47 API calls _invalid_parameter_noinfo_noreturn 21451->21989 21453 7ff62a994011 21454 7ff62a994028 _invalid_parameter_noinfo_noreturn 17 API calls 21453->21454 21455 7ff62a994026 21454->21455 21457 7ff62a999758 21456->21457 21458 7ff62a99976a 21456->21458 21477 7ff62a998d9c 11 API calls _get_daylight 21457->21477 21459 7ff62a9997b4 21458->21459 21461 7ff62a999778 21458->21461 21462 7ff62a9997cf ProcessCodePage 21459->21462 21480 7ff62a998400 47 API calls 2 library calls 21459->21480 21479 7ff62a993f0c 47 API calls _invalid_parameter_noinfo_noreturn 21461->21479 21467 7ff62a999b55 21462->21467 21481 7ff62a998d9c 11 API calls _get_daylight 21462->21481 21463 7ff62a99975d 21478 7ff62a993fd8 47 API calls _invalid_parameter_noinfo_noreturn 21463->21478 21473 7ff62a999768 21467->21473 21483 7ff62a998d9c 11 API calls _get_daylight 21467->21483 21470 7ff62a999b4a 21482 7ff62a993fd8 47 API calls _invalid_parameter_noinfo_noreturn 21470->21482 21471 7ff62a999de6 21484 7ff62a993fd8 47 API calls _invalid_parameter_noinfo_noreturn 21471->21484 21473->21209 21475 7ff62a993bec 47 API calls 2 library calls 21473->21475 21475->21209 21476->21211 21477->21463 21478->21473 21479->21473 21480->21462 21481->21470 21482->21467 21483->21471 21484->21473 21501 7ff62a9a0a28 21485->21501 21488 7ff62a99e95c __free_lconv_num 11 API calls 21489 7ff62a998ba8 21488->21489 21490 7ff62a998bb1 GetModuleHandleExW 21489->21490 21491 7ff62a998bad 21489->21491 21490->21491 21491->21221 21491->21222 21492->21218 21493->21221 21494->21225 21496 7ff62a99e961 RtlFreeHeap 21495->21496 21497 7ff62a99e990 21495->21497 21496->21497 21498 7ff62a99e97c GetLastError 21496->21498 21497->21221 21499 7ff62a99e989 __free_lconv_num 21498->21499 21512 7ff62a998d9c 11 API calls _get_daylight 21499->21512 21502 7ff62a9a0a39 21501->21502 21508 7ff62a9a0a47 _get_daylight 21501->21508 21503 7ff62a9a0a8a 21502->21503 21502->21508 21511 7ff62a998d9c 11 API calls _get_daylight 21503->21511 21504 7ff62a9a0a6e HeapAlloc 21505 7ff62a9a0a88 21504->21505 21504->21508 21507 7ff62a998b9e 21505->21507 21507->21488 21508->21503 21508->21504 21510 7ff62a99ccd0 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 21508->21510 21510->21508 21511->21507 21512->21497 21513->21232 21515->21232 21517 7ff62a971270 21516->21517 21518 7ff62a971221 21516->21518 21520 7ff62a9712f3 21517->21520 21542 7ff62a98dccc AcquireSRWLockExclusive SleepConditionVariableSRW ReleaseSRWLockExclusive 21517->21542 21541 7ff62a98dccc AcquireSRWLockExclusive SleepConditionVariableSRW ReleaseSRWLockExclusive 21518->21541 21520->21243 21520->21246 21544 7ff62a9ada40 21543->21544 21544->21276 21544->21544 21545->21325 21546->21322 21547->21325 21549 7ff62a973695 21548->21549 21692 7ff62a99892c 21549->21692 21553 7ff62a97933d GetNativeSystemInfo 21552->21553 21554 7ff62a979341 GetSystemInfo 21552->21554 21555 7ff62a976642 RegOpenKeyExW RegQueryValueExW 21553->21555 21554->21555 21555->21363 21555->21364 21558 7ff62a9792a3 21556->21558 21562 7ff62a978fba 21556->21562 21557 7ff62a9792d5 21557->21358 21558->21557 21559 7ff62a993ff8 _invalid_parameter_noinfo_noreturn 47 API calls 21558->21559 21560 7ff62a9792f6 21559->21560 21563 7ff62a993ff8 _invalid_parameter_noinfo_noreturn 47 API calls 21560->21563 21565 7ff62a979035 21562->21565 21706 7ff62a97a4c0 49 API calls BuildCatchObjectHelperInternal 21562->21706 21564 7ff62a9792fc 21563->21564 21565->21558 21565->21560 21567 7ff62a973670 50 API calls 21565->21567 21707 7ff62a97a4c0 49 API calls BuildCatchObjectHelperInternal 21565->21707 21567->21565 21569 7ff62a9ada50 memcpy_s 21568->21569 21570 7ff62a978e71 RegOpenKeyExW 21569->21570 21571 7ff62a978ea6 21570->21571 21575 7ff62a978e9c 21570->21575 21572 7ff62a978f28 RegCloseKey RegCloseKey 21571->21572 21573 7ff62a978eb4 RegQueryValueExW 21571->21573 21572->21367 21573->21572 21574 7ff62a978ef3 lstrcmpW 21573->21574 21574->21575 21576 7ff62a978f10 lstrcpyW 21574->21576 21575->21572 21576->21572 21578 7ff62a98dff4 21577->21578 21579 7ff62a978c48 GetCurrentProcessId wsprintfW 21578->21579 21708 7ff62a978a40 GetCurrentProcessId OpenProcess 21579->21708 21581 7ff62a978c70 memcpy_s 21582 7ff62a978c84 GetVersionExW 21581->21582 21583 7ff62a978df2 21582->21583 21584 7ff62a978c9f 21582->21584 21585 7ff62a978df9 wsprintfW 21583->21585 21584->21583 21587 7ff62a978cb5 GetCurrentProcess OpenProcessToken 21584->21587 21586 7ff62a978e09 21585->21586 21586->21382 21587->21583 21588 7ff62a978ce1 GetTokenInformation 21587->21588 21589 7ff62a978d9c CloseHandle 21588->21589 21590 7ff62a978d16 GetLastError 21588->21590 21589->21583 21596 7ff62a978dae 21589->21596 21590->21589 21591 7ff62a978d21 LocalAlloc 21590->21591 21592 7ff62a978d94 21591->21592 21593 7ff62a978d43 GetTokenInformation 21591->21593 21592->21589 21594 7ff62a978d8b LocalFree 21593->21594 21595 7ff62a978d72 GetSidSubAuthorityCount GetSidSubAuthority 21593->21595 21594->21592 21595->21594 21596->21585 21596->21586 21602 7ff62a999505 21597->21602 21598 7ff62a99950a 21599 7ff62a999520 21598->21599 21828 7ff62a998d9c 11 API calls _get_daylight 21598->21828 21599->21399 21601 7ff62a999514 21829 7ff62a993fd8 47 API calls _invalid_parameter_noinfo_noreturn 21601->21829 21602->21598 21602->21599 21604 7ff62a999556 21602->21604 21604->21599 21830 7ff62a998d9c 11 API calls _get_daylight 21604->21830 21609 7ff62a977a93 memcpy_s 21606->21609 21607 7ff62a977b7c CoCreateInstance 21608 7ff62a977da1 lstrlenW 21607->21608 21620 7ff62a977bad memcpy_s 21607->21620 21610 7ff62a977dae lstrcatW 21608->21610 21611 7ff62a976e07 21608->21611 21609->21607 21612 7ff62a977ae4 CreateToolhelp32Snapshot 21609->21612 21616 7ff62a977de5 CloseHandle 21609->21616 21617 7ff62a977b3f Process32NextW 21609->21617 21610->21611 21611->21410 21612->21609 21614 7ff62a977afa Process32FirstW 21612->21614 21613 7ff62a977d8f 21613->21608 21614->21609 21615 7ff62a977b4d CloseHandle 21614->21615 21615->21609 21616->21609 21619 7ff62a977df5 lstrcatW lstrcatW 21616->21619 21617->21609 21617->21615 21618 7ff62a977c35 wsprintfW RegOpenKeyExW 21618->21620 21619->21609 21620->21613 21620->21618 21621 7ff62a977cf7 RegQueryValueExW 21620->21621 21622 7ff62a977d60 RegCloseKey 21621->21622 21623 7ff62a977d40 lstrcatW lstrcatW 21621->21623 21622->21620 21623->21622 21625 7ff62a976e32 21624->21625 21626 7ff62a9991b0 21625->21626 21831 7ff62a9a1a1c 21626->21831 21630 7ff62a976e52 wsprintfW GetLocaleInfoW GetSystemDirectoryW GetCurrentHwProfileW 21630->21420 21632 7ff62a977330 21631->21632 21632->21632 21634 7ff62a977346 BuildCatchObjectHelperInternal 21632->21634 21946 7ff62a97a300 49 API calls 4 library calls 21632->21946 21636 7ff62a977392 BuildCatchObjectHelperInternal 21634->21636 21947 7ff62a97a300 49 API calls 4 library calls 21634->21947 21636->21636 21638 7ff62a977401 BuildCatchObjectHelperInternal 21636->21638 21948 7ff62a97a300 49 API calls 4 library calls 21636->21948 21640 7ff62a977474 BuildCatchObjectHelperInternal 21638->21640 21949 7ff62a97a300 49 API calls 4 library calls 21638->21949 21642 7ff62a9774cf BuildCatchObjectHelperInternal 21640->21642 21950 7ff62a97a300 49 API calls 4 library calls 21640->21950 21644 7ff62a977550 BuildCatchObjectHelperInternal 21642->21644 21951 7ff62a97a300 49 API calls 4 library calls 21642->21951 21646 7ff62a9775c0 BuildCatchObjectHelperInternal 21644->21646 21952 7ff62a97a300 49 API calls 4 library calls 21644->21952 21940 7ff62a989be0 21646->21940 21649 7ff62a97772d 21649->21424 21650 7ff62a9776b6 21650->21649 21651 7ff62a977758 21650->21651 21654 7ff62a993ff8 _invalid_parameter_noinfo_noreturn 47 API calls 21650->21654 21652 7ff62a993ff8 _invalid_parameter_noinfo_noreturn 47 API calls 21651->21652 21653 7ff62a97775e CreateMutexExW GetLastError 21652->21653 21655 7ff62a9777c9 21653->21655 21656 7ff62a977799 21653->21656 21654->21651 21658 7ff62a977870 9 API calls 21655->21658 21659 7ff62a9777e0 lstrlenW 21655->21659 21657 7ff62a9777a0 Sleep CreateMutexW GetLastError 21656->21657 21657->21655 21657->21657 21660 7ff62a97792d ReleaseMutex DirectInput8Create 21658->21660 21661 7ff62a977924 DeleteFileW 21658->21661 21663 7ff62a978e30 6 API calls 21659->21663 21662 7ff62a977a00 21660->21662 21667 7ff62a977963 21660->21667 21661->21660 21662->21424 21664 7ff62a97783e 21663->21664 21665 7ff62a977858 SleepEx 21664->21665 21666 7ff62a977842 lstrcmpW 21664->21666 21665->21658 21665->21659 21666->21658 21666->21665 21667->21662 21668 7ff62a977a1f GetTickCount GetKeyState 21667->21668 21953 7ff62a97adb0 37 API calls 3 library calls 21668->21953 21672 7ff62a973e5c 21671->21672 21970 7ff62a971670 21672->21970 21674 7ff62a973e9b 21675 7ff62a971670 2 API calls 21674->21675 21676 7ff62a973ec4 21675->21676 21977 7ff62a971500 21676->21977 21678 7ff62a973efa 21679 7ff62a973f06 21678->21679 21680 7ff62a973f1a 21678->21680 21681 7ff62a973fa1 21679->21681 21682 7ff62a973f80 send 21679->21682 21680->21679 21680->21681 21684 7ff62a973f30 send 21680->21684 21983 7ff62a971730 21681->21983 21682->21679 21682->21681 21684->21680 21685 7ff62a973fba GetCurrentThreadId 21686 7ff62a973fca 21685->21686 21686->21442 21687->21341 21688->21353 21689->21353 21690->21353 21691->21406 21693 7ff62a998965 21692->21693 21696 7ff62a9989a8 21693->21696 21702 7ff62a994280 50 API calls 3 library calls 21693->21702 21697 7ff62a9989e7 21696->21697 21703 7ff62a993f0c 47 API calls _invalid_parameter_noinfo_noreturn 21696->21703 21698 7ff62a998a0d 21697->21698 21704 7ff62a993bec 47 API calls 2 library calls 21697->21704 21699 7ff62a9736b4 21698->21699 21705 7ff62a993bec 47 API calls 2 library calls 21698->21705 21699->21348 21702->21696 21703->21697 21704->21698 21705->21699 21706->21562 21707->21565 21709 7ff62a978a99 21708->21709 21710 7ff62a978a71 OpenProcessToken 21708->21710 21709->21581 21711 7ff62a978a90 CloseHandle 21710->21711 21712 7ff62a978aaf 21710->21712 21711->21709 21747 7ff62a978710 21712->21747 21714 7ff62a978acd 21715 7ff62a978b03 21714->21715 21716 7ff62a978ae9 21714->21716 21717 7ff62a978ae1 SysStringLen 21714->21717 21718 7ff62a978b4c BuildCatchObjectHelperInternal 21715->21718 21719 7ff62a98dfb8 std::_Facet_Register 49 API calls 21715->21719 21716->21715 21720 7ff62a978af9 SysStringLen 21716->21720 21717->21716 21722 7ff62a978b5a CloseHandle CloseHandle 21718->21722 21721 7ff62a978b1e 21719->21721 21720->21715 21721->21718 21728 7ff62a978c20 21721->21728 21723 7ff62a978b88 21722->21723 21724 7ff62a978baa 21722->21724 21723->21724 21725 7ff62a978ba1 SysFreeString 21723->21725 21726 7ff62a978be5 SysFreeString 21724->21726 21727 7ff62a978bee 21724->21727 21725->21724 21726->21727 21727->21581 21729 7ff62a978c48 GetCurrentProcessId wsprintfW 21728->21729 21730 7ff62a978a40 87 API calls 21729->21730 21731 7ff62a978c70 memcpy_s 21730->21731 21732 7ff62a978c84 GetVersionExW 21731->21732 21733 7ff62a978df2 21732->21733 21734 7ff62a978c9f 21732->21734 21735 7ff62a978df9 wsprintfW 21733->21735 21734->21733 21737 7ff62a978cb5 GetCurrentProcess OpenProcessToken 21734->21737 21736 7ff62a978e09 21735->21736 21736->21581 21737->21733 21738 7ff62a978ce1 GetTokenInformation 21737->21738 21739 7ff62a978d9c CloseHandle 21738->21739 21740 7ff62a978d16 GetLastError 21738->21740 21739->21733 21746 7ff62a978dae 21739->21746 21740->21739 21741 7ff62a978d21 LocalAlloc 21740->21741 21742 7ff62a978d94 21741->21742 21743 7ff62a978d43 GetTokenInformation 21741->21743 21742->21739 21744 7ff62a978d8b LocalFree 21743->21744 21745 7ff62a978d72 GetSidSubAuthorityCount GetSidSubAuthority 21743->21745 21744->21742 21745->21744 21746->21735 21746->21736 21748 7ff62a978750 21747->21748 21751 7ff62a978794 21748->21751 21824 7ff62a976300 21748->21824 21750 7ff62a97875d 21752 7ff62a98dfb8 std::_Facet_Register 49 API calls 21750->21752 21753 7ff62a976300 SysFreeString 21751->21753 21764 7ff62a9787f1 21751->21764 21784 7ff62a9789ff 21751->21784 21754 7ff62a978767 21752->21754 21756 7ff62a9787ba 21753->21756 21754->21751 21757 7ff62a978774 SysAllocString 21754->21757 21755 7ff62a97880e GetTokenInformation 21758 7ff62a97886c GetTokenInformation 21755->21758 21759 7ff62a978833 GetLastError 21755->21759 21760 7ff62a98dfb8 std::_Facet_Register 49 API calls 21756->21760 21757->21751 21757->21784 21763 7ff62a97889a LookupAccountSidW 21758->21763 21782 7ff62a9788f7 21758->21782 21762 7ff62a978842 GetProcessHeap HeapAlloc 21759->21762 21759->21784 21761 7ff62a9787c4 21760->21761 21761->21764 21765 7ff62a9787d1 SysAllocString 21761->21765 21762->21758 21762->21784 21767 7ff62a97891b 21763->21767 21768 7ff62a9788d4 GetLastError 21763->21768 21764->21755 21764->21784 21765->21764 21765->21784 21766 7ff62a9789eb GetProcessHeap HeapFree 21766->21784 21771 7ff62a97896e 21767->21771 21772 7ff62a976300 SysFreeString 21767->21772 21769 7ff62a9788fc 21768->21769 21770 7ff62a9788e1 21768->21770 21769->21714 21773 7ff62a998a40 std::_Locinfo::_Locinfo_ctor 47 API calls 21770->21773 21776 7ff62a976300 SysFreeString 21771->21776 21771->21782 21771->21784 21774 7ff62a978935 21772->21774 21773->21782 21775 7ff62a98dfb8 std::_Facet_Register 49 API calls 21774->21775 21777 7ff62a97893f 21775->21777 21778 7ff62a97899c 21776->21778 21777->21771 21780 7ff62a97894c SysAllocString 21777->21780 21779 7ff62a98dfb8 std::_Facet_Register 49 API calls 21778->21779 21781 7ff62a9789a6 21779->21781 21780->21771 21780->21784 21781->21782 21783 7ff62a9789b3 SysAllocString 21781->21783 21782->21766 21782->21784 21783->21782 21783->21784 21785 7ff62a978a40 GetCurrentProcessId OpenProcess 21784->21785 21786 7ff62a978a99 21785->21786 21787 7ff62a978a71 OpenProcessToken 21785->21787 21786->21714 21788 7ff62a978a90 CloseHandle 21787->21788 21789 7ff62a978aaf 21787->21789 21788->21786 21790 7ff62a978710 74 API calls 21789->21790 21791 7ff62a978acd 21790->21791 21792 7ff62a978b03 21791->21792 21793 7ff62a978ae9 21791->21793 21794 7ff62a978ae1 SysStringLen 21791->21794 21795 7ff62a978b4c BuildCatchObjectHelperInternal 21792->21795 21796 7ff62a98dfb8 std::_Facet_Register 49 API calls 21792->21796 21793->21792 21797 7ff62a978af9 SysStringLen 21793->21797 21794->21793 21799 7ff62a978b5a CloseHandle CloseHandle 21795->21799 21798 7ff62a978b1e 21796->21798 21797->21792 21798->21795 21805 7ff62a978c20 21798->21805 21800 7ff62a978b88 21799->21800 21801 7ff62a978baa 21799->21801 21800->21801 21802 7ff62a978ba1 SysFreeString 21800->21802 21803 7ff62a978be5 SysFreeString 21801->21803 21804 7ff62a978bee 21801->21804 21802->21801 21803->21804 21804->21714 21806 7ff62a978c48 GetCurrentProcessId wsprintfW 21805->21806 21807 7ff62a978a40 74 API calls 21806->21807 21808 7ff62a978c70 memcpy_s 21807->21808 21809 7ff62a978c84 GetVersionExW 21808->21809 21810 7ff62a978df2 21809->21810 21811 7ff62a978c9f 21809->21811 21812 7ff62a978df9 wsprintfW 21810->21812 21811->21810 21814 7ff62a978cb5 GetCurrentProcess OpenProcessToken 21811->21814 21813 7ff62a978e09 21812->21813 21813->21714 21814->21810 21815 7ff62a978ce1 GetTokenInformation 21814->21815 21816 7ff62a978d9c CloseHandle 21815->21816 21817 7ff62a978d16 GetLastError 21815->21817 21816->21810 21823 7ff62a978dae 21816->21823 21817->21816 21818 7ff62a978d21 LocalAlloc 21817->21818 21819 7ff62a978d94 21818->21819 21820 7ff62a978d43 GetTokenInformation 21818->21820 21819->21816 21821 7ff62a978d8b LocalFree 21820->21821 21822 7ff62a978d72 GetSidSubAuthorityCount GetSidSubAuthority 21820->21822 21821->21819 21822->21821 21823->21812 21823->21813 21825 7ff62a976339 21824->21825 21826 7ff62a976315 21824->21826 21825->21750 21826->21825 21827 7ff62a97632c SysFreeString 21826->21827 21827->21825 21828->21601 21829->21599 21830->21601 21871 7ff62a99ee88 GetLastError 21831->21871 21833 7ff62a9a1a27 21834 7ff62a9991c7 21833->21834 21839 7ff62a9a1a4b 21833->21839 21888 7ff62a99f070 21833->21888 21834->21630 21840 7ff62a998eb0 21834->21840 21838 7ff62a99e95c __free_lconv_num 11 API calls 21838->21839 21839->21834 21895 7ff62a998d9c 11 API calls _get_daylight 21839->21895 21841 7ff62a998ee1 21840->21841 21842 7ff62a998ec6 21840->21842 21841->21842 21844 7ff62a998efa 21841->21844 21915 7ff62a998d9c 11 API calls _get_daylight 21842->21915 21846 7ff62a998f00 21844->21846 21849 7ff62a998f1d 21844->21849 21845 7ff62a998ecb 21916 7ff62a993fd8 47 API calls _invalid_parameter_noinfo_noreturn 21845->21916 21917 7ff62a998d9c 11 API calls _get_daylight 21846->21917 21899 7ff62a9a25dc 21849->21899 21854 7ff62a999197 21911 7ff62a994028 IsProcessorFeaturePresent 21854->21911 21858 7ff62a9991ac 21860 7ff62a9a1a1c 12 API calls 21858->21860 21862 7ff62a9991c7 21860->21862 21863 7ff62a9991dc 21862->21863 21865 7ff62a998eb0 61 API calls 21862->21865 21863->21630 21864 7ff62a998f61 21866 7ff62a998fda 21864->21866 21867 7ff62a998f7a 21864->21867 21865->21863 21870 7ff62a998ed7 21866->21870 21931 7ff62a9a2620 47 API calls _isindst 21866->21931 21867->21870 21930 7ff62a9a2620 47 API calls _isindst 21867->21930 21870->21630 21872 7ff62a99eec9 FlsSetValue 21871->21872 21875 7ff62a99eeac 21871->21875 21873 7ff62a99eeb9 21872->21873 21874 7ff62a99eedb 21872->21874 21876 7ff62a99ef35 SetLastError 21873->21876 21877 7ff62a9a0a28 _get_daylight 5 API calls 21874->21877 21875->21872 21875->21873 21876->21833 21878 7ff62a99eeea 21877->21878 21879 7ff62a99ef08 FlsSetValue 21878->21879 21880 7ff62a99eef8 FlsSetValue 21878->21880 21882 7ff62a99ef14 FlsSetValue 21879->21882 21883 7ff62a99ef26 21879->21883 21881 7ff62a99ef01 21880->21881 21885 7ff62a99e95c __free_lconv_num 5 API calls 21881->21885 21882->21881 21896 7ff62a99eac0 11 API calls _get_daylight 21883->21896 21885->21873 21886 7ff62a99ef2e 21887 7ff62a99e95c __free_lconv_num 5 API calls 21886->21887 21887->21876 21889 7ff62a99f0bb 21888->21889 21893 7ff62a99f07f _get_daylight 21888->21893 21898 7ff62a998d9c 11 API calls _get_daylight 21889->21898 21891 7ff62a99f0a2 HeapAlloc 21892 7ff62a99f0b9 21891->21892 21891->21893 21892->21838 21893->21889 21893->21891 21897 7ff62a99ccd0 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 21893->21897 21895->21834 21896->21886 21897->21893 21898->21892 21900 7ff62a9a25eb 21899->21900 21903 7ff62a998f22 21899->21903 21932 7ff62a99ae44 EnterCriticalSection 21900->21932 21902 7ff62a9a25f3 21902->21903 21904 7ff62a9a244c 61 API calls 21902->21904 21905 7ff62a9a1704 21903->21905 21904->21903 21906 7ff62a9a170d 21905->21906 21910 7ff62a998f37 21905->21910 21933 7ff62a998d9c 11 API calls _get_daylight 21906->21933 21908 7ff62a9a1712 21934 7ff62a993fd8 47 API calls _invalid_parameter_noinfo_noreturn 21908->21934 21910->21854 21918 7ff62a9a1734 21910->21918 21912 7ff62a99403b 21911->21912 21935 7ff62a993d0c 14 API calls 3 library calls 21912->21935 21914 7ff62a994056 GetCurrentProcess TerminateProcess 21915->21845 21916->21870 21917->21870 21919 7ff62a9a173d 21918->21919 21923 7ff62a998f48 21918->21923 21936 7ff62a998d9c 11 API calls _get_daylight 21919->21936 21921 7ff62a9a1742 21937 7ff62a993fd8 47 API calls _invalid_parameter_noinfo_noreturn 21921->21937 21923->21854 21924 7ff62a9a1764 21923->21924 21925 7ff62a9a176d 21924->21925 21926 7ff62a998f59 21924->21926 21938 7ff62a998d9c 11 API calls _get_daylight 21925->21938 21926->21854 21926->21864 21928 7ff62a9a1772 21939 7ff62a993fd8 47 API calls _invalid_parameter_noinfo_noreturn 21928->21939 21930->21870 21931->21870 21933->21908 21934->21910 21935->21914 21936->21921 21937->21923 21938->21928 21939->21926 21942 7ff62a989c0d 21940->21942 21954 7ff62a989e00 21942->21954 21943 7ff62a989f50 49 API calls 21944 7ff62a989d0f 21943->21944 21944->21943 21945 7ff62a97765d MultiByteToWideChar MultiByteToWideChar 21944->21945 21945->21650 21946->21634 21947->21636 21948->21638 21949->21640 21950->21642 21951->21644 21952->21646 21955 7ff62a989f45 21954->21955 21958 7ff62a989e29 21954->21958 21969 7ff62a9761c0 49 API calls 21955->21969 21960 7ff62a989e81 21958->21960 21961 7ff62a989ebd 21958->21961 21966 7ff62a989e74 BuildCatchObjectHelperInternal 21958->21966 21959 7ff62a98dfb8 std::_Facet_Register 49 API calls 21959->21966 21960->21959 21962 7ff62a989f3f 21960->21962 21963 7ff62a98dfb8 std::_Facet_Register 49 API calls 21961->21963 21968 7ff62a9719d0 49 API calls 2 library calls 21962->21968 21963->21966 21964 7ff62a993ff8 _invalid_parameter_noinfo_noreturn 47 API calls 21964->21962 21966->21964 21967 7ff62a989f07 BuildCatchObjectHelperInternal 21966->21967 21967->21944 21968->21955 21971 7ff62a971686 21970->21971 21972 7ff62a97167e 21970->21972 21973 7ff62a9716ac VirtualAlloc 21971->21973 21972->21674 21974 7ff62a9716d6 BuildCatchObjectHelperInternal 21973->21974 21975 7ff62a9716f6 VirtualFree 21974->21975 21976 7ff62a971704 21974->21976 21975->21976 21976->21674 21978 7ff62a97152a 21977->21978 21979 7ff62a97155b VirtualAlloc 21978->21979 21980 7ff62a9715b5 BuildCatchObjectHelperInternal 21978->21980 21981 7ff62a971587 BuildCatchObjectHelperInternal 21979->21981 21980->21678 21981->21980 21982 7ff62a9715a7 VirtualFree 21981->21982 21982->21980 21984 7ff62a97174b 21983->21984 21985 7ff62a9717fb 21984->21985 21986 7ff62a97177c VirtualAlloc 21984->21986 21985->21685 21987 7ff62a9717a8 BuildCatchObjectHelperInternal 21986->21987 21988 7ff62a9717be VirtualFree 21987->21988 21988->21685 21989->21453 22543 7ff62a9a52e0 60 API calls 4 library calls 22412 7ff62a9aa7e4 67 API calls 22495 7ff62a9a15d8 FreeLibrary 22413 7ff62a97b3e0 CloseHandle RtlPcToFileHeader RaiseException 22414 7ff62a97e3e9 14 API calls 22416 7ff62a97eff2 187 API calls 22499 7ff62a9a09e8 12 API calls 22417 7ff62a973ff0 WaitForSingleObject Sleep WaitForSingleObject WaitForSingleObject Sleep 22418 7ff62a9a73ec 54 API calls 5 library calls 22456 7ff62a98e0c4 48 API calls 2 library calls 22501 7ff62a9ad1bc 57 API calls 2 library calls 22420 7ff62a97bfc0 GdipDisposeImage GdipFree 22502 7ff62a981dc0 48 API calls 22549 7ff62a9812c0 HeapFree HeapDestroy HeapCreate HeapDestroy __std_exception_destroy 22503 7ff62a9aedd0 DeleteDC DeleteDC DeleteDC DeleteDC 22504 7ff62a98d1d0 7 API calls __std_exception_destroy 22553 7ff62a97e2c8 143 API calls BuildCatchObjectHelperInternal 22422 7ff62a97e3c7 ExitProcess 22458 7ff62a98c8d4 DeleteCriticalSection __std_exception_destroy 22423 7ff62a9a5fd4 56 API calls 3 library calls 22460 7ff62a9718d0 47 API calls Concurrency::cancel_current_task 22424 7ff62a97bbd0 GetStringTypeW 22461 7ff62a97bcd0 LCMapStringEx __crtLCMapStringW 22556 7ff62a9aef24 DecodePointer 22426 7ff62a98e824 56 API calls 22505 7ff62a97e217 TerminateThread CloseHandle 22506 7ff62a98fa24 60 API calls __CxxCallCatchBlock 22557 7ff62a97ef25 RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 22427 7ff62a980c20 15 API calls BuildCatchObjectHelperInternal 22428 7ff62a97c020 GdipCloneImage GdipAlloc 22429 7ff62a97e01f 71 API calls memcpy_s 22507 7ff62a9aee30 EnterCriticalSection GdiplusShutdown LeaveCriticalSection 22559 7ff62a9a0728 80 API calls __free_lconv_num 22465 7ff62a971130 HeapAlloc 22560 7ff62a97b331 17 API calls 22510 7ff62a98ee00 RtlPcToFileHeader RaiseException _com_raise_error _com_error::_com_error 22561 7ff62a9acf04 CloseHandle 22513 7ff62a975200 8 API calls BuildCatchObjectHelperInternal 22562 7ff62a975300 115 API calls 22431 7ff62a98dffc 59 API calls 2 library calls 22514 7ff62a99adfc 7 API calls 22471 7ff62a9ae110 RegCloseKey RegCloseKey 22515 7ff62a98e20e GetModuleHandleW BuildCatchObjectHelperInternal 22517 7ff62a99be09 63 API calls 22518 7ff62a9a0608 17 API calls 2 library calls 22433 7ff62a975410 36 API calls 22434 7ff62a97d410 393 API calls 6 library calls 22435 7ff62a981c10 50 API calls 22474 7ff62a971058 GetLastError IsDebuggerPresent OutputDebugStringW shared_ptr 22520 7ff62a971160 HeapReAlloc 22521 7ff62a97f160 52 API calls 5 library calls 22566 7ff62a98e25c GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 22436 7ff62a97e36a OpenEventLogW ClearEventLogW CloseEventLog 22476 7ff62a971470 VirtualFree 22477 7ff62a974470 164 API calls std::_Locinfo::_Locinfo_ctor 22478 7ff62a99206c 61 API calls 5 library calls 22568 7ff62a9a7e40 57 API calls 4 library calls 22481 7ff62a971040 GetTickCount 22525 7ff62a971140 HeapFree 22569 7ff62a975640 40 API calls 22438 7ff62a980b40 7 API calls 22528 7ff62a97cd40 88 API calls 3 library calls 22570 7ff62a97de3f 55 API calls 4 library calls 22439 7ff62a9a573c GetProcessHeap 22483 7ff62a97dc4d 56 API calls 4 library calls 22531 7ff62a98ed50 LocalFree 22484 7ff62a99284a 57 API calls __CxxCallCatchBlock 22441 7ff62a979f50 49 API calls 22442 7ff62a9903a0 10 API calls 2 library calls 22574 7ff62a97e697 79 API calls 4 library calls 22443 7ff62a97efa3 RegOpenKeyExW RegDeleteValueW RegCloseKey 22444 7ff62a99a798 60 API calls 5 library calls 22487 7ff62a9754a0 70 API calls 22534 7ff62a9711a0 HeapSize 22489 7ff62a9798a0 83 API calls 22535 7ff62a9aedb0 WSACleanup 22576 7ff62a99ceb0 GetCommandLineA GetCommandLineW 21990 7ff62a998aa8 21991 7ff62a998ac5 21990->21991 21992 7ff62a998ab6 GetLastError ExitThread 21990->21992 22005 7ff62a99ed10 GetLastError 21991->22005 21997 7ff62a998ae3 22003 7ff62a9772d0 116 API calls 21997->22003 22031 7ff62a973b00 21997->22031 22045 7ff62a973da0 21997->22045 21999 7ff62a998b02 22053 7ff62a998cbc 21999->22053 22003->21999 22006 7ff62a99ed51 FlsSetValue 22005->22006 22007 7ff62a99ed34 FlsGetValue 22005->22007 22009 7ff62a99ed63 22006->22009 22025 7ff62a99ed41 22006->22025 22008 7ff62a99ed4b 22007->22008 22007->22025 22008->22006 22011 7ff62a9a0a28 _get_daylight 11 API calls 22009->22011 22010 7ff62a99edbd SetLastError 22012 7ff62a998aca 22010->22012 22013 7ff62a99eddd 22010->22013 22014 7ff62a99ed72 22011->22014 22027 7ff62a9a161c 22012->22027 22058 7ff62a994078 47 API calls BuildCatchObjectHelperInternal 22013->22058 22016 7ff62a99ed90 FlsSetValue 22014->22016 22017 7ff62a99ed80 FlsSetValue 22014->22017 22018 7ff62a99edae 22016->22018 22019 7ff62a99ed9c FlsSetValue 22016->22019 22021 7ff62a99ed89 22017->22021 22057 7ff62a99eac0 11 API calls _get_daylight 22018->22057 22019->22021 22023 7ff62a99e95c __free_lconv_num 11 API calls 22021->22023 22023->22025 22024 7ff62a99edb6 22026 7ff62a99e95c __free_lconv_num 11 API calls 22024->22026 22025->22010 22026->22010 22028 7ff62a998ad6 22027->22028 22029 7ff62a9a162b 22027->22029 22028->21997 22056 7ff62a9a1350 5 API calls std::_Locinfo::_Locinfo_ctor 22028->22056 22029->22028 22059 7ff62a9a0d68 5 API calls std::_Locinfo::_Locinfo_ctor 22029->22059 22032 7ff62a973b18 22031->22032 22033 7ff62a973be0 select 22032->22033 22034 7ff62a973c54 22032->22034 22035 7ff62a973c08 recv 22032->22035 22036 7ff62a971500 VirtualAlloc VirtualFree 22032->22036 22037 7ff62a971730 2 API calls 22032->22037 22038 7ff62a973d04 timeGetTime 22032->22038 22039 7ff62a998d9c 11 API calls _get_daylight 22032->22039 22060 7ff62a97e29b 22032->22060 22064 7ff62a97d9c0 22032->22064 22079 7ff62a97dbef 22032->22079 22087 7ff62a971810 VirtualAlloc VirtualFree BuildCatchObjectHelperInternal 22032->22087 22033->22032 22033->22034 22034->21999 22035->22032 22036->22032 22037->22032 22040 7ff62a971730 2 API calls 22038->22040 22039->22032 22040->22032 22046 7ff62a973e22 22045->22046 22050 7ff62a973db4 22045->22050 22046->21999 22047 7ff62a973dc8 SleepEx 22047->22050 22048 7ff62a973e15 22048->21999 22049 7ff62a973df1 timeGetTime 22049->22050 22050->22047 22050->22048 22052 7ff62a973e30 10 API calls 22050->22052 22397 7ff62a9737a0 22050->22397 22052->22049 22400 7ff62a998b18 22053->22400 22056->21997 22057->22024 22059->22028 22061 7ff62a97e2a2 22060->22061 22062 7ff62a97e2c3 22061->22062 22063 7ff62a973e30 10 API calls 22061->22063 22062->22032 22063->22062 22065 7ff62a97da2a CloseHandle 22064->22065 22066 7ff62a97d9df 22064->22066 22068 7ff62a97da44 22065->22068 22067 7ff62a97da0b 22066->22067 22066->22068 22067->22065 22069 7ff62a993ff8 _invalid_parameter_noinfo_noreturn 47 API calls 22068->22069 22070 7ff62a97da49 22069->22070 22071 7ff62a98dfb8 std::_Facet_Register 49 API calls 22070->22071 22078 7ff62a97daf7 22070->22078 22074 7ff62a97da83 memcpy_s 22071->22074 22072 7ff62a97dbb0 22072->22032 22073 7ff62a97db41 RegOpenKeyExW 22073->22072 22075 7ff62a97db7c RegQueryValueExW 22073->22075 22076 7ff62a97da97 GetLastInputInfo GetTickCount wsprintfW 22074->22076 22075->22072 22088 7ff62a9780c0 22076->22088 22078->22072 22078->22073 22080 7ff62a97dbfb 22079->22080 22081 7ff62a97e2c3 22079->22081 22082 7ff62a97dc19 22080->22082 22083 7ff62a998a40 std::_Locinfo::_Locinfo_ctor 47 API calls 22080->22083 22081->22032 22082->22081 22195 7ff62a97f410 22082->22195 22083->22082 22085 7ff62a97dc41 22085->22081 22086 7ff62a973e30 10 API calls 22085->22086 22086->22081 22087->22032 22089 7ff62a978164 memcpy_s 22088->22089 22091 7ff62a9780f6 memcpy_s 22088->22091 22090 7ff62a98c400 77 API calls 22089->22090 22094 7ff62a978185 22090->22094 22125 7ff62a98c400 22091->22125 22093 7ff62a978138 BuildCatchObjectHelperInternal 22093->22078 22094->22093 22094->22094 22095 7ff62a97820f 22094->22095 22096 7ff62a97823b 22094->22096 22097 7ff62a978337 22094->22097 22095->22093 22101 7ff62a993ff8 _invalid_parameter_noinfo_noreturn 47 API calls 22095->22101 22109 7ff62a978701 22095->22109 22139 7ff62a979de0 49 API calls 4 library calls 22096->22139 22155 7ff62a979de0 49 API calls 4 library calls 22097->22155 22100 7ff62a978356 22105 7ff62a979fd0 49 API calls 22100->22105 22103 7ff62a9786f5 22101->22103 22102 7ff62a978256 22140 7ff62a979fd0 22102->22140 22106 7ff62a993ff8 _invalid_parameter_noinfo_noreturn 47 API calls 22103->22106 22111 7ff62a978383 22105->22111 22107 7ff62a9786fb 22106->22107 22108 7ff62a993ff8 _invalid_parameter_noinfo_noreturn 47 API calls 22107->22108 22108->22109 22112 7ff62a993ff8 _invalid_parameter_noinfo_noreturn 47 API calls 22109->22112 22110 7ff62a978286 22154 7ff62a979d20 47 API calls _invalid_parameter_noinfo_noreturn 22110->22154 22156 7ff62a979d20 47 API calls _invalid_parameter_noinfo_noreturn 22111->22156 22115 7ff62a978707 22112->22115 22116 7ff62a978574 OutputDebugStringA 22117 7ff62a978598 MultiByteToWideChar 22116->22117 22121 7ff62a978611 memcpy_s BuildCatchObjectHelperInternal 22116->22121 22118 7ff62a98dff4 22117->22118 22119 7ff62a9785df MultiByteToWideChar 22118->22119 22119->22121 22120 7ff62a97855c 22120->22116 22158 7ff62a979d20 47 API calls _invalid_parameter_noinfo_noreturn 22121->22158 22122 7ff62a9782f3 std::_Locinfo::_Locinfo_ctor BuildCatchObjectHelperInternal 22122->22103 22122->22107 22122->22116 22122->22120 22157 7ff62a97a170 49 API calls 4 library calls 22122->22157 22126 7ff62a98c420 wsprintfW CreateFileW 22125->22126 22127 7ff62a98c629 22126->22127 22128 7ff62a98c46d DeviceIoControl 22126->22128 22127->22093 22129 7ff62a98c620 CloseHandle 22128->22129 22131 7ff62a98c4b8 __std_exception_destroy 22128->22131 22129->22127 22130 7ff62a98c4e2 DeviceIoControl 22130->22131 22134 7ff62a98c613 __std_exception_destroy 22130->22134 22131->22129 22131->22130 22132 7ff62a98c53c DeviceIoControl 22131->22132 22133 7ff62a98c5a0 DeviceIoControl 22131->22133 22135 7ff62a98c640 WideCharToMultiByte WideCharToMultiByte 22131->22135 22159 7ff62a98c2d0 22131->22159 22132->22129 22132->22131 22133->22131 22133->22134 22134->22129 22135->22131 22138 7ff62a98c60f 22138->22127 22139->22102 22142 7ff62a97a001 22140->22142 22153 7ff62a97a0d7 22140->22153 22144 7ff62a97a033 22142->22144 22146 7ff62a97a08c 22142->22146 22147 7ff62a97a007 BuildCatchObjectHelperInternal 22142->22147 22145 7ff62a98dfb8 std::_Facet_Register 49 API calls 22144->22145 22149 7ff62a97a0d1 22144->22149 22148 7ff62a97a049 22145->22148 22150 7ff62a98dfb8 std::_Facet_Register 49 API calls 22146->22150 22147->22110 22148->22147 22152 7ff62a993ff8 _invalid_parameter_noinfo_noreturn 47 API calls 22148->22152 22193 7ff62a9719d0 49 API calls 2 library calls 22149->22193 22150->22147 22152->22149 22194 7ff62a9761c0 49 API calls 22153->22194 22154->22122 22155->22100 22156->22122 22157->22122 22158->22095 22160 7ff62a98c2f1 22159->22160 22161 7ff62a98c3e9 CloseHandle 22160->22161 22162 7ff62a98c34f CreateFileA 22160->22162 22161->22126 22161->22138 22162->22161 22163 7ff62a98c388 __std_exception_destroy 22162->22163 22164 7ff62a98c390 DeviceIoControl 22163->22164 22164->22161 22165 7ff62a98c3cb 22164->22165 22168 7ff62a98bef0 22165->22168 22169 7ff62a98c2b0 CloseHandle 22168->22169 22187 7ff62a98bf1d memcpy_s 22168->22187 22170 7ff62a98c286 __std_exception_destroy 22170->22169 22171 7ff62a98bf60 DeviceIoControl 22171->22170 22171->22187 22172 7ff62a98bfac DeviceIoControl 22172->22187 22173 7ff62a98c0ae DeviceIoControl 22173->22187 22174 7ff62a98c028 GlobalAlloc 22176 7ff62a98c040 DeviceIoControl 22174->22176 22174->22187 22175 7ff62a98c10e GlobalAlloc 22177 7ff62a98c123 DeviceIoControl 22175->22177 22175->22187 22178 7ff62a98c09b GlobalFree 22176->22178 22176->22187 22179 7ff62a98c161 22177->22179 22180 7ff62a98c18c GlobalFree 22177->22180 22178->22187 22188 7ff62a98c640 WideCharToMultiByte 22179->22188 22180->22187 22181 7ff62a98c6e0 WideCharToMultiByte WideCharToMultiByte GetSystemDefaultLangID DeviceIoControl lstrcpyA 22181->22187 22183 7ff62a98c16a GlobalFree 22185 7ff62a98c17b 22183->22185 22183->22187 22186 7ff62a98c2d0 58 API calls 22185->22186 22185->22187 22186->22185 22187->22170 22187->22171 22187->22172 22187->22173 22187->22174 22187->22175 22187->22178 22187->22181 22192 7ff62a98be90 51 API calls 22187->22192 22189 7ff62a98c681 22188->22189 22190 7ff62a98c6ba __std_exception_destroy 22188->22190 22189->22190 22191 7ff62a98c690 WideCharToMultiByte 22189->22191 22190->22183 22191->22190 22192->22187 22193->22153 22196 7ff62a98dfb8 std::_Facet_Register 49 API calls 22195->22196 22197 7ff62a97f437 memcpy_s 22196->22197 22198 7ff62a97f44b GetLastInputInfo GetTickCount wsprintfW GetForegroundWindow 22197->22198 22199 7ff62a97f4b4 CreateToolhelp32Snapshot 22198->22199 22200 7ff62a97f4a1 GetWindowTextW 22198->22200 22201 7ff62a97f4d8 memcpy_s 22199->22201 22202 7ff62a97f555 CreateToolhelp32Snapshot 22199->22202 22200->22199 22206 7ff62a97f4e9 Process32FirstW 22201->22206 22204 7ff62a97f5f8 CreateToolhelp32Snapshot 22202->22204 22205 7ff62a97f577 memcpy_s 22202->22205 22209 7ff62a97f61a memcpy_s 22204->22209 22210 7ff62a97f6a8 RegOpenKeyExW 22204->22210 22208 7ff62a97f58b Process32FirstW 22205->22208 22206->22202 22215 7ff62a97f501 22206->22215 22208->22204 22221 7ff62a97f5a9 22208->22221 22212 7ff62a97f62e Process32FirstW 22209->22212 22213 7ff62a97f6fa RegQueryValueExW 22210->22213 22214 7ff62a97f913 RegOpenKeyExW 22210->22214 22212->22210 22229 7ff62a97f64c 22212->22229 22219 7ff62a97f908 RegCloseKey 22213->22219 22232 7ff62a97f734 memcpy_s 22213->22232 22217 7ff62a97f9f2 RegOpenKeyExW 22214->22217 22218 7ff62a97f951 RegQueryValueExW 22214->22218 22215->22202 22216 7ff62a97f544 Process32NextW 22215->22216 22216->22202 22216->22215 22223 7ff62a97fad1 7 API calls 22217->22223 22224 7ff62a97fa30 RegQueryValueExW 22217->22224 22220 7ff62a97f9e7 RegCloseKey 22218->22220 22233 7ff62a97f986 memcpy_s 22218->22233 22219->22214 22220->22217 22221->22204 22222 7ff62a97f5e4 Process32NextW 22221->22222 22222->22204 22222->22221 22227 7ff62a97fb89 22223->22227 22228 7ff62a97fb91 FindClose 22223->22228 22225 7ff62a97fac6 RegCloseKey 22224->22225 22226 7ff62a97fa65 memcpy_s 22224->22226 22225->22223 22238 7ff62a97fa8f RegQueryValueExW 22226->22238 22227->22228 22249 7ff62a97fd10 7 API calls 22228->22249 22229->22210 22230 7ff62a97f694 Process32NextW 22229->22230 22230->22210 22230->22229 22234 7ff62a97f75e RegQueryValueExW 22232->22234 22236 7ff62a97f9b0 RegQueryValueExW 22233->22236 22234->22219 22235 7ff62a97f791 22234->22235 22269 7ff62a981310 49 API calls 4 library calls 22235->22269 22236->22220 22239 7ff62a97f9df 22236->22239 22238->22225 22240 7ff62a97fabe 22238->22240 22239->22220 22240->22225 22241 7ff62a97f900 22241->22219 22242 7ff62a97fbd1 BuildCatchObjectHelperInternal 22247 7ff62a97fcbe 22242->22247 22248 7ff62a973e30 10 API calls 22242->22248 22243 7ff62a97fcfe 22244 7ff62a993ff8 _invalid_parameter_noinfo_noreturn 47 API calls 22243->22244 22245 7ff62a97fd03 22244->22245 22246 7ff62a97f79d 22246->22219 22246->22241 22246->22243 22247->22085 22248->22247 22250 7ff62a97fdaa 22249->22250 22251 7ff62a97fdbe GetSystemMetrics 22249->22251 22252 7ff62a97fe47 8 API calls 22250->22252 22253 7ff62a97fe28 GetSystemMetrics 22251->22253 22254 7ff62a97fdde GetSystemMetrics 22251->22254 22255 7ff62a97ff92 memcpy_s 22252->22255 22253->22252 22254->22252 22256 7ff62a97ffa7 GetDIBits 22255->22256 22257 7ff62a97ffdf memcpy_s BuildCatchObjectHelperInternal 22256->22257 22258 7ff62a98dfb8 std::_Facet_Register 49 API calls 22257->22258 22259 7ff62a980052 22258->22259 22270 7ff62a980220 GlobalAlloc GlobalLock 22259->22270 22262 7ff62a980089 DeleteObject DeleteObject ReleaseDC 22267 7ff62a9800b3 22262->22267 22263 7ff62a98011c BuildCatchObjectHelperInternal 22264 7ff62a98015d DeleteObject DeleteObject ReleaseDC 22263->22264 22264->22267 22265 7ff62a993ff8 _invalid_parameter_noinfo_noreturn 47 API calls 22266 7ff62a980212 22265->22266 22267->22265 22268 7ff62a9800ed 22267->22268 22268->22242 22269->22246 22318 7ff62a9ad3b0 22270->22318 22273 7ff62a9805f1 GlobalFree 22275 7ff62a980081 22273->22275 22274 7ff62a98029f 22320 7ff62a9761e0 22274->22320 22275->22262 22275->22263 22279 7ff62a9802fc 22280 7ff62a980304 GdipCreateBitmapFromStream 22279->22280 22317 7ff62a980567 22279->22317 22281 7ff62a98033b 22280->22281 22282 7ff62a980330 GdipDisposeImage 22280->22282 22338 7ff62a97c340 GdipGetImagePixelFormat 22281->22338 22282->22317 22284 7ff62a9805aa 22287 7ff62a9761e0 58 API calls 22284->22287 22285 7ff62a980586 DeleteObject 22285->22284 22286 7ff62a980348 GdipDisposeImage 22288 7ff62a98035c CreateStreamOnHGlobal 22286->22288 22286->22317 22289 7ff62a9805af EnterCriticalSection 22287->22289 22290 7ff62a980379 22288->22290 22288->22317 22291 7ff62a9805e7 LeaveCriticalSection 22289->22291 22292 7ff62a9805c2 EnterCriticalSection 22289->22292 22372 7ff62a97c7b0 22290->22372 22291->22273 22294 7ff62a9805da LeaveCriticalSection 22292->22294 22295 7ff62a9805d4 GdiplusShutdown 22292->22295 22294->22291 22295->22294 22296 7ff62a980386 GetHGlobalFromStream GlobalLock 22297 7ff62a98043f GlobalSize 22296->22297 22298 7ff62a9803ae GlobalFree 22296->22298 22303 7ff62a980452 BuildCatchObjectHelperInternal 22297->22303 22300 7ff62a9803f1 22298->22300 22301 7ff62a9803cf DeleteObject 22298->22301 22302 7ff62a9761e0 58 API calls 22300->22302 22301->22300 22304 7ff62a9803f6 EnterCriticalSection 22302->22304 22305 7ff62a979fd0 49 API calls 22303->22305 22306 7ff62a980409 EnterCriticalSection 22304->22306 22307 7ff62a98042e LeaveCriticalSection 22304->22307 22310 7ff62a980481 22305->22310 22308 7ff62a98041b GdiplusShutdown 22306->22308 22309 7ff62a980421 LeaveCriticalSection 22306->22309 22307->22275 22308->22309 22309->22307 22311 7ff62a980618 22310->22311 22312 7ff62a980514 22310->22312 22313 7ff62a993ff8 _invalid_parameter_noinfo_noreturn 47 API calls 22311->22313 22315 7ff62a980553 GlobalUnlock 22312->22315 22316 7ff62a98052f DeleteObject 22312->22316 22314 7ff62a98061d 22313->22314 22315->22317 22316->22315 22317->22284 22317->22285 22319 7ff62a980278 GlobalUnlock CreateStreamOnHGlobal 22318->22319 22319->22273 22319->22274 22321 7ff62a97626b EnterCriticalSection LeaveCriticalSection 22320->22321 22322 7ff62a976200 22320->22322 22331 7ff62a97c9b0 22321->22331 22386 7ff62a98dccc AcquireSRWLockExclusive SleepConditionVariableSRW ReleaseSRWLockExclusive 22322->22386 22332 7ff62a9761e0 58 API calls 22331->22332 22333 7ff62a97c9bb 22332->22333 22334 7ff62a97c9cc EnterCriticalSection 22333->22334 22335 7ff62a97c9c4 22333->22335 22336 7ff62a97c9e9 GdiplusStartup 22334->22336 22337 7ff62a97ca23 LeaveCriticalSection 22334->22337 22335->22279 22336->22337 22337->22279 22339 7ff62a97c385 GdipGetImageHeight 22338->22339 22341 7ff62a97c402 22339->22341 22342 7ff62a97c40f GdipGetImageWidth 22339->22342 22341->22342 22343 7ff62a97c424 22342->22343 22387 7ff62a97c160 22343->22387 22345 7ff62a97c445 22346 7ff62a97c461 GdipGetImagePaletteSize 22345->22346 22351 7ff62a97c449 __std_exception_destroy 22345->22351 22364 7ff62a97c5fc 22345->22364 22352 7ff62a97c47a std::_Locinfo::_Locinfo_ctor 22346->22352 22347 7ff62a97c6e2 GdipCreateBitmapFromScan0 GdipGetImageGraphicsContext GdipDrawImageI GdipDeleteGraphics GdipDisposeImage 22347->22351 22348 7ff62a97c622 GdipBitmapLockBits 22349 7ff62a97c66a BuildCatchObjectHelperInternal 22348->22349 22348->22351 22350 7ff62a97c6c4 GdipBitmapUnlockBits 22349->22350 22354 7ff62a97c78d memcpy_s 22349->22354 22350->22351 22351->22286 22352->22351 22355 7ff62a97c4e7 GdipGetImagePalette 22352->22355 22394 7ff62a998d9c 11 API calls _get_daylight 22354->22394 22362 7ff62a97c4fb 22355->22362 22356 7ff62a97c799 22395 7ff62a993fd8 47 API calls _invalid_parameter_noinfo_noreturn 22356->22395 22358 7ff62a97c7a4 22396 7ff62a9710f0 RtlPcToFileHeader RaiseException _com_raise_error 22358->22396 22361 7ff62a97c5aa SetDIBColorTable 22361->22364 22365 7ff62a97c5c4 SelectObject 22361->22365 22362->22351 22362->22361 22392 7ff62a976280 56 API calls 22362->22392 22364->22347 22364->22348 22393 7ff62a976280 56 API calls 22365->22393 22366 7ff62a97c564 22369 7ff62a97c58e SelectObject 22366->22369 22370 7ff62a97c586 CreateCompatibleDC 22366->22370 22368 7ff62a97c5db 22368->22364 22371 7ff62a97c5f3 DeleteDC 22368->22371 22369->22361 22370->22369 22371->22364 22373 7ff62a97c9b0 61 API calls 22372->22373 22374 7ff62a97c7d4 22373->22374 22375 7ff62a97c7dc GdipGetImageEncodersSize 22374->22375 22376 7ff62a97c992 22374->22376 22375->22376 22377 7ff62a97c7f2 std::_Locinfo::_Locinfo_ctor 22375->22377 22376->22296 22378 7ff62a97c86b GdipGetImageEncoders 22377->22378 22379 7ff62a97c861 __std_exception_destroy 22377->22379 22378->22379 22380 7ff62a97c87f 22378->22380 22379->22296 22380->22379 22381 7ff62a97c923 GdipCreateBitmapFromHBITMAP 22380->22381 22382 7ff62a97c8f1 GdipCreateBitmapFromScan0 22380->22382 22383 7ff62a97c933 GdipSaveImageToStream 22381->22383 22382->22383 22384 7ff62a97c951 GdipDisposeImage 22383->22384 22385 7ff62a97c95e GdipDisposeImage 22383->22385 22384->22379 22385->22379 22388 7ff62a97c19b memcpy_s 22387->22388 22389 7ff62a97c202 CreateDIBSection 22388->22389 22391 7ff62a97c249 __std_exception_destroy 22388->22391 22390 7ff62a97c227 GetObjectW 22389->22390 22389->22391 22390->22391 22391->22345 22392->22366 22393->22368 22394->22356 22395->22358 22398 7ff62a97381a 22397->22398 22399 7ff62a9737af setsockopt CancelIo closesocket SetEvent 22397->22399 22398->22050 22399->22398 22401 7ff62a99ee88 _get_daylight 11 API calls 22400->22401 22403 7ff62a998b29 22401->22403 22402 7ff62a998b70 ExitThread 22403->22402 22404 7ff62a998b45 22403->22404 22409 7ff62a9a139c 5 API calls std::_Locinfo::_Locinfo_ctor 22403->22409 22406 7ff62a998b53 CloseHandle 22404->22406 22407 7ff62a998b59 22404->22407 22406->22407 22407->22402 22408 7ff62a998b67 FreeLibraryAndExitThread 22407->22408 22408->22402 22409->22404 22536 7ff62a9711b0 HeapDestroy 22538 7ff62a9a09ac 57 API calls _isindst 22492 7ff62a971078 InitializeCriticalSectionEx shared_ptr 22577 7ff62a971a80 LeaveCriticalSection 22447 7ff62a979380 GetModuleFileNameW GetCommandLineW GetStartupInfoW CreateProcessW ExitProcess 22493 7ff62a97c080 64 API calls 22578 7ff62a981280 8 API calls 22579 7ff62a97be80 12 API calls _Wcrtomb 22540 7ff62a9a4190 54 API calls 6 library calls 22450 7ff62a99cb88 11 API calls 22494 7ff62a9a8088 55 API calls 4 library calls 22541 7ff62a97bd90 13 API calls

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 7ff62a976370-7ff62a9763c4 call 7ff62a98e600 call 7ff62a98dfb8 call 7ff62a9ada50 7 7ff62a9763c6-7ff62a9763d9 call 7ff62a998a40 0->7 8 7ff62a9763de-7ff62a97642c call 7ff62a9ada50 gethostname gethostbyname 0->8 7->8 12 7ff62a976432-7ff62a97647c inet_ntoa call 7ff62a9991f8 * 2 8->12 13 7ff62a9764cf-7ff62a9765b8 MultiByteToWideChar * 2 GetLastInputInfo GetTickCount wsprintfW MultiByteToWideChar * 2 LoadLibraryW 8->13 12->13 29 7ff62a97647e 12->29 14 7ff62a9766dc-7ff62a976717 GetSystemInfo wsprintfW 13->14 15 7ff62a9765be-7ff62a9765d1 GetProcAddress 13->15 19 7ff62a976720-7ff62a97673f GetDriveTypeW 14->19 17 7ff62a9765d7-7ff62a976665 call 7ff62a973670 call 7ff62a98dff4 call 7ff62a979300 15->17 18 7ff62a9766d3-7ff62a9766d6 FreeLibrary 15->18 47 7ff62a97666d-7ff62a9766a0 RegOpenKeyExW RegQueryValueExW 17->47 48 7ff62a976667 17->48 18->14 21 7ff62a976778-7ff62a97677d 19->21 22 7ff62a976741-7ff62a976775 GetDiskFreeSpaceExW 19->22 21->19 25 7ff62a97677f-7ff62a976822 GlobalMemoryStatusEx call 7ff62a973670 * 2 call 7ff62a978f60 GetForegroundWindow 21->25 22->21 45 7ff62a97683a-7ff62a97687d lstrlenW call 7ff62a978e30 25->45 46 7ff62a976824-7ff62a976834 GetWindowTextW 25->46 32 7ff62a976480-7ff62a9764cd inet_ntoa call 7ff62a9991f8 * 2 29->32 32->13 56 7ff62a9768a3-7ff62a9768e2 call 7ff62a998a40 lstrlenW call 7ff62a978e30 45->56 57 7ff62a97687f-7ff62a97689d GetLocalTime wsprintfW 45->57 46->45 49 7ff62a9766a2-7ff62a9766a4 47->49 50 7ff62a9766c0-7ff62a9766ce RegCloseKey call 7ff62a98df84 47->50 48->47 49->50 52 7ff62a9766a6-7ff62a9766bb call 7ff62a9994e8 49->52 50->18 52->50 62 7ff62a9768f8-7ff62a97692b GetModuleHandleW GetProcAddress 56->62 63 7ff62a9768e4-7ff62a9768f3 call 7ff62a998a40 56->63 57->56 65 7ff62a97692d-7ff62a97692f GetNativeSystemInfo 62->65 66 7ff62a976931 GetSystemInfo 62->66 63->62 67 7ff62a976937-7ff62a976943 65->67 66->67 68 7ff62a976945-7ff62a97694f 67->68 69 7ff62a976951 67->69 68->69 70 7ff62a976956-7ff62a976996 wsprintfW call 7ff62a978c30 GetCurrentProcessId 68->70 69->70 73 7ff62a97699c-7ff62a9769b7 OpenProcess 70->73 74 7ff62a976ade-7ff62a976b0f CoInitializeEx CoCreateInstance 70->74 77 7ff62a9769bd-7ff62a9769d5 K32GetProcessImageFileNameW 73->77 78 7ff62a976ad7 73->78 75 7ff62a976b15-7ff62a976b2a 74->75 76 7ff62a976c0f 74->76 83 7ff62a976b30-7ff62a976b32 75->83 81 7ff62a976c16-7ff62a976c6f call 7ff62a998a40 call 7ff62a9ada50 RegOpenKeyExW 76->81 79 7ff62a9769db-7ff62a9769ef GetLogicalDriveStringsW 77->79 80 7ff62a976ace-7ff62a976ad1 CloseHandle 77->80 78->74 84 7ff62a9769f5-7ff62a9769fe 79->84 85 7ff62a976abe-7ff62a976ac8 lstrcpyW 79->85 80->78 95 7ff62a976c75-7ff62a976ccf RegQueryInfoKeyW 81->95 96 7ff62a976dd2-7ff62a976de2 lstrlenW 81->96 83->76 87 7ff62a976b38-7ff62a976b65 83->87 84->85 88 7ff62a976a04-7ff62a976a0b 84->88 85->80 106 7ff62a976b6b 87->106 107 7ff62a976bfe-7ff62a976c0d CoUninitialize 87->107 90 7ff62a976a10-7ff62a976a30 lstrcmpiW 88->90 93 7ff62a976a32-7ff62a976a44 lstrcmpiW 90->93 94 7ff62a976aae-7ff62a976ab8 90->94 93->94 97 7ff62a976a46-7ff62a976a7e QueryDosDeviceW 93->97 94->85 94->90 98 7ff62a976cd5-7ff62a976ce7 95->98 99 7ff62a976e02-7ff62a976efd call 7ff62a977a60 call 7ff62a9994e8 GetTickCount call 7ff62a998e3c call 7ff62a9991b0 wsprintfW GetLocaleInfoW GetSystemDirectoryW GetCurrentHwProfileW 95->99 96->99 100 7ff62a976de4-7ff62a976dfd call 7ff62a9994e8 96->100 97->80 102 7ff62a976a80-7ff62a976aa8 lstrlenW call 7ff62a99934c 97->102 98->96 103 7ff62a976ced-7ff62a976cf0 98->103 134 7ff62a976f36 99->134 135 7ff62a976eff-7ff62a976f0b 99->135 100->99 102->94 113 7ff62a976f0d-7ff62a976f31 lstrcpyW lstrcatW 102->113 103->96 110 7ff62a976cf6-7ff62a976d0f call 7ff62a9ada50 103->110 112 7ff62a976b70-7ff62a976b93 106->112 107->76 107->81 121 7ff62a976dc7-7ff62a976dcc RegCloseKey 110->121 122 7ff62a976d15 110->122 119 7ff62a976bcd-7ff62a976bf8 112->119 120 7ff62a976b95-7ff62a976bb4 112->120 113->80 119->107 119->112 131 7ff62a976bb6-7ff62a976bbc SysFreeString 120->131 132 7ff62a976bc2-7ff62a976bc7 120->132 121->96 124 7ff62a976d20-7ff62a976d75 call 7ff62a9ada50 RegEnumKeyExW lstrlenW 122->124 137 7ff62a976db9-7ff62a976dc1 124->137 138 7ff62a976d77-7ff62a976d87 lstrlenW 124->138 131->132 132->119 139 7ff62a976f3b-7ff62a976f8d call 7ff62a9772d0 lstrlenW call 7ff62a978e30 134->139 135->139 137->121 137->124 138->137 140 7ff62a976d89-7ff62a976db4 call 7ff62a998dc4 * 2 138->140 148 7ff62a977067-7ff62a97707b CreateToolhelp32Snapshot 139->148 149 7ff62a976f93-7ff62a977016 GetLocalTime wsprintfW RegOpenKeyExW RegDeleteValueW RegCloseKey RegCreateKeyW 139->149 140->137 152 7ff62a977108 148->152 153 7ff62a977081-7ff62a9770b1 call 7ff62a9ada50 Process32FirstW 148->153 150 7ff62a97705a-7ff62a977061 RegCloseKey 149->150 151 7ff62a977018-7ff62a97704b lstrlenW RegSetValueExW 149->151 150->148 151->150 155 7ff62a97704d-7ff62a977054 RegCloseKey 151->155 154 7ff62a97710a-7ff62a977125 CreateToolhelp32Snapshot 152->154 153->152 160 7ff62a9770b3-7ff62a9770ba 153->160 158 7ff62a97712b-7ff62a97715b call 7ff62a9ada50 Process32FirstW 154->158 159 7ff62a9771b8 154->159 155->150 158->159 169 7ff62a97715d-7ff62a977168 158->169 161 7ff62a9771ba-7ff62a9771d5 CreateToolhelp32Snapshot 159->161 163 7ff62a9770c0-7ff62a9770cf 160->163 164 7ff62a9771db-7ff62a97720b call 7ff62a9ada50 Process32FirstW 161->164 165 7ff62a97727f-7ff62a977299 call 7ff62a973e30 161->165 167 7ff62a9770d0-7ff62a9770da 163->167 164->165 178 7ff62a97720d-7ff62a977218 164->178 170 7ff62a97729c-7ff62a9772c0 call 7ff62a98df84 165->170 171 7ff62a9770dc-7ff62a9770e4 167->171 172 7ff62a9770f4-7ff62a977106 Process32NextW 167->172 174 7ff62a977170-7ff62a97717e 169->174 176 7ff62a9770ea-7ff62a9770f2 171->176 177 7ff62a977266-7ff62a97726b 171->177 172->152 172->163 179 7ff62a977180-7ff62a97718a 174->179 176->167 176->172 177->154 181 7ff62a977220-7ff62a97722e 178->181 182 7ff62a97718c-7ff62a977194 179->182 183 7ff62a9771a4-7ff62a9771b6 Process32NextW 179->183 186 7ff62a977230-7ff62a97723a 181->186 184 7ff62a97719a-7ff62a9771a2 182->184 185 7ff62a977270-7ff62a977275 182->185 183->159 183->174 184->179 184->183 185->161 187 7ff62a97723c-7ff62a977244 186->187 188 7ff62a977250-7ff62a977262 Process32NextW 186->188 189 7ff62a97727a 187->189 190 7ff62a977246-7ff62a97724e 187->190 188->181 191 7ff62a977264 188->191 189->165 190->186 190->188 191->165
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Process32lstrlen$CloseCreateInfo$Systemwsprintf$ByteCharFirstHandleMultiNextOpenSnapshotTimeToolhelp32Wide$AddressFreeProcProcessQueryValue$Concurrency::cancel_current_taskCountCurrentDriveFileInstanceLibraryLocalModuleNativeTickWindow_invalid_parameter_noinfoinet_ntoalstrcmpi$DeleteDeviceDirectoryDiskEnumForegroundGlobalImageInitializeInputLastLoadLocaleLogicalMemoryNameProfileSpaceStatusStringStringsTextTypeUninitializegethostbynamegethostnamelstrcpy
            • String ID: %d min$%d.%d$%d.%d.%d$%sFree%d Gb $53aaa05a-823a-477c-ad34-6798b901feb6$A:\$AppEvents$B:\$FriendlyName$GetNativeSystemInfo$HDD:%d$INSTALLTIME$Network$ProductName$RtlGetNtVersionNumbers$SOFTWARE\Microsoft\Windows NT\CurrentVersion$Software$Software\Tencent\Plugin\VAS$Telegram.exe$VenGROUP$VenNetwork$VenREMARK$WeChat.exe$WxWork.exe$X64 %s$kernel32.dll$ntdll.dll$x64$x86
            • API String ID: 4136965836-407283210
            • Opcode ID: 912dcb70ba029749223a0e7e094df4f0b0117a3003a257af6be5c2466f0551a6
            • Instruction ID: add63b5ab90e8c06ede7cbf195fe2f5d8fa31d32d9b28225d2d719964e79ae35
            • Opcode Fuzzy Hash: 912dcb70ba029749223a0e7e094df4f0b0117a3003a257af6be5c2466f0551a6
            • Instruction Fuzzy Hash: 66926272E18A9286EF20DF26DC442E93361FB84754F844276DA4EC7AA6EF7CD545C302

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 193 7ff62a98b5e0-7ff62a98b621 call 7ff62a999ebc SleepEx 196 7ff62a98b653-7ff62a98b65a 193->196 197 7ff62a98b623-7ff62a98b64d call 7ff62a98dfb8 call 7ff62a998be0 CloseHandle 193->197 199 7ff62a98b72f-7ff62a98b858 GetLocalTime wsprintfW SetUnhandledExceptionFilter call 7ff62a998be0 CloseHandle call 7ff62a98dfb8 call 7ff62a9736e0 call 7ff62a98dfb8 call 7ff62a97b410 call 7ff62a98ae60 AllocateAndInitializeSid 196->199 200 7ff62a98b660-7ff62a98b67d GetCurrentProcess OpenProcessToken 196->200 197->196 219 7ff62a98b888-7ff62a98b88f 199->219 220 7ff62a98b85a-7ff62a98b872 CheckTokenMembership 199->220 202 7ff62a98b67f-7ff62a98b6ce LookupPrivilegeValueW AdjustTokenPrivileges CloseHandle 200->202 203 7ff62a98b6d4-7ff62a98b6f7 GetModuleHandleA GetProcAddress 200->203 202->203 203->199 206 7ff62a98b6f9-7ff62a98b72a GetCurrentProcessId OpenProcess 203->206 206->199 223 7ff62a98b891-7ff62a98b906 RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 219->223 224 7ff62a98b90c 219->224 221 7ff62a98b874 220->221 222 7ff62a98b87b-7ff62a98b882 FreeSid 220->222 221->222 222->219 223->224 225 7ff62a98b913-7ff62a98b926 224->225 226 7ff62a98b954-7ff62a98b978 call 7ff62a998a40 * 2 225->226 227 7ff62a98b928-7ff62a98b952 call 7ff62a998a40 * 2 225->227 236 7ff62a98b97e-7ff62a98b9a7 226->236 227->236 237 7ff62a98b9a9-7ff62a98b9e5 call 7ff62a998a40 * 2 236->237 238 7ff62a98b9ec-7ff62a98b9f6 236->238 237->238 240 7ff62a98ba06-7ff62a98ba5b call 7ff62a999ebc SleepEx call 7ff62a999ebc call 7ff62a973820 238->240 241 7ff62a98b9f8-7ff62a98ba00 238->241 240->225 251 7ff62a98ba61-7ff62a98bb25 call 7ff62a999ebc CreateEventA call 7ff62a998a40 call 7ff62a976370 240->251 241->240 258 7ff62a98bb2a-7ff62a98bb2d 251->258 259 7ff62a98bb2f-7ff62a98bb3b 258->259 260 7ff62a98bb3d 258->260 265 7ff62a98bb8b-7ff62a98bba1 259->265 261 7ff62a98bb40-7ff62a98bb47 260->261 263 7ff62a98bb72-7ff62a98bb79 261->263 264 7ff62a98bb49-7ff62a98bb59 Sleep 261->264 270 7ff62a98bb7f-7ff62a98bb8a Sleep 263->270 264->261 266 7ff62a98bb5b-7ff62a98bb62 264->266 267 7ff62a98bba3-7ff62a98bbbb 265->267 268 7ff62a98bbe9-7ff62a98bbf8 CloseHandle 265->268 266->263 269 7ff62a98bb64-7ff62a98bb70 266->269 271 7ff62a98bbd2-7ff62a98bbe2 call 7ff62a98df84 267->271 272 7ff62a98bbbd-7ff62a98bbd0 267->272 268->225 269->270 270->265 271->268 272->271 273 7ff62a98bbfd-7ff62a98bc24 call 7ff62a993ff8 IsDebuggerPresent 272->273 279 7ff62a98bc31-7ff62a98bc54 LoadLibraryW 273->279 280 7ff62a98bc26-7ff62a98bc30 273->280 281 7ff62a98bc60-7ff62a98bc7e GetProcAddress 279->281 282 7ff62a98bc56-7ff62a98bc5b 279->282 284 7ff62a98bc80-7ff62a98bc8e FreeLibrary 281->284 285 7ff62a98bc93-7ff62a98bd45 call 7ff62a9ada50 GetLocalTime wsprintfW CreateFileW 281->285 283 7ff62a98bdce-7ff62a98bde8 282->283 286 7ff62a98bdc6 284->286 289 7ff62a98bd55-7ff62a98bdb0 GetCurrentThreadId GetCurrentProcessId GetCurrentProcess CloseHandle FreeLibrary 285->289 290 7ff62a98bd47-7ff62a98bd53 FreeLibrary 285->290 286->283 291 7ff62a98bdb6-7ff62a98bdbe 289->291 290->291 291->286
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CloseHandle$ProcessSleep$OpenTokenValue$AddressCurrentFreeLibraryProc$AdjustAllocateCheckCreateDebuggerDeleteEventExceptionFilterInitializeLoadLocalLookupMembershipModulePresentPrivilegePrivilegesTimeUnhandled_invalid_parameter_noinfo_invalid_parameter_noinfo_noreturnwsprintf
            • String ID: !analyze -v$%4d.%2d.%2d-%2d:%2d:%2d$%s-%04d%02d%02d-%02d%02d%02d.dmp$10443$154.91.90.234$154.91.90.234$154.91.90.234$154.91.90.234$4433$4433$DbgHelp.dll$MiniDumpWriteDump$NtDll.dll$NtSetInformationProcess$SOFTWARE$SeDebugPrivilege$VenkernalData_info$loginconfig
            • API String ID: 2641691789-53643463
            • Opcode ID: 2f73c5c05892fff8768e9b6e0df1ba2b4b958215c4eb42bda5580e04c4d00d6f
            • Instruction ID: 8098664b5b8581d7a9e22816e330362c8cdbf43a79f3657c76a81ca23efda072
            • Opcode Fuzzy Hash: 2f73c5c05892fff8768e9b6e0df1ba2b4b958215c4eb42bda5580e04c4d00d6f
            • Instruction Fuzzy Hash: 90224572E28B4286EF209F26EC443A973A2FB88754F404176D94DC76A6DFBCD544C702

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 294 7ff62a97f410-7ff62a97f49f call 7ff62a98dfb8 call 7ff62a9ada50 GetLastInputInfo GetTickCount wsprintfW GetForegroundWindow 299 7ff62a97f4b4-7ff62a97f4d6 CreateToolhelp32Snapshot 294->299 300 7ff62a97f4a1-7ff62a97f4ae GetWindowTextW 294->300 301 7ff62a97f4d8-7ff62a97f4ff call 7ff62a9ada50 Process32FirstW 299->301 302 7ff62a97f555 299->302 300->299 301->302 309 7ff62a97f501-7ff62a97f508 301->309 303 7ff62a97f557-7ff62a97f571 CreateToolhelp32Snapshot 302->303 305 7ff62a97f5f8 303->305 306 7ff62a97f577-7ff62a97f5a7 call 7ff62a9ada50 Process32FirstW 303->306 310 7ff62a97f5fa-7ff62a97f614 CreateToolhelp32Snapshot 305->310 306->305 316 7ff62a97f5a9 306->316 312 7ff62a97f510-7ff62a97f517 309->312 313 7ff62a97f61a-7ff62a97f64a call 7ff62a9ada50 Process32FirstW 310->313 314 7ff62a97f6a8 310->314 318 7ff62a97f520-7ff62a97f52a 312->318 313->314 327 7ff62a97f64c-7ff62a97f657 313->327 317 7ff62a97f6aa-7ff62a97f6f4 RegOpenKeyExW 314->317 320 7ff62a97f5b0-7ff62a97f5ba 316->320 321 7ff62a97f6fa-7ff62a97f72e RegQueryValueExW 317->321 322 7ff62a97f913-7ff62a97f94b RegOpenKeyExW 317->322 323 7ff62a97f52c-7ff62a97f534 318->323 324 7ff62a97f544-7ff62a97f553 Process32NextW 318->324 330 7ff62a97f5c0-7ff62a97f5ca 320->330 331 7ff62a97f908-7ff62a97f90d RegCloseKey 321->331 332 7ff62a97f734-7ff62a97f78b call 7ff62a98dff4 call 7ff62a9ada50 RegQueryValueExW 321->332 328 7ff62a97f9f2-7ff62a97fa2a RegOpenKeyExW 322->328 329 7ff62a97f951-7ff62a97f984 RegQueryValueExW 322->329 325 7ff62a97f53a-7ff62a97f542 323->325 326 7ff62a97f7f2-7ff62a97f7f4 323->326 324->302 324->312 325->318 325->324 326->303 333 7ff62a97f660-7ff62a97f66a 327->333 339 7ff62a97fad1-7ff62a97fb87 SHGetFolderPathW lstrcatW CreateFileW lstrlenW WriteFile CloseHandle FindFirstFileW 328->339 340 7ff62a97fa30-7ff62a97fa63 RegQueryValueExW 328->340 334 7ff62a97f9e7-7ff62a97f9ec RegCloseKey 329->334 335 7ff62a97f986-7ff62a97f9dd call 7ff62a98dff4 call 7ff62a9ada50 RegQueryValueExW 329->335 336 7ff62a97f5cc-7ff62a97f5d4 330->336 337 7ff62a97f5e4-7ff62a97f5f6 Process32NextW 330->337 331->322 332->331 362 7ff62a97f791-7ff62a97f7b9 call 7ff62a981310 332->362 343 7ff62a97f670-7ff62a97f67a 333->343 334->328 335->334 370 7ff62a97f9df 335->370 347 7ff62a97f5da-7ff62a97f5e2 336->347 348 7ff62a97f7f9-7ff62a97f7fb 336->348 337->305 337->320 345 7ff62a97fb89 339->345 346 7ff62a97fb91-7ff62a97fbdc FindClose call 7ff62a97fd10 339->346 341 7ff62a97fac6-7ff62a97facb RegCloseKey 340->341 342 7ff62a97fa65-7ff62a97fabc call 7ff62a98dff4 call 7ff62a9ada50 RegQueryValueExW 340->342 341->339 342->341 374 7ff62a97fabe 342->374 351 7ff62a97f67c-7ff62a97f684 343->351 352 7ff62a97f694-7ff62a97f6a6 Process32NextW 343->352 345->346 365 7ff62a97fbf8-7ff62a97fc20 call 7ff62a98dff4 346->365 366 7ff62a97fbde-7ff62a97fbe2 346->366 347->330 347->337 348->310 357 7ff62a97f68a-7ff62a97f692 351->357 358 7ff62a97f800-7ff62a97f802 351->358 352->314 352->333 357->343 357->352 358->317 376 7ff62a97f845-7ff62a97f855 362->376 377 7ff62a97f7bf-7ff62a97f7ca 362->377 375 7ff62a97fc23-7ff62a97fc7c 365->375 366->365 371 7ff62a97fbe4-7ff62a97fbf1 366->371 370->334 371->365 374->341 375->375 380 7ff62a97fc7e-7ff62a97fcac call 7ff62a9ad3b0 375->380 378 7ff62a97f8cd-7ff62a97f8d1 376->378 379 7ff62a97f857-7ff62a97f85e 376->379 381 7ff62a97f7d0-7ff62a97f7d9 377->381 378->331 382 7ff62a97f8d3-7ff62a97f8e5 378->382 383 7ff62a97f862-7ff62a97f86b 379->383 394 7ff62a97fcbe-7ff62a97fcc1 380->394 395 7ff62a97fcae-7ff62a97fcbb call 7ff62a973e30 380->395 381->376 385 7ff62a97f7db 381->385 386 7ff62a97f8e7-7ff62a97f8fa 382->386 387 7ff62a97f900-7ff62a97f903 call 7ff62a98df84 382->387 383->378 388 7ff62a97f86d 383->388 390 7ff62a97f7e0-7ff62a97f7e4 385->390 386->387 391 7ff62a97fcfe-7ff62a97fd03 call 7ff62a993ff8 386->391 387->331 393 7ff62a97f870-7ff62a97f874 388->393 396 7ff62a97f807-7ff62a97f80a 390->396 397 7ff62a97f7e6-7ff62a97f7ee 390->397 399 7ff62a97f88b-7ff62a97f88e 393->399 400 7ff62a97f876-7ff62a97f87e 393->400 402 7ff62a97fccb-7ff62a97fcf4 call 7ff62a98df84 394->402 403 7ff62a97fcc3-7ff62a97fcc6 call 7ff62a98df84 394->403 395->394 396->376 404 7ff62a97f80c-7ff62a97f81c 396->404 397->390 401 7ff62a97f7f0 397->401 399->378 407 7ff62a97f890-7ff62a97f89d 399->407 400->393 406 7ff62a97f880 400->406 401->376 403->402 410 7ff62a97f820-7ff62a97f826 404->410 406->378 411 7ff62a97f8a0-7ff62a97f8a6 407->411 413 7ff62a97f828-7ff62a97f834 410->413 414 7ff62a97f882-7ff62a97f886 410->414 416 7ff62a97f8ac-7ff62a97f8b8 411->416 417 7ff62a97fcf5-7ff62a97fcf9 411->417 413->410 415 7ff62a97f836-7ff62a97f83f 413->415 414->381 415->376 418 7ff62a97f8c5 415->418 416->411 419 7ff62a97f8ba-7ff62a97f8c3 416->419 417->383 418->378 419->378 419->418
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Process32QueryValue$Close$CreateFirst$FileNextOpenSnapshotToolhelp32$Concurrency::cancel_current_taskFindWindow$CountFolderForegroundHandleInfoInputLastPathTextTickWrite_invalid_parameter_noinfo_noreturnlstrcatlstrlenwsprintf
            • String ID: %d min$C:\ProgramData\Mylnk$C:\Users$OpenAi_Service$SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders$SOFTWARE\Microsoft\Windows\CurrentVersion\Run$Startup$Telegram.exe$WXWork.exe$WeChat.exe$\kernelquick.sys
            • API String ID: 3029130142-1423135667
            • Opcode ID: ae95ca29b607d4f2ea8f7fc560aae3042e643629e37788a7b14a35020a1b4311
            • Instruction ID: 1e2b18b1c4c86854ba0d3b4497b6562e15be4de0cba9688a8e05485a5ce9e7b6
            • Opcode Fuzzy Hash: ae95ca29b607d4f2ea8f7fc560aae3042e643629e37788a7b14a35020a1b4311
            • Instruction Fuzzy Hash: E732AF62F2868285EF208F2ADC047B973A1FB84B84F444176DA4DDB696DFBCE544C712
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: lstrlen$QueryValue$Open
            • String ID: 10443$154.91.90.234$154.91.90.234$154.91.90.234$4433$Console$Vendata$o1:$o2:$o3:$p1:$p2:$p3:$t1:$t2:$t3:
            • API String ID: 1772312705-745102317
            • Opcode ID: e9763d1a573506a6c5f52fab13ecf1f8c208e4fec7a72f7b0df219955d443a2f
            • Instruction ID: fb0bb761157a322eab0265dbcced5a4ef150e694ea2270e33319f9065fd922ab
            • Opcode Fuzzy Hash: e9763d1a573506a6c5f52fab13ecf1f8c208e4fec7a72f7b0df219955d443a2f
            • Instruction Fuzzy Hash: A322D562E3962B85EF149B1AEC5477D23A2FF94784F855072C60EC29D3EFBCA5458302

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 572 7ff62a9772d0-7ff62a977326 573 7ff62a977330-7ff62a977339 572->573 573->573 574 7ff62a97733b-7ff62a977344 573->574 575 7ff62a977346-7ff62a977360 call 7ff62a9ad3b0 574->575 576 7ff62a977362-7ff62a977367 call 7ff62a97a300 574->576 579 7ff62a97736c 575->579 576->579 581 7ff62a977373-7ff62a97737b 579->581 581->581 582 7ff62a97737d-7ff62a977390 581->582 583 7ff62a9773c5-7ff62a9773d5 call 7ff62a97a300 582->583 584 7ff62a977392-7ff62a9773c3 call 7ff62a9ad3b0 582->584 588 7ff62a9773da 583->588 584->588 589 7ff62a9773e1-7ff62a9773ea 588->589 589->589 590 7ff62a9773ec-7ff62a9773ff 589->590 591 7ff62a977434-7ff62a977444 call 7ff62a97a300 590->591 592 7ff62a977401-7ff62a977432 call 7ff62a9ad3b0 590->592 595 7ff62a977449-7ff62a97744d 591->595 592->595 597 7ff62a977454-7ff62a97745d 595->597 597->597 598 7ff62a97745f-7ff62a977472 597->598 599 7ff62a9774a7-7ff62a9774b4 call 7ff62a97a300 598->599 600 7ff62a977474-7ff62a9774a5 call 7ff62a9ad3b0 598->600 604 7ff62a9774b9-7ff62a9774cd 599->604 600->604 605 7ff62a977505-7ff62a97751f call 7ff62a97a300 604->605 606 7ff62a9774cf-7ff62a977503 call 7ff62a9ad3b0 604->606 610 7ff62a977524-7ff62a97752f 605->610 606->610 611 7ff62a977530-7ff62a977539 610->611 611->611 612 7ff62a97753b-7ff62a97754e 611->612 613 7ff62a977583-7ff62a977590 call 7ff62a97a300 612->613 614 7ff62a977550-7ff62a977581 call 7ff62a9ad3b0 612->614 618 7ff62a977595-7ff62a977599 613->618 614->618 619 7ff62a9775a0-7ff62a9775a9 618->619 619->619 620 7ff62a9775ab-7ff62a9775be 619->620 621 7ff62a9775f3-7ff62a977600 call 7ff62a97a300 620->621 622 7ff62a9775c0-7ff62a9775f1 call 7ff62a9ad3b0 620->622 626 7ff62a977605-7ff62a9776b4 call 7ff62a989250 call 7ff62a989be0 MultiByteToWideChar * 2 621->626 622->626 631 7ff62a9776b6-7ff62a9776c7 626->631 632 7ff62a9776e3-7ff62a9776fd 626->632 633 7ff62a9776c9-7ff62a9776dc 631->633 634 7ff62a9776de call 7ff62a98df84 631->634 635 7ff62a977732-7ff62a977752 632->635 636 7ff62a9776ff-7ff62a977716 632->636 633->634 637 7ff62a977759-7ff62a977797 call 7ff62a993ff8 CreateMutexExW GetLastError 633->637 634->632 639 7ff62a97772d call 7ff62a98df84 636->639 640 7ff62a977718-7ff62a97772b 636->640 647 7ff62a9777c9-7ff62a9777d0 637->647 648 7ff62a977799 637->648 639->635 640->639 642 7ff62a977753-7ff62a977758 call 7ff62a993ff8 640->642 642->637 650 7ff62a9777d6 647->650 651 7ff62a977870-7ff62a977922 GetModuleHandleW GetConsoleWindow SHGetFolderPathW lstrcatW CreateMutexW WaitForSingleObject CreateFileW GetFileSize CloseHandle 647->651 649 7ff62a9777a0-7ff62a9777c7 Sleep CreateMutexW GetLastError 648->649 649->647 649->649 652 7ff62a9777e0-7ff62a977840 lstrlenW call 7ff62a978e30 650->652 653 7ff62a97792d-7ff62a97795d ReleaseMutex DirectInput8Create 651->653 654 7ff62a977924-7ff62a977927 DeleteFileW 651->654 660 7ff62a977858-7ff62a97786a SleepEx 652->660 661 7ff62a977842-7ff62a977856 lstrcmpW 652->661 655 7ff62a977963-7ff62a977983 653->655 656 7ff62a977a00-7ff62a977a1e 653->656 654->653 655->656 662 7ff62a977985-7ff62a97799b 655->662 660->651 660->652 661->651 661->660 662->656 664 7ff62a97799d-7ff62a9779b5 662->664 664->656 666 7ff62a9779b7-7ff62a9779ed 664->666 666->656 668 7ff62a9779ef-7ff62a9779fe 666->668 668->656 670 7ff62a977a1f-7ff62a977a51 GetTickCount GetKeyState call 7ff62a97adb0 668->670
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ByteCharMultiWide$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
            • String ID: <$X64$\DisplaySessionContainers.log$key$open
            • API String ID: 143101810-941791203
            • Opcode ID: 6fd8a70502cb876f37e01b3f442c82311147053e1733d129978e172daf7e84cf
            • Instruction ID: d19b94fc2fd4f29a056747da72d803ac5b7019584164cbd857ce4a2f89f04e94
            • Opcode Fuzzy Hash: 6fd8a70502cb876f37e01b3f442c82311147053e1733d129978e172daf7e84cf
            • Instruction Fuzzy Hash: E922A362E28A81D2EF10CB26EC442AE7362FB84B94F504272DA5EC7B96DF7DD144C741

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 673 7ff62a97fd10-7ff62a97fda8 GetDesktopWindow GetDC CreateCompatibleDC GetDC GetDeviceCaps * 2 ReleaseDC 674 7ff62a97fdaa-7ff62a97fdb9 673->674 675 7ff62a97fdbe-7ff62a97fddc GetSystemMetrics 673->675 676 7ff62a97fe47-7ff62a980083 GetSystemMetrics * 2 CreateCompatibleBitmap SelectObject SetStretchBltMode GetSystemMetrics * 2 StretchBlt call 7ff62a98dff4 call 7ff62a9ada50 GetDIBits call 7ff62a98dff4 call 7ff62a9ada50 call 7ff62a9ad3b0 call 7ff62a98dfb8 call 7ff62a980220 674->676 677 7ff62a97fe28-7ff62a97fe43 GetSystemMetrics 675->677 678 7ff62a97fdde-7ff62a97fe26 GetSystemMetrics 675->678 693 7ff62a98011c-7ff62a98014c call 7ff62a98dff4 676->693 694 7ff62a980089-7ff62a9800c3 DeleteObject * 2 ReleaseDC call 7ff62a98df84 * 2 676->694 677->676 678->676 700 7ff62a980151-7ff62a98018c call 7ff62a9ad3b0 DeleteObject * 2 ReleaseDC call 7ff62a98df84 * 2 693->700 701 7ff62a98014e 693->701 705 7ff62a9800f5-7ff62a980117 call 7ff62a98df84 694->705 706 7ff62a9800c5-7ff62a9800d2 694->706 720 7ff62a980191-7ff62a980199 700->720 701->700 717 7ff62a9801ea-7ff62a98020c 705->717 708 7ff62a9800d4-7ff62a9800e7 706->708 709 7ff62a9800f0 call 7ff62a98df84 706->709 712 7ff62a98020d-7ff62a980212 call 7ff62a993ff8 708->712 713 7ff62a9800ed 708->713 709->705 713->709 721 7ff62a98019b-7ff62a9801a8 720->721 722 7ff62a9801c7-7ff62a9801e7 call 7ff62a98df84 720->722 723 7ff62a9801aa-7ff62a9801bd 721->723 724 7ff62a9801c2 call 7ff62a98df84 721->724 722->717 723->712 726 7ff62a9801bf 723->726 724->722 726->724
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: MetricsObjectSystem$Delete$CreateCriticalGlobalSection$EnterRelease$BitmapCapsCompatibleConcurrency::cancel_current_taskDeviceGdipStreamStretch$AllocBitsDesktopDisposeFromGdiplusImageLeaveLockModeSelectShutdownUnlockWindow_invalid_parameter_noinfo_noreturn
            • String ID: $($6$gfff$gfff
            • API String ID: 1610826097-2922166585
            • Opcode ID: 71b1a06c58d9a713bc661b4cc54b325f4da7adbc8ed465da53ef13dc4a73e4cd
            • Instruction ID: 610db18cfc2f2ed942e88ff12f7765a59c8d1336ba46a2ca6c67f885ebf9f64f
            • Opcode Fuzzy Hash: 71b1a06c58d9a713bc661b4cc54b325f4da7adbc8ed465da53ef13dc4a73e4cd
            • Instruction Fuzzy Hash: 3AD1E972E2878586EB159F36E80437AA2A2FF89B84F004236DA4DD7756DF7CD480C702

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 729 7ff62a978a40-7ff62a978a6f GetCurrentProcessId OpenProcess 730 7ff62a978a99-7ff62a978aae 729->730 731 7ff62a978a71-7ff62a978a8e OpenProcessToken 729->731 732 7ff62a978a90-7ff62a978a93 CloseHandle 731->732 733 7ff62a978aaf-7ff62a978ad7 call 7ff62a978710 731->733 732->730 736 7ff62a978b0a 733->736 737 7ff62a978ad9-7ff62a978adf 733->737 738 7ff62a978b0f-7ff62a978b12 736->738 739 7ff62a978ae9 737->739 740 7ff62a978ae1-7ff62a978ae7 SysStringLen 737->740 741 7ff62a978b4c-7ff62a978b86 call 7ff62a9ad3b0 CloseHandle * 2 738->741 742 7ff62a978b14-7ff62a978b29 call 7ff62a98dfb8 738->742 743 7ff62a978aec-7ff62a978aef 739->743 740->743 753 7ff62a978b88-7ff62a978b92 741->753 754 7ff62a978bce-7ff62a978bd6 741->754 751 7ff62a978b3b 742->751 752 7ff62a978b2b-7ff62a978b39 742->752 743->736 744 7ff62a978af1-7ff62a978af7 743->744 747 7ff62a978af9-7ff62a978b01 SysStringLen 744->747 748 7ff62a978b03-7ff62a978b08 744->748 747->738 748->738 755 7ff62a978b3e-7ff62a978b46 751->755 752->755 758 7ff62a978bc9 753->758 759 7ff62a978b94-7ff62a978b9f 753->759 756 7ff62a978c0d-7ff62a978c1f 754->756 757 7ff62a978bd8-7ff62a978be3 754->757 755->741 764 7ff62a978c20-7ff62a978c99 call 7ff62a98eca0 call 7ff62a98dff4 GetCurrentProcessId wsprintfW call 7ff62a978a40 call 7ff62a9ada50 GetVersionExW 755->764 762 7ff62a978be5-7ff62a978beb SysFreeString 757->762 763 7ff62a978bee-7ff62a978bf5 757->763 758->754 760 7ff62a978baa-7ff62a978bb1 759->760 761 7ff62a978ba1-7ff62a978ba7 SysFreeString 759->761 765 7ff62a978bbc-7ff62a978bc4 call 7ff62a98df84 760->765 766 7ff62a978bb3-7ff62a978bb8 call 7ff62a98df84 760->766 761->760 762->763 768 7ff62a978bf7-7ff62a978bfc call 7ff62a98df84 763->768 769 7ff62a978c00-7ff62a978c08 call 7ff62a98df84 763->769 784 7ff62a978df2 764->784 785 7ff62a978c9f-7ff62a978ca4 764->785 765->758 766->765 768->769 769->756 787 7ff62a978df9-7ff62a978e03 wsprintfW 784->787 785->784 786 7ff62a978caa-7ff62a978caf 785->786 786->784 789 7ff62a978cb5-7ff62a978cdb GetCurrentProcess OpenProcessToken 786->789 788 7ff62a978e09-7ff62a978e20 call 7ff62a98df84 787->788 789->784 791 7ff62a978ce1-7ff62a978d10 GetTokenInformation 789->791 793 7ff62a978d9c-7ff62a978dac CloseHandle 791->793 794 7ff62a978d16-7ff62a978d1f GetLastError 791->794 793->784 795 7ff62a978dae-7ff62a978db4 793->795 794->793 796 7ff62a978d21-7ff62a978d41 LocalAlloc 794->796 799 7ff62a978de9-7ff62a978df0 795->799 800 7ff62a978db6-7ff62a978dbc 795->800 797 7ff62a978d94 796->797 798 7ff62a978d43-7ff62a978d70 GetTokenInformation 796->798 797->793 801 7ff62a978d8b-7ff62a978d8e LocalFree 798->801 802 7ff62a978d72-7ff62a978d89 GetSidSubAuthorityCount GetSidSubAuthority 798->802 799->787 803 7ff62a978de0-7ff62a978de7 800->803 804 7ff62a978dbe-7ff62a978dc4 800->804 801->797 802->801 803->787 805 7ff62a978dd7-7ff62a978dde 804->805 806 7ff62a978dc6-7ff62a978dcc 804->806 805->787 806->788 807 7ff62a978dce-7ff62a978dd5 806->807 807->787
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Process$CloseHandleStringToken$CurrentFreeOpen$AuthorityInformationLocalwsprintf$AllocCountErrorLastVersion
            • String ID: -N/$NO/$None/%s$VenNetwork
            • API String ID: 166307840-819860926
            • Opcode ID: 00eac611e7b887442b1dbd49258f34c0a3f8b380a041ee38be825e5737044c3c
            • Instruction ID: 0299d4a9c23666ceb105b640b35ef9df9c89d15b8f9de921ffd2bba4ecf7e820
            • Opcode Fuzzy Hash: 00eac611e7b887442b1dbd49258f34c0a3f8b380a041ee38be825e5737044c3c
            • Instruction Fuzzy Hash: FDB18172E2864282FF119B26EC503B963A1EF84B80F048476DA4DCB796DF7CD885C712

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 962 7ff62a978710-7ff62a97874e 963 7ff62a978755-7ff62a978772 call 7ff62a976300 call 7ff62a98dfb8 962->963 964 7ff62a978750-7ff62a978753 962->964 977 7ff62a978796 963->977 978 7ff62a978774-7ff62a97878e SysAllocString 963->978 964->963 965 7ff62a9787a5-7ff62a9787ab 964->965 968 7ff62a9787ad-7ff62a9787b0 965->968 969 7ff62a9787b2-7ff62a9787cf call 7ff62a976300 call 7ff62a98dfb8 965->969 968->969 971 7ff62a978802-7ff62a978808 968->971 990 7ff62a9787f3 969->990 991 7ff62a9787d1-7ff62a9787eb SysAllocString 969->991 974 7ff62a9789ff 971->974 975 7ff62a97880e-7ff62a978831 GetTokenInformation 971->975 989 7ff62a978a06-7ff62a978a10 call 7ff62a98eca0 974->989 979 7ff62a97886c-7ff62a978894 GetTokenInformation 975->979 980 7ff62a978833-7ff62a97883c GetLastError 975->980 986 7ff62a978799-7ff62a97879f 977->986 983 7ff62a978794 978->983 984 7ff62a978a11-7ff62a978a1b call 7ff62a98eca0 978->984 987 7ff62a97889a-7ff62a9788d2 LookupAccountSidW 979->987 988 7ff62a9789e6-7ff62a9789e9 979->988 980->974 985 7ff62a978842-7ff62a978866 GetProcessHeap HeapAlloc 980->985 983->986 1000 7ff62a978a1c-7ff62a978a26 call 7ff62a98eca0 984->1000 985->974 985->979 986->965 986->989 993 7ff62a97891b-7ff62a978921 987->993 994 7ff62a9788d4-7ff62a9788df GetLastError 987->994 988->974 992 7ff62a9789eb-7ff62a9789f9 GetProcessHeap HeapFree 988->992 989->984 1002 7ff62a9787f6-7ff62a9787fc 990->1002 991->1000 1001 7ff62a9787f1 991->1001 992->974 998 7ff62a97892d-7ff62a97894a call 7ff62a976300 call 7ff62a98dfb8 993->998 999 7ff62a978923-7ff62a97892b 993->999 1003 7ff62a9788fc-7ff62a97891a 994->1003 1004 7ff62a9788e1-7ff62a9788f7 call 7ff62a998a40 994->1004 1024 7ff62a97894c-7ff62a978968 SysAllocString 998->1024 1025 7ff62a978970 998->1025 999->998 1006 7ff62a97897f-7ff62a978985 999->1006 1015 7ff62a978a27-7ff62a978a31 call 7ff62a98eca0 1000->1015 1001->1002 1002->971 1002->989 1004->988 1012 7ff62a978987-7ff62a978992 1006->1012 1013 7ff62a978994-7ff62a9789b1 call 7ff62a976300 call 7ff62a98dfb8 1006->1013 1012->1013 1017 7ff62a9789e1 1012->1017 1030 7ff62a9789d6 1013->1030 1031 7ff62a9789b3-7ff62a9789d2 SysAllocString 1013->1031 1027 7ff62a978a32-7ff62a978a6f call 7ff62a98eca0 GetCurrentProcessId OpenProcess 1015->1027 1017->988 1024->1015 1028 7ff62a97896e 1024->1028 1029 7ff62a978973-7ff62a978979 1025->1029 1037 7ff62a978a99-7ff62a978aae 1027->1037 1038 7ff62a978a71-7ff62a978a8e OpenProcessToken 1027->1038 1028->1029 1029->989 1029->1006 1034 7ff62a9789d9-7ff62a9789df 1030->1034 1031->1027 1033 7ff62a9789d4 1031->1033 1033->1034 1034->989 1034->1017 1039 7ff62a978a90-7ff62a978a93 CloseHandle 1038->1039 1040 7ff62a978aaf-7ff62a978ad7 call 7ff62a978710 1038->1040 1039->1037 1043 7ff62a978b0a 1040->1043 1044 7ff62a978ad9-7ff62a978adf 1040->1044 1045 7ff62a978b0f-7ff62a978b12 1043->1045 1046 7ff62a978ae9 1044->1046 1047 7ff62a978ae1-7ff62a978ae7 SysStringLen 1044->1047 1048 7ff62a978b4c-7ff62a978b86 call 7ff62a9ad3b0 CloseHandle * 2 1045->1048 1049 7ff62a978b14-7ff62a978b29 call 7ff62a98dfb8 1045->1049 1050 7ff62a978aec-7ff62a978aef 1046->1050 1047->1050 1060 7ff62a978b88-7ff62a978b92 1048->1060 1061 7ff62a978bce-7ff62a978bd6 1048->1061 1058 7ff62a978b3b 1049->1058 1059 7ff62a978b2b-7ff62a978b39 1049->1059 1050->1043 1051 7ff62a978af1-7ff62a978af7 1050->1051 1054 7ff62a978af9-7ff62a978b01 SysStringLen 1051->1054 1055 7ff62a978b03-7ff62a978b08 1051->1055 1054->1045 1055->1045 1062 7ff62a978b3e-7ff62a978b46 1058->1062 1059->1062 1065 7ff62a978bc9 1060->1065 1066 7ff62a978b94-7ff62a978b9f 1060->1066 1063 7ff62a978c0d-7ff62a978c1f 1061->1063 1064 7ff62a978bd8-7ff62a978be3 1061->1064 1062->1048 1071 7ff62a978c20-7ff62a978c99 call 7ff62a98eca0 call 7ff62a98dff4 GetCurrentProcessId wsprintfW call 7ff62a978a40 call 7ff62a9ada50 GetVersionExW 1062->1071 1069 7ff62a978be5-7ff62a978beb SysFreeString 1064->1069 1070 7ff62a978bee-7ff62a978bf5 1064->1070 1065->1061 1067 7ff62a978baa-7ff62a978bb1 1066->1067 1068 7ff62a978ba1-7ff62a978ba7 SysFreeString 1066->1068 1072 7ff62a978bbc-7ff62a978bc4 call 7ff62a98df84 1067->1072 1073 7ff62a978bb3-7ff62a978bb8 call 7ff62a98df84 1067->1073 1068->1067 1069->1070 1075 7ff62a978bf7-7ff62a978bfc call 7ff62a98df84 1070->1075 1076 7ff62a978c00-7ff62a978c08 call 7ff62a98df84 1070->1076 1091 7ff62a978df2 1071->1091 1092 7ff62a978c9f-7ff62a978ca4 1071->1092 1072->1065 1073->1072 1075->1076 1076->1063 1094 7ff62a978df9-7ff62a978e03 wsprintfW 1091->1094 1092->1091 1093 7ff62a978caa-7ff62a978caf 1092->1093 1093->1091 1096 7ff62a978cb5-7ff62a978cdb GetCurrentProcess OpenProcessToken 1093->1096 1095 7ff62a978e09-7ff62a978e20 call 7ff62a98df84 1094->1095 1096->1091 1098 7ff62a978ce1-7ff62a978d10 GetTokenInformation 1096->1098 1100 7ff62a978d9c-7ff62a978dac CloseHandle 1098->1100 1101 7ff62a978d16-7ff62a978d1f GetLastError 1098->1101 1100->1091 1102 7ff62a978dae-7ff62a978db4 1100->1102 1101->1100 1103 7ff62a978d21-7ff62a978d41 LocalAlloc 1101->1103 1106 7ff62a978de9-7ff62a978df0 1102->1106 1107 7ff62a978db6-7ff62a978dbc 1102->1107 1104 7ff62a978d94 1103->1104 1105 7ff62a978d43-7ff62a978d70 GetTokenInformation 1103->1105 1104->1100 1108 7ff62a978d8b-7ff62a978d8e LocalFree 1105->1108 1109 7ff62a978d72-7ff62a978d89 GetSidSubAuthorityCount GetSidSubAuthority 1105->1109 1106->1094 1110 7ff62a978de0-7ff62a978de7 1107->1110 1111 7ff62a978dbe-7ff62a978dc4 1107->1111 1108->1104 1109->1108 1110->1094 1112 7ff62a978dd7-7ff62a978dde 1111->1112 1113 7ff62a978dc6-7ff62a978dcc 1111->1113 1112->1094 1113->1095 1114 7ff62a978dce-7ff62a978dd5 1113->1114 1114->1094
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: AllocProcess$HeapString$Token$ErrorInformationLastOpen$AccountCloseCurrentFreeHandleLookup
            • String ID: NONE_MAPPED
            • API String ID: 1410310566-2950899194
            • Opcode ID: 153f7837cc86bcbbc492fb4a375331227a21e9cb239b2b2f7dd34d1ee50442fc
            • Instruction ID: 6df3f01ea57ace556657ed8a5c3f8f7a27b9703da89730093e06c75c9e705994
            • Opcode Fuzzy Hash: 153f7837cc86bcbbc492fb4a375331227a21e9cb239b2b2f7dd34d1ee50442fc
            • Instruction Fuzzy Hash: 9AA19672E29B4281FF559B169C1037962D5EF84B80F548476DA4DCB792EFBCE881C312

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1115 7ff62a977a60-7ff62a977aac call 7ff62a9ada50 call 7ff62a98ff40 1120 7ff62a977b7c-7ff62a977ba7 CoCreateInstance 1115->1120 1121 7ff62a977ab2-7ff62a977ac6 1115->1121 1122 7ff62a977bad-7ff62a977bf9 1120->1122 1123 7ff62a977da1-7ff62a977dac lstrlenW 1120->1123 1124 7ff62a977ad0-7ff62a977af8 call 7ff62a9ada50 CreateToolhelp32Snapshot 1121->1124 1132 7ff62a977d8f-7ff62a977d99 1122->1132 1133 7ff62a977bff-7ff62a977c1b 1122->1133 1126 7ff62a977dae-7ff62a977dbe lstrcatW 1123->1126 1127 7ff62a977dbf-7ff62a977dc6 1123->1127 1134 7ff62a977afa-7ff62a977b10 Process32FirstW 1124->1134 1135 7ff62a977b56-7ff62a977b76 call 7ff62a98ff40 1124->1135 1126->1127 1130 7ff62a977dc8 1127->1130 1131 7ff62a977dce-7ff62a977de4 1127->1131 1130->1131 1132->1123 1137 7ff62a977d9b 1132->1137 1133->1132 1143 7ff62a977c21-7ff62a977cdd call 7ff62a9ada50 wsprintfW RegOpenKeyExW 1133->1143 1138 7ff62a977b4d-7ff62a977b50 CloseHandle 1134->1138 1139 7ff62a977b12-7ff62a977b1c 1134->1139 1135->1120 1135->1124 1137->1123 1138->1135 1142 7ff62a977b20-7ff62a977b2a 1139->1142 1144 7ff62a977b2c-7ff62a977b32 1142->1144 1145 7ff62a977b34-7ff62a977b39 1142->1145 1151 7ff62a977d6d-7ff62a977d7f 1143->1151 1152 7ff62a977ce3-7ff62a977d3e call 7ff62a9ada50 RegQueryValueExW 1143->1152 1144->1142 1144->1145 1147 7ff62a977de5-7ff62a977def CloseHandle 1145->1147 1148 7ff62a977b3f-7ff62a977b4b Process32NextW 1145->1148 1147->1135 1150 7ff62a977df5-7ff62a977e13 lstrcatW * 2 1147->1150 1148->1138 1148->1139 1150->1135 1154 7ff62a977d87-7ff62a977d89 1151->1154 1156 7ff62a977d60-7ff62a977d67 RegCloseKey 1152->1156 1157 7ff62a977d40-7ff62a977d5a lstrcatW * 2 1152->1157 1154->1132 1154->1143 1156->1151 1157->1156
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: lstrcat$Close$CreateHandleProcess32$FirstInstanceNextOpenQuerySnapshotToolhelp32Valuelstrlenwsprintf
            • String ID: CLSID\{%.8X-%.4X-%.4X-%.2X%.2X-%.2X%.2X%.2X%.2X%.2X%.2X}$Windows Defender IOfficeAntiVirus implementation
            • API String ID: 582347850-1583895642
            • Opcode ID: 172064aca06d7bab2ac812725ebad370c198c4fa5686a0e3f00f667ec9231332
            • Instruction ID: 80a9b06e38604eabf5b6ddff3fc92296816bf9f26549d42888bbb595ecb021ae
            • Opcode Fuzzy Hash: 172064aca06d7bab2ac812725ebad370c198c4fa5686a0e3f00f667ec9231332
            • Instruction Fuzzy Hash: 2EA17062F18A82C6EB60CF26EC406AA67A1FB84B88F444172DE4DC7A5ADF7DD544C701

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1205 7ff62a97b410-7ff62a97b451 CreateEventW 1206 7ff62a97b457-7ff62a97b4c6 call 7ff62a971200 1205->1206 1207 7ff62a97b7b1-7ff62a97b7bb call 7ff62a9710f0 1205->1207 1212 7ff62a97b7bc-7ff62a97b7c6 call 7ff62a9710f0 1206->1212 1213 7ff62a97b4cc-7ff62a97b51b HeapCreate 1206->1213 1207->1212 1217 7ff62a97b7c7-7ff62a97b7d1 call 7ff62a9710f0 1212->1217 1213->1217 1218 7ff62a97b521-7ff62a97b549 1213->1218 1225 7ff62a97b7d2-7ff62a97b7dc call 7ff62a9710f0 1217->1225 1220 7ff62a97b54b-7ff62a97b55a call 7ff62a993bd8 1218->1220 1221 7ff62a97b560-7ff62a97b577 InitializeCriticalSectionAndSpinCount 1218->1221 1220->1221 1224 7ff62a97b57d-7ff62a97b5b2 CreateEventW 1221->1224 1221->1225 1228 7ff62a97b7dd-7ff62a97b7e7 call 7ff62a9710f0 1224->1228 1229 7ff62a97b5b8-7ff62a97b5d2 CreateEventW 1224->1229 1225->1228 1230 7ff62a97b7e8-7ff62a97b7f2 call 7ff62a9710f0 1228->1230 1229->1230 1231 7ff62a97b5d8-7ff62a97b5f2 CreateEventW 1229->1231 1235 7ff62a97b7f3-7ff62a97b7fd call 7ff62a9710f0 1230->1235 1234 7ff62a97b5f8-7ff62a97b6bb InitializeCriticalSectionAndSpinCount 1231->1234 1231->1235 1238 7ff62a97b6c1-7ff62a97b6cf InitializeCriticalSectionAndSpinCount 1234->1238 1239 7ff62a97b7fe-7ff62a97b826 call 7ff62a9710f0 1234->1239 1235->1239 1243 7ff62a97b7a6-7ff62a97b7b0 call 7ff62a9710f0 1238->1243 1244 7ff62a97b6d5-7ff62a97b7a5 timeGetTime CreateEventW * 2 call 7ff62a98dff4 * 2 1238->1244 1249 7ff62a97b828-7ff62a97b82d call 7ff62a98df84 1239->1249 1250 7ff62a97b832-7ff62a97b83a 1239->1250 1243->1207 1249->1250
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Create$Event$CountCriticalInitializeSectionSpin$Heap$ProcessTimetime
            • String ID: <$<
            • API String ID: 2446585644-213342407
            • Opcode ID: 17258ff49d707124ef2c9ecd2dc6df9e5499853eed48c408e16bdd678f56143d
            • Instruction ID: 0c08eb439e11d132588ce1f5f17fc8ba212a82baa7cd89cf889e0414ceaa51f4
            • Opcode Fuzzy Hash: 17258ff49d707124ef2c9ecd2dc6df9e5499853eed48c408e16bdd678f56143d
            • Instruction Fuzzy Hash: C5B15072A15B818BE744CF36D8843A933A5FB44B08F58413DCB4D8B79ADF78A064CB25
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ControlDevice$ByteCharCloseCreateFileHandleMultiWide$wsprintf
            • String ID: \\.\HCD%d
            • API String ID: 2324936672-2696249065
            • Opcode ID: fba3a6acf6e72ed7b72618c4283ac656f0c243164c030697ae0719591fc402df
            • Instruction ID: 9d7c9b5f69f8d2a046a1bc43a7f233f1fda458e3c508e040b7daa8ec8967d3f4
            • Opcode Fuzzy Hash: fba3a6acf6e72ed7b72618c4283ac656f0c243164c030697ae0719591fc402df
            • Instruction Fuzzy Hash: EC51BF32E297828AEF609F12B94076A7794EB857C4F042175DA8DC3B96DF7CD415CB01
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Thread$Window$CloseConsoleCreateCurrentExceptionFilterHandleInputMessageObjectPostShowSingleSleepStateUnhandledWait
            • String ID:
            • API String ID: 2277684705-0
            • Opcode ID: 1f499c150cbe33159222533ec4b742c736879ee302e7e86ebc66b87cb5efa357
            • Instruction ID: 9eb038b580b4b53a637fbfa2cd7ca6bbf0a2225592df4d68adf409b376e52de3
            • Opcode Fuzzy Hash: 1f499c150cbe33159222533ec4b742c736879ee302e7e86ebc66b87cb5efa357
            • Instruction Fuzzy Hash: B3011A26E28A4282EF049B76AC5423932A3FF88B51B4441B7C51EC2672DEBC90458203
            APIs
            • _get_daylight.LIBCMT ref: 00007FF62A9A208D
              • Part of subcall function 00007FF62A9A1704: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62A9A1718
              • Part of subcall function 00007FF62A99E95C: RtlFreeHeap.NTDLL(?,?,?,00007FF62A9A6862,?,?,?,00007FF62A9A6BDF,?,?,00000000,00007FF62A9A7025,?,?,?,00007FF62A9A6F57), ref: 00007FF62A99E972
              • Part of subcall function 00007FF62A99E95C: GetLastError.KERNEL32(?,?,?,00007FF62A9A6862,?,?,?,00007FF62A9A6BDF,?,?,00000000,00007FF62A9A7025,?,?,?,00007FF62A9A6F57), ref: 00007FF62A99E97C
              • Part of subcall function 00007FF62A994028: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF62A993FD7,?,?,?,?,?,00007FF62A993EC2), ref: 00007FF62A994031
              • Part of subcall function 00007FF62A994028: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF62A993FD7,?,?,?,?,?,00007FF62A993EC2), ref: 00007FF62A994056
              • Part of subcall function 00007FF62A9AA1B4: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62A9AA0FF
            • _get_daylight.LIBCMT ref: 00007FF62A9A207C
              • Part of subcall function 00007FF62A9A1764: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62A9A1778
            • _get_daylight.LIBCMT ref: 00007FF62A9A22F2
            • _get_daylight.LIBCMT ref: 00007FF62A9A2303
            • _get_daylight.LIBCMT ref: 00007FF62A9A2314
            • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF62A9A2554), ref: 00007FF62A9A233B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureFreeHeapInformationLastPresentProcessProcessorTimeZone
            • String ID: Eastern Standard Time$Eastern Summer Time
            • API String ID: 4070488512-239921721
            • Opcode ID: 5190737fcedb8824ad4a2f5adc1dd419c442ee6d8cf329e1688e58de2abb36f5
            • Instruction ID: c9717bb1c734dd4bd0baeb265ac7f9d45e535bdd08799fb2d15c05d0317df724
            • Opcode Fuzzy Hash: 5190737fcedb8824ad4a2f5adc1dd419c442ee6d8cf329e1688e58de2abb36f5
            • Instruction Fuzzy Hash: A4D1D126E286528AEF249F27DC802B96752FB44784F508076DE0EC7A97DFBCE441C742
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ControlDevice_invalid_parameter_noinfo_noreturn$CreateFilewsprintf
            • String ID:
            • API String ID: 3155671162-0
            • Opcode ID: 0ada5f76f23944388edcc0c31909764c5d9fb7e854cf6f7faa3115ea1d042638
            • Instruction ID: b314e1fcdcc2763316e2eeda507393880d170d5bccd71fad69a7e543580c5a87
            • Opcode Fuzzy Hash: 0ada5f76f23944388edcc0c31909764c5d9fb7e854cf6f7faa3115ea1d042638
            • Instruction Fuzzy Hash: 1E029162F28B8185EF00DB66DC503BD23A2AB45798F404275EE5DDBBCBDEB8D4858311
            APIs
            • _get_daylight.LIBCMT ref: 00007FF62A9A22F2
              • Part of subcall function 00007FF62A9A1764: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62A9A1778
            • _get_daylight.LIBCMT ref: 00007FF62A9A2303
              • Part of subcall function 00007FF62A9A1704: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62A9A1718
            • _get_daylight.LIBCMT ref: 00007FF62A9A2314
              • Part of subcall function 00007FF62A9A1734: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62A9A1748
              • Part of subcall function 00007FF62A99E95C: RtlFreeHeap.NTDLL(?,?,?,00007FF62A9A6862,?,?,?,00007FF62A9A6BDF,?,?,00000000,00007FF62A9A7025,?,?,?,00007FF62A9A6F57), ref: 00007FF62A99E972
              • Part of subcall function 00007FF62A99E95C: GetLastError.KERNEL32(?,?,?,00007FF62A9A6862,?,?,?,00007FF62A9A6BDF,?,?,00000000,00007FF62A9A7025,?,?,?,00007FF62A9A6F57), ref: 00007FF62A99E97C
            • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF62A9A2554), ref: 00007FF62A9A233B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
            • String ID: Eastern Standard Time$Eastern Summer Time
            • API String ID: 3458911817-239921721
            • Opcode ID: 2133f9b6c4e90f95ebb1c2c4b763d73db315d9997485f014e8f6b7b9b98ca04f
            • Instruction ID: 5da9417a2a1253414533a7e917da7f269ab3aba3cc09817f8495b00ba92ecd02
            • Opcode Fuzzy Hash: 2133f9b6c4e90f95ebb1c2c4b763d73db315d9997485f014e8f6b7b9b98ca04f
            • Instruction Fuzzy Hash: 4B518032E286428AEF10DF27DC901A97762FB48784F545176EA4DC36A7DFBCE4008B42
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: _get_daylight$_isindst$_invalid_parameter_noinfo
            • String ID:
            • API String ID: 1405656091-0
            • Opcode ID: 94003a780ed234a965d2311ace6d53ea410cbd1e40622ac1b689e0d0deb2975f
            • Instruction ID: 7a9c2350abf58cb5076b1a0f6d052155b6cc9f6ce1bd36ffedbb11bda5898722
            • Opcode Fuzzy Hash: 94003a780ed234a965d2311ace6d53ea410cbd1e40622ac1b689e0d0deb2975f
            • Instruction Fuzzy Hash: 1591B1B2F142478FEF588F66CE412A963A5EB54788F04D039DA0DCA79AEF7CE5418701
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Virtual$AllocFreeTimerecvselecttime
            • String ID:
            • API String ID: 1996171534-0
            • Opcode ID: f1a4534c36cf054a18a844d81d8b44948fc4158a34af035147a7d8a3da91c79a
            • Instruction ID: 338c4e4da8ba5dbd5c570afd35fb6da41c5d98d3e64b9b8848656711df5bde48
            • Opcode Fuzzy Hash: f1a4534c36cf054a18a844d81d8b44948fc4158a34af035147a7d8a3da91c79a
            • Instruction Fuzzy Hash: C47162B2E28A8581EB209F29D8043BE33A0FB95B88F149275CF4D87756DF79E584C711
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Virtual$AllocFree
            • String ID:
            • API String ID: 2087232378-0
            • Opcode ID: bdec6c309521b78e3869a161020c8be31cfe41798d2485b5db3fb8b25cd2d730
            • Instruction ID: 1f2540ab297bf3d760cbe19d11cbb731974a44d8c3f0ecbddbbd14e117d69161
            • Opcode Fuzzy Hash: bdec6c309521b78e3869a161020c8be31cfe41798d2485b5db3fb8b25cd2d730
            • Instruction Fuzzy Hash: 42413472B18A418AEB0DCE2BEC10669A755FB84F84B144139EE0EC775AEE78D845C741

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 808 7ff62a980220-7ff62a980299 GlobalAlloc GlobalLock call 7ff62a9ad3b0 GlobalUnlock CreateStreamOnHGlobal 811 7ff62a9805f1-7ff62a9805fa GlobalFree 808->811 812 7ff62a98029f-7ff62a9802fe call 7ff62a9761e0 EnterCriticalSection LeaveCriticalSection call 7ff62a97c9b0 808->812 813 7ff62a9805fd-7ff62a980617 811->813 818 7ff62a980304-7ff62a98032e GdipCreateBitmapFromStream 812->818 819 7ff62a98056e-7ff62a980584 812->819 820 7ff62a98033b-7ff62a980356 call 7ff62a97c340 GdipDisposeImage 818->820 821 7ff62a980330-7ff62a980336 GdipDisposeImage 818->821 824 7ff62a9805aa-7ff62a9805c0 call 7ff62a9761e0 EnterCriticalSection 819->824 825 7ff62a980586-7ff62a9805a4 DeleteObject 819->825 820->819 828 7ff62a98035c-7ff62a980373 CreateStreamOnHGlobal 820->828 821->819 831 7ff62a9805e7-7ff62a9805eb LeaveCriticalSection 824->831 832 7ff62a9805c2-7ff62a9805d2 EnterCriticalSection 824->832 825->824 828->819 830 7ff62a980379-7ff62a9803a8 call 7ff62a97c7b0 GetHGlobalFromStream GlobalLock 828->830 837 7ff62a98043f-7ff62a980488 GlobalSize call 7ff62a98dff4 call 7ff62a9ad3b0 call 7ff62a979fd0 830->837 838 7ff62a9803ae-7ff62a9803cd GlobalFree 830->838 831->811 834 7ff62a9805da-7ff62a9805e1 LeaveCriticalSection 832->834 835 7ff62a9805d4 GdiplusShutdown 832->835 834->831 835->834 854 7ff62a98048a-7ff62a980492 837->854 855 7ff62a9804de 837->855 843 7ff62a9803f1-7ff62a980407 call 7ff62a9761e0 EnterCriticalSection 838->843 844 7ff62a9803cf-7ff62a9803eb DeleteObject 838->844 849 7ff62a980409-7ff62a980419 EnterCriticalSection 843->849 850 7ff62a98042e-7ff62a98043a LeaveCriticalSection 843->850 844->843 852 7ff62a98041b GdiplusShutdown 849->852 853 7ff62a980421-7ff62a980428 LeaveCriticalSection 849->853 850->813 852->853 853->850 857 7ff62a9804c4-7ff62a9804dc 854->857 858 7ff62a980494-7ff62a9804a1 854->858 856 7ff62a9804e2-7ff62a9804e6 855->856 859 7ff62a980519-7ff62a98052d call 7ff62a98df84 856->859 860 7ff62a9804e8-7ff62a9804f9 856->860 857->856 861 7ff62a9804a3-7ff62a9804b6 858->861 862 7ff62a9804bf call 7ff62a98df84 858->862 873 7ff62a980553-7ff62a980561 GlobalUnlock 859->873 874 7ff62a98052f-7ff62a98054d DeleteObject 859->874 866 7ff62a9804fb-7ff62a98050e 860->866 867 7ff62a980514 call 7ff62a98df84 860->867 863 7ff62a9804bc 861->863 864 7ff62a980618-7ff62a98061f call 7ff62a993ff8 861->864 862->857 863->862 866->864 866->867 867->859 875 7ff62a980567 873->875 874->873 875->819
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CriticalSection$Global$EnterLeave$Stream$CreateGdip$DeleteDisposeFreeFromGdiplusImageLockObjectShutdown$AllocBitmapErrorInitializeLastUnlock_invalid_parameter_noinfo_noreturn
            • String ID:
            • API String ID: 953580087-0
            • Opcode ID: 4e2688a34863f7da8a77a74cbafa365050bfc00cb69e51c511cedc38c4e5153f
            • Instruction ID: 07905df6680fadf5ce658e7cc324a2079e1e63a3d4fe044ec5def4a3d271fa80
            • Opcode Fuzzy Hash: 4e2688a34863f7da8a77a74cbafa365050bfc00cb69e51c511cedc38c4e5153f
            • Instruction Fuzzy Hash: 9BC14E36F14B4289EF00DF76E8442AD2372FB44B98B004276CE5E9769ADF78D449C342

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 876 7ff62a97c340-7ff62a97c383 GdipGetImagePixelFormat 877 7ff62a97c387-7ff62a97c3a4 876->877 878 7ff62a97c385 876->878 879 7ff62a97c3b9-7ff62a97c3c4 877->879 880 7ff62a97c3a6-7ff62a97c3b3 877->880 878->877 881 7ff62a97c3db-7ff62a97c400 GdipGetImageHeight 879->881 882 7ff62a97c3c6-7ff62a97c3d4 879->882 880->879 883 7ff62a97c402-7ff62a97c40c 881->883 884 7ff62a97c40f-7ff62a97c422 GdipGetImageWidth 881->884 882->881 883->884 885 7ff62a97c426-7ff62a97c447 call 7ff62a97c160 884->885 886 7ff62a97c424 884->886 889 7ff62a97c449-7ff62a97c44e 885->889 890 7ff62a97c453-7ff62a97c45b 885->890 886->885 891 7ff62a97c773-7ff62a97c78c 889->891 892 7ff62a97c60d-7ff62a97c61c 890->892 893 7ff62a97c461-7ff62a97c478 GdipGetImagePaletteSize 890->893 894 7ff62a97c6e2-7ff62a97c74d GdipCreateBitmapFromScan0 GdipGetImageGraphicsContext GdipDrawImageI GdipDeleteGraphics GdipDisposeImage 892->894 895 7ff62a97c622-7ff62a97c64e GdipBitmapLockBits 892->895 896 7ff62a97c47c-7ff62a97c487 893->896 897 7ff62a97c47a 893->897 898 7ff62a97c753-7ff62a97c756 894->898 899 7ff62a97c66a-7ff62a97c686 895->899 900 7ff62a97c650-7ff62a97c65a 895->900 901 7ff62a97c4ba-7ff62a97c4c6 call 7ff62a994070 896->901 902 7ff62a97c489-7ff62a97c492 call 7ff62a97b2e0 896->902 897->896 903 7ff62a97c758 898->903 904 7ff62a97c770 898->904 906 7ff62a97c688-7ff62a97c68b 899->906 907 7ff62a97c6c4-7ff62a97c6db GdipBitmapUnlockBits 899->907 900->898 917 7ff62a97c4cd-7ff62a97c4d4 901->917 918 7ff62a97c4c8-7ff62a97c4cb 901->918 902->901 915 7ff62a97c494-7ff62a97c49b 902->915 911 7ff62a97c760-7ff62a97c76e call 7ff62a993bd8 903->911 904->891 913 7ff62a97c6ad-7ff62a97c6c2 906->913 914 7ff62a97c68d-7ff62a97c690 906->914 907->898 909 7ff62a97c6dd-7ff62a97c6e0 907->909 909->898 911->904 913->906 913->907 919 7ff62a97c696-7ff62a97c69f 914->919 920 7ff62a97c794-7ff62a97c7af call 7ff62a998d9c call 7ff62a993fd8 call 7ff62a9710f0 914->920 921 7ff62a97c49d 915->921 922 7ff62a97c4a7-7ff62a97c4b8 call 7ff62a98e600 915->922 924 7ff62a97c4d7-7ff62a97c4da 917->924 918->924 925 7ff62a97c78d-7ff62a97c78f call 7ff62a9ada50 919->925 926 7ff62a97c6a5-7ff62a97c6a8 call 7ff62a9ad3b0 919->926 921->922 922->924 930 7ff62a97c4dc-7ff62a97c4e2 924->930 931 7ff62a97c4e7-7ff62a97c4f9 GdipGetImagePalette 924->931 925->920 926->913 930->898 935 7ff62a97c4fb 931->935 936 7ff62a97c4ff-7ff62a97c50a 931->936 935->936 938 7ff62a97c510-7ff62a97c515 936->938 939 7ff62a97c65f-7ff62a97c665 936->939 942 7ff62a97c517 938->942 943 7ff62a97c555-7ff62a97c55d 938->943 939->898 945 7ff62a97c520-7ff62a97c553 942->945 946 7ff62a97c5aa-7ff62a97c5c2 SetDIBColorTable 943->946 947 7ff62a97c55f-7ff62a97c56a call 7ff62a976280 943->947 945->943 945->945 949 7ff62a97c607 946->949 950 7ff62a97c5c4-7ff62a97c5de SelectObject call 7ff62a976280 946->950 953 7ff62a97c570-7ff62a97c57d 947->953 949->892 957 7ff62a97c5e0-7ff62a97c5ea 950->957 955 7ff62a97c57f-7ff62a97c584 953->955 956 7ff62a97c58e-7ff62a97c5a6 SelectObject 953->956 955->953 960 7ff62a97c586-7ff62a97c588 CreateCompatibleDC 955->960 956->946 958 7ff62a97c5fc-7ff62a97c603 957->958 959 7ff62a97c5ec-7ff62a97c5f1 957->959 958->949 959->957 961 7ff62a97c5f3-7ff62a97c5f6 DeleteDC 959->961 960->956 961->958
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Gdip$Image$Bitmap$BitsCreateDeleteGraphicsObjectPaletteSelect$ColorCompatibleContextDisposeDrawFormatFromHeightLockPixelScan0SizeTableUnlockWidth_invalid_parameter_noinfo
            • String ID: &
            • API String ID: 4034434136-3042966939
            • Opcode ID: 239e805813e04336424a29340b1b3b4cd56234119952a51b41bc6ad9426f54d6
            • Instruction ID: fe80d74ac32a3961de365c93d1537cfea71885ee699f62be58794c765b9ea8d5
            • Opcode Fuzzy Hash: 239e805813e04336424a29340b1b3b4cd56234119952a51b41bc6ad9426f54d6
            • Instruction Fuzzy Hash: 32D1A0B2E146828AEF608F26DC446A933A5FB44B98F014076DB1DDBB46DF78E904C751

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: setsockopt$ByteCharMultiWidelstrlen$EventIoctlResetTimeconnectgethostbynamehtonssockettime
            • String ID: 0u
            • API String ID: 3082052849-3203441087
            • Opcode ID: 1990aa51c6850a6fa6aed845b7300e6f7a8d76aaa35b37c668ddb493afcd0b97
            • Instruction ID: f4ca84dcec69b2633e0bbd92bd6cefd8983a7707ed83bd5846586466081a6c2b
            • Opcode Fuzzy Hash: 1990aa51c6850a6fa6aed845b7300e6f7a8d76aaa35b37c668ddb493afcd0b97
            • Instruction Fuzzy Hash: 18717272A1878186DB24CF26F84476BB7A5FB84794F00423AEA8D87B55CF7DD109CB05

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Process$Token$CurrentOpen$AuthorityCloseHandleInformationLocalwsprintf$AllocCountErrorFreeLastVersion
            • String ID: VenNetwork
            • API String ID: 4155081256-3057682757
            • Opcode ID: 3407132e92e1848e0e772f1293874a2b7f30e1d7fa5e71b4aaa2eaae724ad61b
            • Instruction ID: c5c64db31619c6f03cd75d1b37fcb136163e4168563c9c09204692c8bc94c5de
            • Opcode Fuzzy Hash: 3407132e92e1848e0e772f1293874a2b7f30e1d7fa5e71b4aaa2eaae724ad61b
            • Instruction Fuzzy Hash: 68415372E2C68282EF61DB22EC443B923A1FF95B41F444076CA4EC6696DF7CD485C712

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1256 7ff62a98bef0-7ff62a98bf17 1257 7ff62a98c2b0-7ff62a98c2c1 CloseHandle 1256->1257 1258 7ff62a98bf1d-7ff62a98bf37 1256->1258 1259 7ff62a98bf40-7ff62a98bf5a call 7ff62a994070 1258->1259 1262 7ff62a98c290-7ff62a98c2a8 1259->1262 1263 7ff62a98bf60-7ff62a98bf9c DeviceIoControl 1259->1263 1262->1257 1264 7ff62a98bfa2-7ff62a98bfa6 1263->1264 1265 7ff62a98c288-7ff62a98c28b call 7ff62a993bd8 1263->1265 1267 7ff62a98c27a-7ff62a98c280 1264->1267 1268 7ff62a98bfac-7ff62a98c00b DeviceIoControl 1264->1268 1265->1262 1267->1259 1269 7ff62a98c286 1267->1269 1270 7ff62a98c011-7ff62a98c018 1268->1270 1271 7ff62a98c0a4-7ff62a98c0a8 1268->1271 1269->1262 1270->1271 1274 7ff62a98c01e-7ff62a98c026 1270->1274 1272 7ff62a98c0ae-7ff62a98c0f5 DeviceIoControl 1271->1272 1273 7ff62a98c195-7ff62a98c1ed call 7ff62a9ada50 call 7ff62a98c6e0 * 2 1271->1273 1272->1273 1275 7ff62a98c0fb-7ff62a98c108 1272->1275 1291 7ff62a98c1f2-7ff62a98c219 call 7ff62a98be90 1273->1291 1274->1271 1276 7ff62a98c028-7ff62a98c03e GlobalAlloc 1274->1276 1275->1273 1278 7ff62a98c10e-7ff62a98c121 GlobalAlloc 1275->1278 1276->1271 1279 7ff62a98c040-7ff62a98c084 DeviceIoControl 1276->1279 1278->1273 1282 7ff62a98c123-7ff62a98c15f DeviceIoControl 1278->1282 1283 7ff62a98c086-7ff62a98c08c 1279->1283 1284 7ff62a98c09b-7ff62a98c09e GlobalFree 1279->1284 1286 7ff62a98c161-7ff62a98c179 call 7ff62a98c640 GlobalFree 1282->1286 1287 7ff62a98c18c-7ff62a98c18f GlobalFree 1282->1287 1283->1284 1288 7ff62a98c08e-7ff62a98c099 1283->1288 1284->1271 1286->1273 1294 7ff62a98c17b-7ff62a98c18a call 7ff62a98c2d0 1286->1294 1287->1273 1288->1271 1288->1284 1297 7ff62a98c220-7ff62a98c227 1291->1297 1294->1273 1297->1297 1299 7ff62a98c229-7ff62a98c22d 1297->1299 1300 7ff62a98c234-7ff62a98c23c 1299->1300 1300->1300 1301 7ff62a98c23e-7ff62a98c248 1300->1301 1301->1262 1302 7ff62a98c24a-7ff62a98c24d 1301->1302 1303 7ff62a98c250-7ff62a98c258 1302->1303 1303->1303 1304 7ff62a98c25a-7ff62a98c25e 1303->1304 1305 7ff62a98c260-7ff62a98c26e 1304->1305 1305->1305 1306 7ff62a98c270-7ff62a98c275 1305->1306 1306->1267
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ControlDeviceGlobal$Free$Alloc
            • String ID: - External Hub$%s-%s|
            • API String ID: 3253977144-729331614
            • Opcode ID: a64a8a154bc7d147da862556ab1e51a765a2c970b97e8182b802ad51ffa46e8a
            • Instruction ID: 085e553b8a8462dce1d2586b91019d541290dc65252fc360ee08f755647de72e
            • Opcode Fuzzy Hash: a64a8a154bc7d147da862556ab1e51a765a2c970b97e8182b802ad51ffa46e8a
            • Instruction Fuzzy Hash: F1B1DF32E28B8289EB20CF22E8403AA77A1FB84794F444136DB8D97B96DF7CD545C701

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CountInfoInputLastOpenQueryTickValue_invalid_parameter_noinfo_noreturnwsprintf
            • String ID: %d min$Console$IpDatespecial
            • API String ID: 357503962-2712035571
            • Opcode ID: f10f92fbc072fe067106cb54d6c34107b9c6c4e7fb02d7e9705fa94ab09b83a4
            • Instruction ID: 3ca1b7bfaa5dc2138b0e06a829ab0337ffb861fa68f278c0127cb669e3566e41
            • Opcode Fuzzy Hash: f10f92fbc072fe067106cb54d6c34107b9c6c4e7fb02d7e9705fa94ab09b83a4
            • Instruction Fuzzy Hash: 3151BC73A18E8585EF208F2AEC443B927A1EB44B99F444172CA4CCB79ADF78D589C701
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Gdip$Image$BitmapCreateDisposeEncodersFrom$SaveScan0SizeStream
            • String ID: &
            • API String ID: 370471037-3042966939
            • Opcode ID: 28b2eeaec2d98f14f4e8f3b60e7ba4f1bea8e24f035ccc537625c12df49cfb7a
            • Instruction ID: 74835a29be86670b6e73416e46f3da30d71bf4d62c0767fc3cde536f4ebca556
            • Opcode Fuzzy Hash: 28b2eeaec2d98f14f4e8f3b60e7ba4f1bea8e24f035ccc537625c12df49cfb7a
            • Instruction Fuzzy Hash: 73518472E24A4286FF508F269C005B823A1FB44B94F0542B2DE1DDB796DFB8E546C352
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: InfoSystem$AddressHandleModuleNativeProc
            • String ID: GetNativeSystemInfo$kernel32.dll
            • API String ID: 3433367815-192647395
            • Opcode ID: 06b04ae401ee5d5c7cc9b92bd00cef418c8d008ef26561d2b8b72a7f6fbba0c7
            • Instruction ID: 5e17a319c46b2ca7cf2c5ad3377e550dc304de84340ac85b051cbd9ec039f431
            • Opcode Fuzzy Hash: 06b04ae401ee5d5c7cc9b92bd00cef418c8d008ef26561d2b8b72a7f6fbba0c7
            • Instruction Fuzzy Hash: CAF06816D38686C7EF50E711DC403B52251FF98701F905776D98EC1696EF9CE2D48612
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Close$OpenQueryValuelstrcmp
            • String ID:
            • API String ID: 4288439342-0
            • Opcode ID: 9757e75af8232627abeb9f8389a1c3797a9351f61d8f1bccc733d4b1246574e8
            • Instruction ID: 92e56a3aba40ae0943849ae744604ce126113bc5e1719822c46ef1f0923d8a8e
            • Opcode Fuzzy Hash: 9757e75af8232627abeb9f8389a1c3797a9351f61d8f1bccc733d4b1246574e8
            • Instruction Fuzzy Hash: 04317732F28B9182DB608B26EC8476A7365FB84B90F504272DA5DC3796DF7DD844C741
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo_noreturn$CreateFactory
            • String ID: %s%s %d %d $%s%s %d*%d
            • API String ID: 2331002265-1924168580
            • Opcode ID: 4dd4e38c66fe8330648a6e6cd5bc444f9eea7f3f2f2ef59c603d5b89239446f8
            • Instruction ID: 0ce6fd37a04f9b14beed6927dedcc6060bfa1703c6526082ada3e6cc37cf1d75
            • Opcode Fuzzy Hash: 4dd4e38c66fe8330648a6e6cd5bc444f9eea7f3f2f2ef59c603d5b89239446f8
            • Instruction Fuzzy Hash: ABA1B472F24B8189EB10DF6AD8442EE7761FB89B98F500222DE5D9BB99CF78D441C701
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
            • String ID:
            • API String ID: 2067211477-0
            • Opcode ID: 2bf2d8e4056023ef3a5b5264bbcf8491965b7124c54493676a6e58e8f064e49f
            • Instruction ID: b12614fe71236675f34ac5c59603eb2829d084b1889c203e5cb44e94e58dd1c8
            • Opcode Fuzzy Hash: 2bf2d8e4056023ef3a5b5264bbcf8491965b7124c54493676a6e58e8f064e49f
            • Instruction Fuzzy Hash: 52213126E2A742A9EF149B579D1017973A0AF88B90F04C579DE4DC3756EEBCE4408602
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ControlCreateDeviceFile
            • String ID: L$\\.\
            • API String ID: 107608037-1891537229
            • Opcode ID: 21bc0f6301598303c13827e0319026f3a4049949566ec9a53abc1aeea47cf04e
            • Instruction ID: be7c0acea7dcbff8e4cff41e9e97f122729fa90aa18e14cc4ab6b3d38d7c7f59
            • Opcode Fuzzy Hash: 21bc0f6301598303c13827e0319026f3a4049949566ec9a53abc1aeea47cf04e
            • Instruction Fuzzy Hash: E8318162A1968186EF448F12B95037A7B90EB85BE4F084275EBA987BC6CF7CD416C701
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CurrentThreadsend
            • String ID:
            • API String ID: 302076607-0
            • Opcode ID: 1d5fac0907bdd9d84bc34d83d8396e4accfe818cb4c73ff339665f4c5f5d32ef
            • Instruction ID: 0438cc3ca1109d0673457ff11ac7d00dbae36a2468b4ebe1508d98c354240358
            • Opcode Fuzzy Hash: 1d5fac0907bdd9d84bc34d83d8396e4accfe818cb4c73ff339665f4c5f5d32ef
            • Instruction Fuzzy Hash: 6551B162E14B5287EB148F26EC4436A73B0FB84B84F0480B5CB49CBB16DFB8E4528312
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CancelEventclosesocketsetsockopt
            • String ID:
            • API String ID: 852421847-0
            • Opcode ID: 3e6bea74e94700dfcc8d9d47a61c466b5b5c0e1f507d80d6be11655914b66227
            • Instruction ID: 842a7e2beb81bd6033f6a5cf79ec81ac15f860514901b624e37bd071bc9a96b2
            • Opcode Fuzzy Hash: 3e6bea74e94700dfcc8d9d47a61c466b5b5c0e1f507d80d6be11655914b66227
            • Instruction Fuzzy Hash: 96F08136A1468187DB149F26E85836AB371FB84BA4F104336CBAD8B6E5CF7DD065C702
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ByteCharMultiWide$ControlDefaultDeviceLangSystemlstrcpy
            • String ID:
            • API String ID: 3058672631-0
            • Opcode ID: 58814fa69bae84aefcd15b406166047d4f2e763b33bcfce0eb46db666086691b
            • Instruction ID: 65674353cd2f79e3331365c9e1caa122ac52bb5478c02af11607b28d33b75ebd
            • Opcode Fuzzy Hash: 58814fa69bae84aefcd15b406166047d4f2e763b33bcfce0eb46db666086691b
            • Instruction Fuzzy Hash: D031A632E2CB8289EF20DB12E8443AAA3A1EB857D0F544176EA9DC7786DF7DD401C701
            APIs
              • Part of subcall function 00007FF62A9761E0: InitializeCriticalSectionEx.KERNEL32 ref: 00007FF62A976231
              • Part of subcall function 00007FF62A9761E0: GetLastError.KERNEL32 ref: 00007FF62A97623B
            • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF62A97C7D4), ref: 00007FF62A97C9DA
            • GdiplusStartup.GDIPLUS ref: 00007FF62A97CA0F
            • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF62A97C7D4), ref: 00007FF62A97CA27
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CriticalSection$EnterErrorGdiplusInitializeLastLeaveStartup
            • String ID:
            • API String ID: 2723390537-0
            • Opcode ID: c1fce392dff7f0e0a1fd8d320c51b28cecfe9cf3d04554c50c1a4421144027e9
            • Instruction ID: 37333395270e0441477827f976dbe2167eb56130c8602aea438e7ac319fc7869
            • Opcode Fuzzy Hash: c1fce392dff7f0e0a1fd8d320c51b28cecfe9cf3d04554c50c1a4421144027e9
            • Instruction Fuzzy Hash: CF019233E18B81C6EB509F16E84436A77E1F784B41F481025EB8A87656CF7CD055CB41
            APIs
              • Part of subcall function 00007FF62A99EE88: GetLastError.KERNEL32(?,?,0000E12CD978A873,00007FF62A998DA5,?,?,?,?,00007FF62A9A27E6,?,?,00000000,00007FF62A99A69B,?,?,?), ref: 00007FF62A99EE97
              • Part of subcall function 00007FF62A99EE88: SetLastError.KERNEL32(?,?,0000E12CD978A873,00007FF62A998DA5,?,?,?,?,00007FF62A9A27E6,?,?,00000000,00007FF62A99A69B,?,?,?), ref: 00007FF62A99EF37
            • CloseHandle.KERNEL32(?,?,?,00007FF62A998CC5,?,?,?,?,00007FF62A998B09), ref: 00007FF62A998B53
            • FreeLibraryAndExitThread.KERNEL32(?,?,?,00007FF62A998CC5,?,?,?,?,00007FF62A998B09), ref: 00007FF62A998B69
            • ExitThread.KERNEL32 ref: 00007FF62A998B72
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ErrorExitLastThread$CloseFreeHandleLibrary
            • String ID:
            • API String ID: 1991824761-0
            • Opcode ID: a30104ba4f4f868018fa850f0c9dce139a3884833968d360b0db499d9868783c
            • Instruction ID: 1a1edda737ff15743fb3575b67618fde35bf24526d0d792d0edc88615738d709
            • Opcode Fuzzy Hash: a30104ba4f4f868018fa850f0c9dce139a3884833968d360b0db499d9868783c
            • Instruction Fuzzy Hash: 08F0AF22E28A8765FF149B22994423C2399AF40B74F1C877AC63CC26D7DFACD8058342
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: SleepTimetime
            • String ID:
            • API String ID: 346578373-0
            • Opcode ID: a07444b426276808b022deff05d84a514b99e0a0f66664c5b3036afdf0babcf4
            • Instruction ID: 0bcfed90fe42e32d40020c175a1cba6631e925f197ba4110a7d35dd4f9360011
            • Opcode Fuzzy Hash: a07444b426276808b022deff05d84a514b99e0a0f66664c5b3036afdf0babcf4
            • Instruction Fuzzy Hash: FE018062F2864187EB648B7AE98833D26A0FB44784F4412B5C75ACB6D1CFBCD4E5C702
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ErrorExitLastThread
            • String ID:
            • API String ID: 1611280651-0
            • Opcode ID: 41641528019013f9ff929c92362d335c34901b889fac2650327ddb4de509bf94
            • Instruction ID: 47ff28fcff82c1414dc8a9af07f3481a95346210a21467a183362b528b81c016
            • Opcode Fuzzy Hash: 41641528019013f9ff929c92362d335c34901b889fac2650327ddb4de509bf94
            • Instruction Fuzzy Hash: 48F09616E2AA0349EF04BB729D0917D1295AF54B50F18D4B9D90DC3393DE6C94458703
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Concurrency::cancel_current_task
            • String ID:
            • API String ID: 118556049-0
            • Opcode ID: 8afa6a4327cd587ea362fe0c4f5b4bf1e5e9001c34c8a508c9f4177e13cca725
            • Instruction ID: fb996942f14ea607cfbbc16c12c2c60faf743415f7b0adef397b8e841160ecc3
            • Opcode Fuzzy Hash: 8afa6a4327cd587ea362fe0c4f5b4bf1e5e9001c34c8a508c9f4177e13cca725
            • Instruction Fuzzy Hash: D1E0B650E7D2175DFF69226B2D0567810401F493F0E281BB0E97DC82C3BD9CA465E553
            APIs
            • RtlFreeHeap.NTDLL(?,?,?,00007FF62A9A6862,?,?,?,00007FF62A9A6BDF,?,?,00000000,00007FF62A9A7025,?,?,?,00007FF62A9A6F57), ref: 00007FF62A99E972
            • GetLastError.KERNEL32(?,?,?,00007FF62A9A6862,?,?,?,00007FF62A9A6BDF,?,?,00000000,00007FF62A9A7025,?,?,?,00007FF62A9A6F57), ref: 00007FF62A99E97C
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ErrorFreeHeapLast
            • String ID:
            • API String ID: 485612231-0
            • Opcode ID: a2b1b4d253dc9b48524949a201526306b0bcc39bf10aa9e0b1341fdbb23a067c
            • Instruction ID: 7ff78d75fb3cb8c8db7279a9dc416b6e62c8a1c3a90431b75e4f87edd7b1b665
            • Opcode Fuzzy Hash: a2b1b4d253dc9b48524949a201526306b0bcc39bf10aa9e0b1341fdbb23a067c
            • Instruction Fuzzy Hash: EAE08C12F2960357FF586BB3AD4823826969F88B01F00D8B9C90DC7393EEACA8414712
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Virtual$AllocFree
            • String ID:
            • API String ID: 2087232378-0
            • Opcode ID: 17a02dcf2f47f10d7a08db77411b6b44ca6662cc7d290d042544fe107c4b0b33
            • Instruction ID: 08c7476e7c6b382f7ab64863352d5711e19aed20cdd1967637a21fae74de44b1
            • Opcode Fuzzy Hash: 17a02dcf2f47f10d7a08db77411b6b44ca6662cc7d290d042544fe107c4b0b33
            • Instruction Fuzzy Hash: E1219A21F18A4187DB24CB2BF84012AB7A1FB84784F144135EB9ED7B19DF3CE5818B44
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Virtual$AllocFree
            • String ID:
            • API String ID: 2087232378-0
            • Opcode ID: 4c8156205564e744c18fa944b02d568327434d479cf77dfe2f9176b33a9ea29c
            • Instruction ID: 6bfe4d5450a46909b5ff46cfb640433d69769b883b2a102dc4f574038fb3460c
            • Opcode Fuzzy Hash: 4c8156205564e744c18fa944b02d568327434d479cf77dfe2f9176b33a9ea29c
            • Instruction Fuzzy Hash: F311D671F38A4182DF048B27A940529A3A6FB88BC4B149132EA4ED7759DE7CD881CB41
            APIs
              • Part of subcall function 00007FF62A98DD80: __scrt_dllmain_crt_thread_attach.LIBCMT ref: 00007FF62A98DD94
            • __scrt_release_startup_lock.LIBCMT ref: 00007FF62A98E177
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: __scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
            • String ID:
            • API String ID: 2217363868-0
            • Opcode ID: df8c2cae6130cff53013dc258be4a77fac826802f49534194485c90f58f48bf0
            • Instruction ID: b9924b2e46576930a75344a219e2110a77315c576cc6653b87569ef4ae90baf0
            • Opcode Fuzzy Hash: df8c2cae6130cff53013dc258be4a77fac826802f49534194485c90f58f48bf0
            • Instruction Fuzzy Hash: 49312C22E296435AFF10AB679D613B91296AF857C4F4440B5DA0EC72E7CEEDE844C703
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Startup
            • String ID:
            • API String ID: 724789610-0
            • Opcode ID: 2276b2cfde0ec166953e0ec75e850ce31f8cbc4b3846b0cdc97fb7f8133b5954
            • Instruction ID: 91938ab763aab5cf42af805af76d3224b1c034ab58c5da1b6f32b2b9d75637bf
            • Opcode Fuzzy Hash: 2276b2cfde0ec166953e0ec75e850ce31f8cbc4b3846b0cdc97fb7f8133b5954
            • Instruction Fuzzy Hash: DFE04F36F25A45CAEB11AB25E8491A473A5FB58740F408172E58CC3796DF6CD1158F02
            APIs
            • HeapAlloc.KERNEL32(?,?,?,00007FF62A9A27CD,?,?,00000000,00007FF62A99A69B,?,?,?,00007FF62A99C873,?,?,?,00007FF62A99C769), ref: 00007FF62A99F0AE
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: AllocHeap
            • String ID:
            • API String ID: 4292702814-0
            • Opcode ID: 016c47a342e12657c725cebeaa7b4028c5a2c41f1cbc7a3001cbfc12b323d78a
            • Instruction ID: ef7cb0ae8ded371f8127a7d079c5222cf052ef955f3f436c6acc73ca1a24139e
            • Opcode Fuzzy Hash: 016c47a342e12657c725cebeaa7b4028c5a2c41f1cbc7a3001cbfc12b323d78a
            • Instruction Fuzzy Hash: 90F05E41F296036AFF6416635E4137592884F44761F0886B2D92EC63C3EDACA8408513
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Process$Virtual$AddressLibraryLoadProcProtect$AllocCreateCurrentMemoryOpenThreadTokenWrite$AdjustDirectoryFileLookupModuleNamePrivilegePrivilegesRemoteResumeSleepSystemValue
            • String ID: %s%s$@$ExitProcess$Kernel32.dll$OpenProcess$SeDebugPrivilege$WaitForSingleObject$WinExec$Windows\System32\svchost.exe$h
            • API String ID: 3040193174-4212407401
            • Opcode ID: 6fd3f4fde48d0361eb2d5c202ab323ad8a247f6fe0c7ba3ad29a459755052d7c
            • Instruction ID: d2bfd24c3f9ad1e835b29eacb4293304f7bed936976f7a16056baf485d61d15d
            • Opcode Fuzzy Hash: 6fd3f4fde48d0361eb2d5c202ab323ad8a247f6fe0c7ba3ad29a459755052d7c
            • Instruction Fuzzy Hash: 11A15F72F24B8285EB20CF22EC547E923A5FB88788F404176DA4D9BA56DFBCD245C701
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: lstrlen$wsprintf$ClipboardFileGlobal$CloseCountTickWindow$CreateDataForegroundHandleLocalLockMutexObjectOpenPointerReleaseSingleSizeSleepStateTextTimeUnlockWaitWrite
            • String ID: [$[$%s%s$%s%s$%s%s$[esc]
            • API String ID: 3669393114-972647286
            • Opcode ID: 0ba4a650500777e326fb2fa0ba1ce122045bb19d315cab67db3075d848846471
            • Instruction ID: ba07f507b35906f4ee8144fd0feb0adb1d71c77883401bdfa5f26881d26283d8
            • Opcode Fuzzy Hash: 0ba4a650500777e326fb2fa0ba1ce122045bb19d315cab67db3075d848846471
            • Instruction Fuzzy Hash: F2D16F66E28A4686FF109B17EC442B933A2FF88744F404176DA4EC66A6DFBCE544C713
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: lstrlen$CreateEventLocalTimewsprintf
            • String ID: %4d.%2d.%2d-%2d:%2d:%2d$o1:$p1:$t1:
            • API String ID: 2157945651-1225219777
            • Opcode ID: ffa54dc6aacd8b7c489ab2f030bdae777e95d9fe9fee655a7fecff1d3dc8717e
            • Instruction ID: d7f1d2df83069f3298a4bf58fd7be61a5ee17ef86b63a816bdd91fa6a246b950
            • Opcode Fuzzy Hash: ffa54dc6aacd8b7c489ab2f030bdae777e95d9fe9fee655a7fecff1d3dc8717e
            • Instruction Fuzzy Hash: 0DF1B7A2E2479286EF209F2ADC407BD23A1FB44794F404276DA4DDBAD6DFBC9541C702
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: AddressProc$Library$FileFree$CloseCreateHandleLoadSleepWrite
            • String ID: InternetCloseHandle$InternetOpenUrlW$InternetOpenW$InternetReadFile$MSIE 6.0$wininet.dll
            • API String ID: 2977986460-1099148085
            • Opcode ID: 067ce2f794736821cf202725aa30ed0aa3c92a2ab4f8812fc9fc05c1c4d827d7
            • Instruction ID: 8062599c693791a4dac400ab8024559d46c06c5139917d5de44bae299ecd496d
            • Opcode Fuzzy Hash: 067ce2f794736821cf202725aa30ed0aa3c92a2ab4f8812fc9fc05c1c4d827d7
            • Instruction Fuzzy Hash: 8A411766E2964285EF64DB13AC0077A67A1FB89BD4F444171CD4E87796EF7CD004CB02
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Lockitstd::_$Clipboard$GlobalLockit::_$Lockit::~_$Close_invalid_parameter_noinfo_noreturn$DataLockOpenUnlock$AllocEmptySetgloballocaleSleeplstrlenstd::locale::_
            • String ID:
            • API String ID: 1851032462-0
            • Opcode ID: 146533d8503bd32a6b03074daf5edfdeef99d1c15a2255993bca1309a5dea7e0
            • Instruction ID: 7a2d1b4fd528762870f78714c7438cfcf6eeda9c92747da3de5121300b19ef22
            • Opcode Fuzzy Hash: 146533d8503bd32a6b03074daf5edfdeef99d1c15a2255993bca1309a5dea7e0
            • Instruction Fuzzy Hash: 60D1B262F29B4286EF109F26E8442AD63A1FF84BD4F104276EA5DC779ADF7CE4448701
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Thread$ContextProcess$AllocCreateDirectoryMemoryResumeSystemVirtualWrite
            • String ID: %s %s$%s%s$53aaa05a-823a-477c-ad34-6798b901feb6$@$Windows\System32\svchost.exe$h$nlyloadinmyself$plugmark
            • API String ID: 4033188109-1883610551
            • Opcode ID: 39cb0ed868284d1e7928880f05503a86ba10bcdc2c17875e8f87faef0a13c5dc
            • Instruction ID: 4d2610d275e157710a41799c5b01080f5b4e256acb915f8dc02a9d8dab15973d
            • Opcode Fuzzy Hash: 39cb0ed868284d1e7928880f05503a86ba10bcdc2c17875e8f87faef0a13c5dc
            • Instruction Fuzzy Hash: 4D129F62F28B8282EB20CF26D8442BD67A1FB84B84F448176DB4D87B96DF7CD585C711
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue$ExitWindows
            • String ID: SeShutdownPrivilege
            • API String ID: 1423298842-3733053543
            • Opcode ID: 40da0a47c9c7c1cc3a1aa31b778f4d13c03be2ed2b90204a7f89449c4a5765b5
            • Instruction ID: 4f2ffc2c088885553a2e22b13903ca4de352aeb434a90d790353d5dd645ebc0a
            • Opcode Fuzzy Hash: 40da0a47c9c7c1cc3a1aa31b778f4d13c03be2ed2b90204a7f89449c4a5765b5
            • Instruction Fuzzy Hash: 1A314376E18E9281EB208F16EC143BA7361FB84B56F104077D94DD6666CFBCD589C702
            APIs
            • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF62A97D242), ref: 00007FF62A98A6C5
            • GetNativeSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF62A97D242), ref: 00007FF62A98A74A
            • VirtualAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF62A97D242), ref: 00007FF62A98A79F
            • VirtualAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF62A97D242), ref: 00007FF62A98A7BE
            • VirtualAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF62A97D242), ref: 00007FF62A98A821
            • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF62A97D242), ref: 00007FF62A98A842
            • HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF62A97D242), ref: 00007FF62A98A856
            • VirtualFree.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF62A97D242), ref: 00007FF62A98A873
            • VirtualFree.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF62A97D242), ref: 00007FF62A98A88F
            • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF62A97D242), ref: 00007FF62A98A8AC
            • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF62A97D242), ref: 00007FF62A98AB92
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Virtual$Alloc$ErrorLast$FreeHeap$InfoNativeProcessSystem
            • String ID:
            • API String ID: 1282860858-0
            • Opcode ID: bc094b2e2349ffbc07eff65132924311638ab0ecebfd180c525b8fe56df94986
            • Instruction ID: f498371e99a2f9bdfada713ef0fe32f5b9fadf20c0d4725f6b204ade16c2b425
            • Opcode Fuzzy Hash: bc094b2e2349ffbc07eff65132924311638ab0ecebfd180c525b8fe56df94986
            • Instruction Fuzzy Hash: E3D16F32F29A428AEF648B17E85477963A1EF44BC4F468075CA4DC7B92EE7CE4418312
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue$ExitWindows
            • String ID: SeShutdownPrivilege
            • API String ID: 1423298842-3733053543
            • Opcode ID: a792fc21bd502bb1f53feba3e0ea592908ea8fd6b5dd88df7bff687d3cdc374e
            • Instruction ID: eb59f01a75b03f6e531f44947061bf111dbb1fc1315fddda42d56a2e624e5936
            • Opcode Fuzzy Hash: a792fc21bd502bb1f53feba3e0ea592908ea8fd6b5dd88df7bff687d3cdc374e
            • Instruction Fuzzy Hash: 83315076E18E8281EB208F16EC143AA7361FB84B56F104077D94DD7666CFBCD589CB02
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue$ExitWindows
            • String ID: SeShutdownPrivilege
            • API String ID: 1423298842-3733053543
            • Opcode ID: c4512c4a51b1fe7d902806900a56825f16f8507878c75a96d79f3f5efe7084bf
            • Instruction ID: 084b28ad3031e3daa1be520c326cad7a5d29fd5a2c82cac9412ab6903556ab62
            • Opcode Fuzzy Hash: c4512c4a51b1fe7d902806900a56825f16f8507878c75a96d79f3f5efe7084bf
            • Instruction Fuzzy Hash: 37314176E18E8281EB208F16EC143AA7361FB84B56F104077D94DD7666CF7CD589CB02
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
            • API String ID: 808467561-2761157908
            • Opcode ID: 8a8cdf450ad9da4e3e91848c83b2fc9670f44cdb81e1e9276785e569651f6bed
            • Instruction ID: 0e605d808b90d7b173c042288a7e625a49ef21763530ec94bf6e0d06fdc91e6a
            • Opcode Fuzzy Hash: 8a8cdf450ad9da4e3e91848c83b2fc9670f44cdb81e1e9276785e569651f6bed
            • Instruction Fuzzy Hash: 90B2C772E282928EEB648F66D8407FD37A2FB54344F505176DA0DD7A87DFB8A500CB42
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Close$OpenQueryValuelstrcpy
            • String ID: %08X
            • API String ID: 2032971926-3773563069
            • Opcode ID: 32c954eb57fda164b81f0150aeb248f5c32c45763a12c98c87c6a1606aaef6c8
            • Instruction ID: 499d005a1d21226ac40bac4dc8d16cb5a99e4ae8076e67ba68c69985de4d926e
            • Opcode Fuzzy Hash: 32c954eb57fda164b81f0150aeb248f5c32c45763a12c98c87c6a1606aaef6c8
            • Instruction Fuzzy Hash: 3D515172A18A8185EB70CB16E8443ABB361FB85794F804236D79DC3AAADF7CD544CB05
            APIs
              • Part of subcall function 00007FF62A99ED10: GetLastError.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99ED1F
              • Part of subcall function 00007FF62A99ED10: FlsGetValue.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99ED34
              • Part of subcall function 00007FF62A99ED10: SetLastError.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99EDBF
            • TranslateName.LIBCMT ref: 00007FF62A9A79E6
            • TranslateName.LIBCMT ref: 00007FF62A9A7A21
            • GetACP.KERNEL32(?,?,?,00000000,00000092,00007FF62A99D778), ref: 00007FF62A9A7A68
            • IsValidCodePage.KERNEL32(?,?,?,00000000,00000092,00007FF62A99D778), ref: 00007FF62A9A7AA0
            • GetLocaleInfoW.KERNEL32 ref: 00007FF62A9A7C5D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ErrorLastNameTranslate$CodeInfoLocalePageValidValue
            • String ID: utf8
            • API String ID: 3069159798-905460609
            • Opcode ID: ed249922890c5a667d77dbf9e0f0f5ff4edc5bc12cc14daec0a02a097362d650
            • Instruction ID: 561c1e0bb190be4f6d851409787d745a72928d66921851db8182667b14a7ef7e
            • Opcode Fuzzy Hash: ed249922890c5a667d77dbf9e0f0f5ff4edc5bc12cc14daec0a02a097362d650
            • Instruction Fuzzy Hash: BC91B232E28742D5EF249F229D522B923A6EB44B80F4485B2DA4DC7787DFBDE5418343
            APIs
              • Part of subcall function 00007FF62A99ED10: GetLastError.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99ED1F
              • Part of subcall function 00007FF62A99ED10: FlsGetValue.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99ED34
              • Part of subcall function 00007FF62A99ED10: SetLastError.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99EDBF
              • Part of subcall function 00007FF62A99ED10: FlsSetValue.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99ED55
            • GetUserDefaultLCID.KERNEL32(00000000,00000092,?,?), ref: 00007FF62A9A8534
              • Part of subcall function 00007FF62A99ED10: FlsSetValue.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99ED82
              • Part of subcall function 00007FF62A99ED10: FlsSetValue.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99ED93
              • Part of subcall function 00007FF62A99ED10: FlsSetValue.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99EDA4
            • EnumSystemLocalesW.KERNEL32(00000000,00000092,?,?,00000000,?,?,00007FF62A99D771), ref: 00007FF62A9A851B
            • ProcessCodePage.LIBCMT ref: 00007FF62A9A855E
            • IsValidCodePage.KERNEL32 ref: 00007FF62A9A8570
            • IsValidLocale.KERNEL32 ref: 00007FF62A9A8586
            • GetLocaleInfoW.KERNEL32 ref: 00007FF62A9A85E2
            • GetLocaleInfoW.KERNEL32 ref: 00007FF62A9A85FE
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Value$Locale$CodeErrorInfoLastPageValid$DefaultEnumLocalesProcessSystemUser
            • String ID:
            • API String ID: 2591520935-0
            • Opcode ID: 22d8bcddac7133f8b6f7a06d5e5334a0f8ea8210c2b9d064d69f21135d6cdb9b
            • Instruction ID: 1f53ad2036baa1a4e93f51cca7f6fad1d84b91403e5ce83ac45132089f8b49b8
            • Opcode Fuzzy Hash: 22d8bcddac7133f8b6f7a06d5e5334a0f8ea8210c2b9d064d69f21135d6cdb9b
            • Instruction Fuzzy Hash: 0E716922F2860289FF509F62DC502B922A6BF44744F4484B6CA0DC3687EFBCE845C393
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
            • String ID:
            • API String ID: 3140674995-0
            • Opcode ID: 045e81cc47e066d153aaaf5b50bd9fe289779446efb159575806e036ae1ed661
            • Instruction ID: c66bdf1cbfe34181070e14daa7253a216ebe8614d78dad66144e15b7cd54a7cb
            • Opcode Fuzzy Hash: 045e81cc47e066d153aaaf5b50bd9fe289779446efb159575806e036ae1ed661
            • Instruction Fuzzy Hash: 38316E72A18B818AEF608F61E8507ED3365FB84744F04407ADA4EC7B96DF78C548CB01
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Event$ClearCloseOpen
            • String ID: Application$Security$System
            • API String ID: 1391105993-2169399579
            • Opcode ID: 1bb91c5c2b3888595093d95bda04c9b415b5dc93057c8244563c58f3f028a90d
            • Instruction ID: ede2b04d47cdd649a5a56a8ecc7833a657b2b16ae604c41f10a73365269d5fa1
            • Opcode Fuzzy Hash: 1bb91c5c2b3888595093d95bda04c9b415b5dc93057c8244563c58f3f028a90d
            • Instruction Fuzzy Hash: 91F08126E19F4181EF15CB0AFC00266B3A5FF88764F040576CA4DC6766EEBCD0968702
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
            • String ID:
            • API String ID: 1239891234-0
            • Opcode ID: fa8f028e9fcd13a2b73484911b7de9c78ca1ddcb2e97266c57a75bc76a24fdd2
            • Instruction ID: 2788ece9c1aaba7a082e40c8a369a55235268d11a9614cb2448654ae67597066
            • Opcode Fuzzy Hash: fa8f028e9fcd13a2b73484911b7de9c78ca1ddcb2e97266c57a75bc76a24fdd2
            • Instruction Fuzzy Hash: DB318132A28B818ADB20CF26E8403AE73A5FB88754F540176EA8DC3B56DF78C545CB01
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: FileFindFirst_invalid_parameter_noinfo
            • String ID:
            • API String ID: 2227656907-0
            • Opcode ID: 68b5c0f69695cefe4d2b1cac7d4572eefde3aab897b1af24f4d9a3b1cd0a2181
            • Instruction ID: 289baa388faffbaf79099faf401a7ef1e1179232063e8fc28b2425eb0b4729de
            • Opcode Fuzzy Hash: 68b5c0f69695cefe4d2b1cac7d4572eefde3aab897b1af24f4d9a3b1cd0a2181
            • Instruction Fuzzy Hash: 91B19126E3865241EF609B27AD002B96392EB85BD4F445172EE5EC7B87DFBCE4418703
            APIs
            Strings
            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF62A98C8AF
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: DebugDebuggerErrorLastOutputPresentString
            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
            • API String ID: 389471666-631824599
            • Opcode ID: 6ee909605b01ed677f0d258b83eb54f87cb27d04152a024ec70f484db7e8edcc
            • Instruction ID: 1ed80ae8d1dd36e5979eb8117da38eafb57fc82298779c030c4d58705cdee26d
            • Opcode Fuzzy Hash: 6ee909605b01ed677f0d258b83eb54f87cb27d04152a024ec70f484db7e8edcc
            • Instruction Fuzzy Hash: 84112832E24B4296FB449B26DA443B923A5FB44385F408176C64DC6A52EFBCE064C712
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: memcpy_s
            • String ID:
            • API String ID: 1502251526-0
            • Opcode ID: a3a34dc7f104a5757306e0e4006adbba08ef9a00a3e13a0073f806107d450ba3
            • Instruction ID: dd7e5e5cc5b4cba1eed644e186608103e1a86f13ec0fcd8926b1e1bcac9a5e6d
            • Opcode Fuzzy Hash: a3a34dc7f104a5757306e0e4006adbba08ef9a00a3e13a0073f806107d450ba3
            • Instruction Fuzzy Hash: 1DC1E572F292869BEB248F16A5446AAB791F788B84F44C134DB4EC7B45DE7DE801CB40
            APIs
              • Part of subcall function 00007FF62A99ED10: GetLastError.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99ED1F
              • Part of subcall function 00007FF62A99ED10: FlsGetValue.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99ED34
              • Part of subcall function 00007FF62A99ED10: SetLastError.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99EDBF
              • Part of subcall function 00007FF62A99ED10: FlsSetValue.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99ED55
            • GetLocaleInfoW.KERNEL32 ref: 00007FF62A9A7EAC
              • Part of subcall function 00007FF62A9A3FCC: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62A9A3FE9
            • GetLocaleInfoW.KERNEL32 ref: 00007FF62A9A7EF5
              • Part of subcall function 00007FF62A9A3FCC: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62A9A4042
            • GetLocaleInfoW.KERNEL32 ref: 00007FF62A9A7FBD
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: InfoLocale$ErrorLastValue_invalid_parameter_noinfo
            • String ID:
            • API String ID: 1791019856-0
            • Opcode ID: 47a608bb907d4de4290f427b339ca80dcd83f241fa12a378f23bb4634d50531a
            • Instruction ID: c8e45690fd086513df3e6652a71d758895ee87817fbae687ac280d27175d28cb
            • Opcode Fuzzy Hash: 47a608bb907d4de4290f427b339ca80dcd83f241fa12a378f23bb4634d50531a
            • Instruction Fuzzy Hash: 4E619E32E2855286EF248F22D9512B973A2FB44740F0481B6DB9EC3693DFBDE551C742
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: InfoLocale
            • String ID: GetLocaleInfoEx
            • API String ID: 2299586839-2904428671
            • Opcode ID: 3b61ae466ef5758e0e9e9450f631c2e40b05ac649b5573246797acb4bca5b173
            • Instruction ID: c6eb0c0fa58027df91250c931a8e767c9c6bbe3133714097534f3a3fed0492dd
            • Opcode Fuzzy Hash: 3b61ae466ef5758e0e9e9450f631c2e40b05ac649b5573246797acb4bca5b173
            • Instruction Fuzzy Hash: D101DF25F18A9185EF008B47B8001AAA262AB99BC0F584076DF4DC3B5BCE7CD9458742
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ExceptionRaise_clrfp
            • String ID:
            • API String ID: 15204871-0
            • Opcode ID: 122b1925bd55db41e804c5b079ebde0f01de1123b2666aa23313b6dae26d6c44
            • Instruction ID: 5abb73178e1478c7cc312d9321c8c35dc642f72a3fb63aeb129eebdcc9d04483
            • Opcode Fuzzy Hash: 122b1925bd55db41e804c5b079ebde0f01de1123b2666aa23313b6dae26d6c44
            • Instruction Fuzzy Hash: 82B17D77E10B888BEB15CF2AC8463693BA1F744B48F1489A2DA5DC37A6CF79D451C702
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID:
            • String ID: $
            • API String ID: 0-227171996
            • Opcode ID: 551e646fd59d23c1ee018d61c48a67f2a52f50f5278fc9195615cae8faf456cd
            • Instruction ID: f52e82c17bf0ab99ee360b1de2fac94280d4351c3ac14a37927b67a3728e7f9e
            • Opcode Fuzzy Hash: 551e646fd59d23c1ee018d61c48a67f2a52f50f5278fc9195615cae8faf456cd
            • Instruction Fuzzy Hash: 26E1E732E28603DAEF688E2B8A5013D23A0FF45B48F149975CA4DC7796DF6BD841C742
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID:
            • String ID: e+000$gfff
            • API String ID: 0-3030954782
            • Opcode ID: a347cb712251c494c0ac76841d0ca458a250c6be9a7c463d0ead6691c264c289
            • Instruction ID: ba0110c0951284546618e067be077cae11fa3744169bfea08a5cc03490ca408d
            • Opcode Fuzzy Hash: a347cb712251c494c0ac76841d0ca458a250c6be9a7c463d0ead6691c264c289
            • Instruction Fuzzy Hash: 13515D22F286C65AEB258E369E00769B791E745B54F08C2B2CB5CC7AC7DEBDD4448702
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Info
            • String ID:
            • API String ID: 1807457897-0
            • Opcode ID: 773e53d09e5455f04dc57cd524f4ca394a315c5928bf5f5768ba6214c405212f
            • Instruction ID: 0d5e450368b5e5570eef80885886f02fb981d93eca4cd9312ba2ef77ad38ee11
            • Opcode Fuzzy Hash: 773e53d09e5455f04dc57cd524f4ca394a315c5928bf5f5768ba6214c405212f
            • Instruction Fuzzy Hash: 68129F22E18BC28AEB51CF299A542FD73A4FB58748F059235EE9CC6653DF78E181C701
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e22158b38decd8d90c74f2f99d25a665006446744f2e1b5a41cef00b0dd0ad41
            • Instruction ID: 109a0443f505c14918fc0392921637be315d4fab96d9440bf99fd97da895ab59
            • Opcode Fuzzy Hash: e22158b38decd8d90c74f2f99d25a665006446744f2e1b5a41cef00b0dd0ad41
            • Instruction Fuzzy Hash: 9EE16D32E14B8186EB20DB62E9412FA67A5F794B88F408532DF8D97757EFB8D245C301
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID:
            • String ID: [RO] %ld bytes
            • API String ID: 0-772938740
            • Opcode ID: 4874844c38418d14ede67d35d8ec1f57646d452b183219fb2a06a3d7a21df842
            • Instruction ID: 6375d429b0358b8a86b4c7413ce7b98f1e169517e9686d6dd18ad6a9645b6911
            • Opcode Fuzzy Hash: 4874844c38418d14ede67d35d8ec1f57646d452b183219fb2a06a3d7a21df842
            • Instruction Fuzzy Hash: E542AE736192C5CFC328CF29D84026E7BA0F755B44F4481A9DB8ACBB46DB78E854CB61
            APIs
              • Part of subcall function 00007FF62A99ED10: GetLastError.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99ED1F
              • Part of subcall function 00007FF62A99ED10: FlsGetValue.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99ED34
              • Part of subcall function 00007FF62A99ED10: SetLastError.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99EDBF
              • Part of subcall function 00007FF62A99ED10: FlsSetValue.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99ED55
            • GetLocaleInfoW.KERNEL32 ref: 00007FF62A9A80F0
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ErrorLastValue$InfoLocale
            • String ID:
            • API String ID: 673564084-0
            • Opcode ID: fd4313f3ed39529f0e214070d5eb9b22141959494d17c08f529f82dcba2f0cc7
            • Instruction ID: 132f32efac9c8227fb05ab1b98672a4beb9e1a2a034105a7c053e14f0737b760
            • Opcode Fuzzy Hash: fd4313f3ed39529f0e214070d5eb9b22141959494d17c08f529f82dcba2f0cc7
            • Instruction Fuzzy Hash: 4E318771F2864286EF648B22DC813BA73A2FB44744F448476DA8DC3247DF7CE4518782
            APIs
              • Part of subcall function 00007FF62A99ED10: GetLastError.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99ED1F
              • Part of subcall function 00007FF62A99ED10: FlsGetValue.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99ED34
              • Part of subcall function 00007FF62A99ED10: SetLastError.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99EDBF
            • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF62A9A84C7,00000000,00000092,?,?,00000000,?,?,00007FF62A99D771), ref: 00007FF62A9A7D76
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ErrorLast$EnumLocalesSystemValue
            • String ID:
            • API String ID: 3029459697-0
            • Opcode ID: 15ac7d5427dd9fc22c9c1f247fbd5354b0666d540418ec543f069a2b87512e20
            • Instruction ID: 00c22503be5b17bbcc9b9efccf59f36b28375524bde24e190e4e738033254f76
            • Opcode Fuzzy Hash: 15ac7d5427dd9fc22c9c1f247fbd5354b0666d540418ec543f069a2b87512e20
            • Instruction Fuzzy Hash: 13110563E28641CAEF148F16D4902B837E2FB40FA0F548136C619C33D2CEA9D5D1C742
            APIs
              • Part of subcall function 00007FF62A99ED10: GetLastError.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99ED1F
              • Part of subcall function 00007FF62A99ED10: FlsGetValue.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99ED34
              • Part of subcall function 00007FF62A99ED10: SetLastError.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99EDBF
            • GetLocaleInfoW.KERNEL32(?,?,?,00007FF62A9A803A), ref: 00007FF62A9A82C7
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ErrorLast$InfoLocaleValue
            • String ID:
            • API String ID: 3796814847-0
            • Opcode ID: 02c8055d8d650acd3e8a74c68ff88f338c75fb4c0e3c19cf7d436b4e0503b1ee
            • Instruction ID: 33957af9a15597edf79fb3c1468c00a8541ad08a57faf52212d52026f4571e8e
            • Opcode Fuzzy Hash: 02c8055d8d650acd3e8a74c68ff88f338c75fb4c0e3c19cf7d436b4e0503b1ee
            • Instruction Fuzzy Hash: 81112B32F2855383EF648727A84067E2262EB507A4F54C272D66DC36C7EFA9D4818782
            APIs
              • Part of subcall function 00007FF62A99ED10: GetLastError.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99ED1F
              • Part of subcall function 00007FF62A99ED10: FlsGetValue.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99ED34
              • Part of subcall function 00007FF62A99ED10: SetLastError.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99EDBF
            • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF62A9A8483,00000000,00000092,?,?,00000000,?,?,00007FF62A99D771), ref: 00007FF62A9A7E26
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ErrorLast$EnumLocalesSystemValue
            • String ID:
            • API String ID: 3029459697-0
            • Opcode ID: 5727eb7e919169bab7f3b731904feba02bf0749f82d0e8f83876c19ff70cc26c
            • Instruction ID: 8a96526164eefef85b745d899c74a72ae53df0823ea29e2d423ac7359f1cc8b6
            • Opcode Fuzzy Hash: 5727eb7e919169bab7f3b731904feba02bf0749f82d0e8f83876c19ff70cc26c
            • Instruction Fuzzy Hash: 7C01F572F1824186EF244B16EC517B972E3EB40BA4F558273D228C72D7CFB998818743
            APIs
            • EnumSystemLocalesW.KERNEL32(?,?,00000000,00007FF62A9A0F7F,?,?,?,?,?,?,?,?,00000000,00007FF62A9A7328), ref: 00007FF62A9A0B27
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: EnumLocalesSystem
            • String ID:
            • API String ID: 2099609381-0
            • Opcode ID: 0f058bcf8847595df1816a53f4d47a97cac47f7a866e7bb19b671d0c18a11263
            • Instruction ID: f3c6227860f58b66bb6f097cb73ef9b0fac06c44b2d610d493cdadfe75ba7b18
            • Opcode Fuzzy Hash: 0f058bcf8847595df1816a53f4d47a97cac47f7a866e7bb19b671d0c18a11263
            • Instruction Fuzzy Hash: 9BF06972F28A4183EB04CB16EC901A92366FB8C780F548076EA4DC37A6CE7CD861C701
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID:
            • String ID: gfffffff
            • API String ID: 0-1523873471
            • Opcode ID: 91511e75055787009b36da5e0b5904dd2b35cdbec92fe664924b5d59d9c2ed42
            • Instruction ID: 6ab23a4b6d530f9f0d99c69f233064c98ec4bcae46b3ce382d38b7413d1a0237
            • Opcode Fuzzy Hash: 91511e75055787009b36da5e0b5904dd2b35cdbec92fe664924b5d59d9c2ed42
            • Instruction Fuzzy Hash: 00A13863E287875AEF21CF2AA9007A9BB90AB50784F04C172DE4DC7792DE7DD506C702
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID: 0-3916222277
            • Opcode ID: 5fb6afdc90124b9ccfbc1fc7428f51e6266c183c57cc2358b46b47bb293d3794
            • Instruction ID: 45ee97fd99dc0323c427b441c6c1bddca48e76e73fca4e8040af696b27b37e2a
            • Opcode Fuzzy Hash: 5fb6afdc90124b9ccfbc1fc7428f51e6266c183c57cc2358b46b47bb293d3794
            • Instruction Fuzzy Hash: 01B18E72D2868699EB648F2AC95027C3BB0F749B48F2481B5CB4DC7396DFB9D441D702
            APIs
            • GetLastError.KERNEL32 ref: 00007FF62A9A2A89
              • Part of subcall function 00007FF62A9A0A28: HeapAlloc.KERNEL32(?,?,00000000,00007FF62A99EEEA,?,?,0000E12CD978A873,00007FF62A998DA5,?,?,?,?,00007FF62A9A27E6,?,?,00000000), ref: 00007FF62A9A0A7D
              • Part of subcall function 00007FF62A99E95C: RtlFreeHeap.NTDLL(?,?,?,00007FF62A9A6862,?,?,?,00007FF62A9A6BDF,?,?,00000000,00007FF62A9A7025,?,?,?,00007FF62A9A6F57), ref: 00007FF62A99E972
              • Part of subcall function 00007FF62A99E95C: GetLastError.KERNEL32(?,?,?,00007FF62A9A6862,?,?,?,00007FF62A9A6BDF,?,?,00000000,00007FF62A9A7025,?,?,?,00007FF62A9A6F57), ref: 00007FF62A99E97C
              • Part of subcall function 00007FF62A9AA24C: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62A9AA27F
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ErrorHeapLast$AllocFree_invalid_parameter_noinfo
            • String ID:
            • API String ID: 916656526-0
            • Opcode ID: 211458dcc4182629a49dfa16bd233c2fd01fa5b79e8a7313d1c8d1c4e015e553
            • Instruction ID: 74386b225b59651b382ce5ec98d295919cad9fa3ffe92106a0b7973dac77a261
            • Opcode Fuzzy Hash: 211458dcc4182629a49dfa16bd233c2fd01fa5b79e8a7313d1c8d1c4e015e553
            • Instruction Fuzzy Hash: D941D522F2924302EF709E176C5167AE682BF9A780F544576EE4DC7B97DEBCE4008603
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f9d3e26cd520c0d7484bca21c75386a0081201fe8f2cf936fcf25e5b7a4aa551
            • Instruction ID: cf40a703cd7279cc0487c436ce7ea6c85c2654183ee812e5e8fbd3065afe02f1
            • Opcode Fuzzy Hash: f9d3e26cd520c0d7484bca21c75386a0081201fe8f2cf936fcf25e5b7a4aa551
            • Instruction Fuzzy Hash: 7D22CEB7F3805047D36DCB1DEC52FA97692B7A5348748A02CBA07C3F45EA3DEA458A44
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2dbab6f601d912f7832fe87e6cb8010b159b99cec89eaaed4f22644e13967388
            • Instruction ID: ffdf119c9a0293a45c00c3b57a9dd86a8f551e4baa4d8070b6987094d424164c
            • Opcode Fuzzy Hash: 2dbab6f601d912f7832fe87e6cb8010b159b99cec89eaaed4f22644e13967388
            • Instruction Fuzzy Hash: 7BC1EF73B296918BDB19CF26E990569B792FBC4BD0B55C134DA4A87B89DE3CD801CB00
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3e5dc7f97a53f24eb071f4a4c5281cd4cfcae3ea760a8a1df74637965631acf6
            • Instruction ID: 1c206b68e20088efffffb06e7b4637287a2a8b6b9edd37fed9d33f8086a35e4b
            • Opcode Fuzzy Hash: 3e5dc7f97a53f24eb071f4a4c5281cd4cfcae3ea760a8a1df74637965631acf6
            • Instruction Fuzzy Hash: E0D1FA26E28603DAEF688E2B9A0127D27A1FB05B48F148575CE0DD76D7DFBAD441C342
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ErrorLastNameTranslate$CodePageValidValue_invalid_parameter_noinfo
            • String ID:
            • API String ID: 4023145424-0
            • Opcode ID: 21e64ea7c375e93a6d3691ec49e9bdd76ef4fc5f4d0d1dcdba5dc2295bd766ac
            • Instruction ID: 43180fb56879d43c2092d2bd1a9fd84535b7203c173e83842de9e82747473902
            • Opcode Fuzzy Hash: 21e64ea7c375e93a6d3691ec49e9bdd76ef4fc5f4d0d1dcdba5dc2295bd766ac
            • Instruction Fuzzy Hash: 4BC10A65E2878359EF609B6B9E503BA23A0FB94788F408071DE4DC7686EF7CE541C702
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ErrorLast$Value_invalid_parameter_noinfo
            • String ID:
            • API String ID: 1500699246-0
            • Opcode ID: d774b1686d68766547d9d0affe500116b26f703ac014ee2f743871d76f2ddb8c
            • Instruction ID: 6ef406b3fc5ace870c2c861d90a661acab369fbe50daf81615e33263849e74ed
            • Opcode Fuzzy Hash: d774b1686d68766547d9d0affe500116b26f703ac014ee2f743871d76f2ddb8c
            • Instruction Fuzzy Hash: 36B1B822E28646C6EF649F26D9227B93392EB44B88F404172DA4DC36C7DFBDD5418743
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9cf611d711d996cef35472e7504a5935af8ed11963d98eb5a37693ba2286e55b
            • Instruction ID: 7b6715f583a653f28e14efe355432e273f8a804a72fea8f635557f5efc5794b6
            • Opcode Fuzzy Hash: 9cf611d711d996cef35472e7504a5935af8ed11963d98eb5a37693ba2286e55b
            • Instruction Fuzzy Hash: C6B19272D2878699EF648F2AC95017C3BA5E745B48F2881B9CB4DC7396CF79E441C702
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID:
            • API String ID: 3215553584-0
            • Opcode ID: c771e48c11f0d915594974b4bba5b1cef921b70c42e7a63ac30c42f7e56c6b99
            • Instruction ID: 65f0c7109910f87776dcaa56529af25322a57b5eca4415dcfed1db03ca37812c
            • Opcode Fuzzy Hash: c771e48c11f0d915594974b4bba5b1cef921b70c42e7a63ac30c42f7e56c6b99
            • Instruction Fuzzy Hash: 5381B372E24A1299EF648E66C9813BD23A0FB84B98F108676EF1DC7796CF7CD4418301
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c06df77d5c41abf0c9103d11d2ff5cfa312f76e721c7628385afe64dabe37a34
            • Instruction ID: 4970398686d1b0ead3cb75e75c0bc4f125944005c1f3cf3515af59c82cf9d339
            • Opcode Fuzzy Hash: c06df77d5c41abf0c9103d11d2ff5cfa312f76e721c7628385afe64dabe37a34
            • Instruction Fuzzy Hash: 7181E872E1C78145EFB4CF1A988037A6692FB49794F144276DA8EC7B87CE7DD4408B02
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f6f6a1a1a1cf9baf0de81f1e4df80e775a01d7d2970379cd065fadcfc056c7f6
            • Instruction ID: c2926b86fbdfcde4283f2acfe03d49d5b8d634ac284b51bd985de14b587ec768
            • Opcode Fuzzy Hash: f6f6a1a1a1cf9baf0de81f1e4df80e775a01d7d2970379cd065fadcfc056c7f6
            • Instruction Fuzzy Hash: 5861F862F28B8986DF208F1AE8415AAA360FB597C0F545271DB9DC7B55EFBDE180C300
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
            • Instruction ID: 5084b8e836f3d2b69dd33187f70606bcb3c71ebafab4b6a1c8140cdda4ae4d90
            • Opcode Fuzzy Hash: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
            • Instruction Fuzzy Hash: AD51B836E256539AEF248B2AC55027A33A0EB44B58F24C171CE4DC7796CF7AE847C741
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
            • Instruction ID: 17246dcd771ade6d547b8d0d80784ceddb1e2cc0715a2c40cb5e8f9edd40cf8f
            • Opcode Fuzzy Hash: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
            • Instruction Fuzzy Hash: A351A832E24652DAEF248B2AC55022D37A4EB45B58F24C171CE4DC77A5CFBAE847C741
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
            • Instruction ID: 20c2b0929fe409e826e82b382a9b575e6a0fb8e5aaddaeec143c4ae0db3d495e
            • Opcode Fuzzy Hash: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
            • Instruction Fuzzy Hash: BE51AA76E246529AEF248B2AC64023A33A0EB44B58F24C171CE4DD7796CF7AED47C741
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f6a3dccb135ddd09f63c505db29ff29986bf9dd63497299e7c799fac6b959aa4
            • Instruction ID: 1f257a88c31bfc58f29f1988844240fd092e7086cbdc3e50c732ca5e63250bd5
            • Opcode Fuzzy Hash: f6a3dccb135ddd09f63c505db29ff29986bf9dd63497299e7c799fac6b959aa4
            • Instruction Fuzzy Hash: 0051D936E346529AFB648B2EC64023A37A1EB44B58F248071CE4DC7796CF7AE846C741
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e46230d8c0bb23a9b26f12389beaf27d8e9063d4bba2e4d98de2a57eaa924be5
            • Instruction ID: bb795220460ac88c425f9b750268109ed4a63321445bdd69ab696e1c4751c679
            • Opcode Fuzzy Hash: e46230d8c0bb23a9b26f12389beaf27d8e9063d4bba2e4d98de2a57eaa924be5
            • Instruction Fuzzy Hash: 2451B972E286529AEF248B1BC54033937A0EB48B58F648171CE4DC7796CF7AE846C742
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: db363646d287334b7a31293e9082935613ba5dde14aee32d187fc7345eaa1eeb
            • Instruction ID: faf166883ee76239bff137ecff7aa6f6c975546d07f604299256c56ed968612b
            • Opcode Fuzzy Hash: db363646d287334b7a31293e9082935613ba5dde14aee32d187fc7345eaa1eeb
            • Instruction Fuzzy Hash: BA519A36E246529AEB248F1AD94023937A0EB44B58F24C171CE4DC77A5DF7AEC46C781
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ErrorFreeHeapLast
            • String ID:
            • API String ID: 485612231-0
            • Opcode ID: 992bdeb28752ac81bb160f4e9466717d9b532df2d17ea574ae2dd87a94b6b211
            • Instruction ID: 2efcc57cf03576dc340115272d72717f449b7ec6eeef82431674f0d26887a937
            • Opcode Fuzzy Hash: 992bdeb28752ac81bb160f4e9466717d9b532df2d17ea574ae2dd87a94b6b211
            • Instruction Fuzzy Hash: C141C362B24A5695EF44CF2BDE2416963A2B74CFC0B499032DE0DD7B59DF7CD4428341
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6db13767cb4ef8546692f7daaddc1c348767b8ea185383b737debd21f48b2f6e
            • Instruction ID: 996170c9feb5687e3c6c22ed7f125143a6a411ab95ea468166ddb5deb048c0e2
            • Opcode Fuzzy Hash: 6db13767cb4ef8546692f7daaddc1c348767b8ea185383b737debd21f48b2f6e
            • Instruction Fuzzy Hash: FBF06872F286958EDF948F29A802A2977D9F70C380F908479D58DC3B55DA7C9550CF05
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9500c7797480eaac07bce270d35ebf5893055aa53205c196292c9b063e5a007a
            • Instruction ID: e534c8634a1e2abb2da3ab756b6e91cda7b1e98aa30a8d9c4b6431f3f94bb8b5
            • Opcode Fuzzy Hash: 9500c7797480eaac07bce270d35ebf5893055aa53205c196292c9b063e5a007a
            • Instruction Fuzzy Hash: 6AA00122D2894298EB088B02AD6023423A5AB94780F4900B2C00DC60629EADA5408653
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Event$Message$Reset$CloseCriticalErrorLastPeekSectionThread$CurrentDispatchEnterHandleLeaveMultipleObjectsSwitchTranslateWaitclosesocketsendshutdown
            • String ID:
            • API String ID: 4058177064-0
            • Opcode ID: d4a00dac0fba48dd619eb6ba1b780ae101c1c81bf132304460c16c28b79e9ffb
            • Instruction ID: 6043b2e0073ba6da5e0374e35d72939bafb3a177759d1f537747c2ba8adab764
            • Opcode Fuzzy Hash: d4a00dac0fba48dd619eb6ba1b780ae101c1c81bf132304460c16c28b79e9ffb
            • Instruction Fuzzy Hash: CF918D72F28A8297EB589B26DD443A873A1FB85750F004176CB5DC76A3CF78E464C712
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: lstrcatlstrlen$CreateEnvironmentExpandProcessStringslstrcpywsprintf
            • String ID: "%1$%s\shell\open\command$WinSta0\Default$h
            • API String ID: 1783372451-551013563
            • Opcode ID: eac3ac33eed5e84588de99090fdd2237e456d1a0e0148cdd7090aa018ec508cf
            • Instruction ID: f5f1f59112c88e870daa6c5b8abd8e3370ccf0796dc25b72b2d6faa4024d29cd
            • Opcode Fuzzy Hash: eac3ac33eed5e84588de99090fdd2237e456d1a0e0148cdd7090aa018ec508cf
            • Instruction Fuzzy Hash: E9616532F28B4299FF10DB62DC402E92361FB84788F444276DA4DD6A9AEFBCD544C742
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ByteCharEventMultiWidelstrlensetsockopt$CreateErrorIoctlLastSelectconnectgethostbynamehtonssocket
            • String ID:
            • API String ID: 1455939504-0
            • Opcode ID: 61f0279631f3a53486a16f72dab1f30556c86eabdf22f7d843a4b3cae8b7c8b3
            • Instruction ID: c97ccdb7f199fff100cd730c9947d1133bf29c2377d4bd98b0be592dfe45de57
            • Opcode Fuzzy Hash: 61f0279631f3a53486a16f72dab1f30556c86eabdf22f7d843a4b3cae8b7c8b3
            • Instruction Fuzzy Hash: 9A518772E18B9186DB208F26EC4436977A1FB85B94F100236EA9EC7B96CF7DD445C701
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
            • String ID:
            • API String ID: 2081738530-0
            • Opcode ID: abf8e540b54f698cc9b45021eb612f4fee3d5b077170ba2ec9f9a82e9aa791c4
            • Instruction ID: fc2a03265deb738e081823a134fa4eb53b5612bb95347427270593a35d47aa07
            • Opcode Fuzzy Hash: abf8e540b54f698cc9b45021eb612f4fee3d5b077170ba2ec9f9a82e9aa791c4
            • Instruction Fuzzy Hash: C3516F22E28B4289EF119B17EC441B973A1EF54BD0F1801B2DA5DC76A6DFACE446C702
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ErrorLast$EventTimetime$EnumEventsNetworkResetSelectsend
            • String ID:
            • API String ID: 957247320-3916222277
            • Opcode ID: 2310baa555e0df77a8bcfccd4f7fd94b27c56680d13eb448f7d2580fe2531f2f
            • Instruction ID: a9e2880c00cf723cf69ad302ce93238d14e440a88b286ea45955ed25c534e7a5
            • Opcode Fuzzy Hash: 2310baa555e0df77a8bcfccd4f7fd94b27c56680d13eb448f7d2580fe2531f2f
            • Instruction Fuzzy Hash: D87170B2E186818BEB508F2ADC8436977E0FB85B48F144075CB49CB693CFBDE4458B11
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CriticalSection$EnterErrorLastLeave
            • String ID:
            • API String ID: 4082018349-0
            • Opcode ID: cb0b3ee4ce24505bbac61aa70540e6acda4bbb341cea077ae408a959c4223429
            • Instruction ID: 9ceec6f02b6c164e117413d930ee0845ac4f47cf317dd21eeb5a416c51f68684
            • Opcode Fuzzy Hash: cb0b3ee4ce24505bbac61aa70540e6acda4bbb341cea077ae408a959c4223429
            • Instruction Fuzzy Hash: 6B61AD72F2864282EB989B16DD4877973A5FB84B80F848072CA1DCB696DF7CE444C712
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CriticalSection$EnterErrorLastLeave
            • String ID:
            • API String ID: 4082018349-0
            • Opcode ID: 31685a7c47cc355b0b84d769594d8f48275261b6e3cd822618b6b5c873848fb6
            • Instruction ID: 6c9f1d6639cd6cea3242960dc54e24a86daff813660f5322173b1335997bf440
            • Opcode Fuzzy Hash: 31685a7c47cc355b0b84d769594d8f48275261b6e3cd822618b6b5c873848fb6
            • Instruction Fuzzy Hash: B9315161F2864286EF989B179CC82792295FF45B85F5440B6DA0FCA693CFACE445C313
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CloseValue$CreateDeleteOpenlstrlen
            • String ID: Software$VenNetwork
            • API String ID: 3197061591-1820303132
            • Opcode ID: b270a5905e67aa2bd04960c5a5af98d5e64a07028cd1629e036b508084a2e799
            • Instruction ID: dfbc7a572a3d0e53ff7679dae57dce9aa0d4fc32ffcd7b823955871c4590cb17
            • Opcode Fuzzy Hash: b270a5905e67aa2bd04960c5a5af98d5e64a07028cd1629e036b508084a2e799
            • Instruction Fuzzy Hash: F0215E26B18A5086EB108F26EC4435AB361FB84BA5F444132DE4DC3B6ACFBCD549CB05
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CriticalErrorLastSection$EnterLeave
            • String ID:
            • API String ID: 2124651672-0
            • Opcode ID: 697fcd161a9195263e262f51415204b7d3309df62e750fca3656faa330f8ca80
            • Instruction ID: af599ddca11a09022a61f48db5486cf4e2539c767b299642564c78cecc2667a2
            • Opcode Fuzzy Hash: 697fcd161a9195263e262f51415204b7d3309df62e750fca3656faa330f8ca80
            • Instruction Fuzzy Hash: BB51CE72E286418BEB649B16EC8467C77A5FB48B80F05417ADB0ECB353CF68E804C752
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID: f$f$p$p$f
            • API String ID: 3215553584-1325933183
            • Opcode ID: 338c2a64cdc3021812c5b6ddca5db7159329e9a17ba8d876efc02d9e71b2fbd5
            • Instruction ID: 4b9784c1fdc81b050406d4932deb6f4ac99e9753a5801ecb4759aaf986c3f976
            • Opcode Fuzzy Hash: 338c2a64cdc3021812c5b6ddca5db7159329e9a17ba8d876efc02d9e71b2fbd5
            • Instruction Fuzzy Hash: B112A432E2C143AEFF255E16EA442B97291FBC1750F84C171E689C66C6DFBCE5808B16
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ErrorLast$setsockopt$CreateEventResetTimerWaitable
            • String ID:
            • API String ID: 2911610646-0
            • Opcode ID: 99686810c63a1bb6028a6172a43c66bfba7a4414762a6ea3ad2715b880425662
            • Instruction ID: 17f4d9ad975016168cc875c324e1361d3f697dcfe493ccb47355543ad8c18a6f
            • Opcode Fuzzy Hash: 99686810c63a1bb6028a6172a43c66bfba7a4414762a6ea3ad2715b880425662
            • Instruction Fuzzy Hash: A8518A72E14A8287EB148F2AED0436973A1FB89744F104076DB4CC7B92DFBDE4658B12
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CriticalSection$Leave$ErrorLastTimetime$EnterEvent
            • String ID:
            • API String ID: 3019579578-0
            • Opcode ID: 4019db875c6352495a6e2a967cb07e89537093c69e3cddfa206385f108ce449b
            • Instruction ID: c8558a3a005b1dd338153fad1402a2eb0d6d140ed242ecee4a81a8b8b8f57f92
            • Opcode Fuzzy Hash: 4019db875c6352495a6e2a967cb07e89537093c69e3cddfa206385f108ce449b
            • Instruction Fuzzy Hash: B5416E72D286428BEBA08B16DC4423E73A2FB84754F544176D64EC7A92DFBCF881C712
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CriticalSection$EnterErrorLastLeave
            • String ID:
            • API String ID: 4082018349-0
            • Opcode ID: bf041e3c240114bd2df664f35279ad8215a3420238d0dd4b213a5f2d55893e77
            • Instruction ID: d7d4c02a483c492c0ad0ab4acb425d6d0c63f0cda54e01ef969272d6f5eeb0d0
            • Opcode Fuzzy Hash: bf041e3c240114bd2df664f35279ad8215a3420238d0dd4b213a5f2d55893e77
            • Instruction Fuzzy Hash: AF315D72E28952CAEB909F26DC4827C37A5FF44748F444072DA0ECA656DFBCE849C712
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
            • String ID: csm$csm$csm
            • API String ID: 849930591-393685449
            • Opcode ID: cb5b3d42660800b6706ee9e5169d6ae77bc1ec10b54460efee445a81ffa0bcf3
            • Instruction ID: 71f4f92ba0ed1168a7a6098fce6d6fe0910dbe4a062f224b2c9d54acef8ffa74
            • Opcode Fuzzy Hash: cb5b3d42660800b6706ee9e5169d6ae77bc1ec10b54460efee445a81ffa0bcf3
            • Instruction Fuzzy Hash: 4BD1B132E287429AEF60DB6699403AD37A4FB45788F108175EE4DD7B56DF78E084C702
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: AddressFreeLibraryProc
            • String ID: api-ms-$ext-ms-
            • API String ID: 3013587201-537541572
            • Opcode ID: c5e8058506f29389ada01458bdd8bed04f407a28a220f5367f3ecbd3c22801fb
            • Instruction ID: cc3eedac1f48017e08c5f8b6fea0a65e1a93896ab6d55db85529664919541f98
            • Opcode Fuzzy Hash: c5e8058506f29389ada01458bdd8bed04f407a28a220f5367f3ecbd3c22801fb
            • Instruction Fuzzy Hash: 2F41B162F39A0241EF15CB17AD0427A22A2BF49BA0F085577DD0DDB797EEBCE4458302
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Filelstrcatlstrlenwsprintf$CloseCreateEnvironmentExpandHandleStringsWritelstrcpy
            • String ID: %s %s
            • API String ID: 958574092-2939940506
            • Opcode ID: 9d4b93ecebe44ad3dcfc41bef5c72ffa3e96dd61b2b13565d963145b1ed2cd72
            • Instruction ID: eee52d7d7006087554c364e5d2ef3804fb3db5f36e9e5e4879cda34d7db62766
            • Opcode Fuzzy Hash: 9d4b93ecebe44ad3dcfc41bef5c72ffa3e96dd61b2b13565d963145b1ed2cd72
            • Instruction Fuzzy Hash: FA415E22E28BC681EB118F29D9043FC2320F794B48F11A326DB4C96653EF79E2C5C701
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CriticalSection$EnterLeave$ErrorLastsend
            • String ID:
            • API String ID: 3480985631-0
            • Opcode ID: 223d6e403172c637e9da5f06492e840e62a0238e832c6a19f43c9c4cbc36de86
            • Instruction ID: 4ec6c98c1c95d47aa4ac435b94531567923f935b087a9e4765462c413673c9a6
            • Opcode Fuzzy Hash: 223d6e403172c637e9da5f06492e840e62a0238e832c6a19f43c9c4cbc36de86
            • Instruction Fuzzy Hash: 01418D32E18B8182EB548F26ED442AC73A5FB44B88F140172CE1DCBB5ACFB8E555C712
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID: f$p$p
            • API String ID: 3215553584-1995029353
            • Opcode ID: 42fb3e65d0f17d18353857ebdda260012259b146ac6ef5ada1715a4ca3ec7708
            • Instruction ID: b134343ea0bcce2fad03207905c62ac08ab92f2c5e2775ca34d56865767c3793
            • Opcode Fuzzy Hash: 42fb3e65d0f17d18353857ebdda260012259b146ac6ef5ada1715a4ca3ec7708
            • Instruction Fuzzy Hash: 5912C661E2C143AEFF245A16DA443B97696FB40750F84C075E68DC7AE6DFBCE4808B02
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CriticalSection$ErrorLast$EnterLeave$CurrentThread$EventsMultipleTimerWaitWaitablesend
            • String ID:
            • API String ID: 2807917265-0
            • Opcode ID: b86a4d89a2a610e9370193a82eb041067802b0227bafa79ad6b9f02f0420e125
            • Instruction ID: fd2e57ece3404e4a90d1e95153758343fc2382ed4a276db17e9a142324d3a9b7
            • Opcode Fuzzy Hash: b86a4d89a2a610e9370193a82eb041067802b0227bafa79ad6b9f02f0420e125
            • Instruction Fuzzy Hash: C751A3B6E2864286EF608F269C4467D2395FB86B58F144271DE1DCB397DF78E4408722
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: std::_$Lockit$GetctypeGetwctypeLocinfo::_Locinfo_ctorLockit::_Lockit::~_
            • String ID: bad locale name
            • API String ID: 1386471777-1405518554
            • Opcode ID: 69cc4a8b7b19662485723bada806c81d00e2c443d81482d7207a293efd463004
            • Instruction ID: 03e6b83d5d5d83cd7fa297c460aadbe167619d4cb06eb5df61c4ee99dd91b4a0
            • Opcode Fuzzy Hash: 69cc4a8b7b19662485723bada806c81d00e2c443d81482d7207a293efd463004
            • Instruction Fuzzy Hash: C3518922F29B419AFF15DFB2D8502BC2360EF44748F044178DF4EAAA9ADF78E5568311
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: std::_$Lockit$GetcollLocinfo::_Locinfo_ctorLockit::_Lockit::~__invalid_parameter_noinfo_noreturn
            • String ID: bad locale name
            • API String ID: 3908275632-1405518554
            • Opcode ID: 547efca0749532fe16a4a51e07bad1bbee508b3b10b870f5b11536083eee9189
            • Instruction ID: dc7495b142064813a7b5acbb0e06e837dd7989e1face7942bb6f9ba1ad615c54
            • Opcode Fuzzy Hash: 547efca0749532fe16a4a51e07bad1bbee508b3b10b870f5b11536083eee9189
            • Instruction Fuzzy Hash: CA514922F19B519DFF10DFA2D8502BC2361EF44788F1441B5DA0DE7A9ACFB895469302
            APIs
            • LoadLibraryExW.KERNEL32(?,?,?,00007FF62A993A7E,?,?,?,00007FF62A993770,?,?,?,00007FF62A9903A9), ref: 00007FF62A993851
            • GetLastError.KERNEL32(?,?,?,00007FF62A993A7E,?,?,?,00007FF62A993770,?,?,?,00007FF62A9903A9), ref: 00007FF62A99385F
            • LoadLibraryExW.KERNEL32(?,?,?,00007FF62A993A7E,?,?,?,00007FF62A993770,?,?,?,00007FF62A9903A9), ref: 00007FF62A993889
            • FreeLibrary.KERNEL32(?,?,?,00007FF62A993A7E,?,?,?,00007FF62A993770,?,?,?,00007FF62A9903A9), ref: 00007FF62A9938F7
            • GetProcAddress.KERNEL32(?,?,?,00007FF62A993A7E,?,?,?,00007FF62A993770,?,?,?,00007FF62A9903A9), ref: 00007FF62A993903
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Library$Load$AddressErrorFreeLastProc
            • String ID: api-ms-
            • API String ID: 2559590344-2084034818
            • Opcode ID: bdcdafd802d049a58c0b09305f9ac5b25268f61174ed16779f6a01e1bd42f6da
            • Instruction ID: 9c312384fd3350cb396ae91d2ea7cfda5a6030adb30a5445be2dcf31f1fd4939
            • Opcode Fuzzy Hash: bdcdafd802d049a58c0b09305f9ac5b25268f61174ed16779f6a01e1bd42f6da
            • Instruction Fuzzy Hash: 80318025E2AA42A5EF519F039D001762394BF44BA0F1985BADD1DCB782EEBCE4458343
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: AttributesCreateErrorFileLastProcesslstrlen
            • String ID: WinSta0\Default$h
            • API String ID: 591566999-1620045033
            • Opcode ID: e32d291d3ae18add421cd5930f97da2bf0bdaa83747d8569411df8fdcf1cf2f1
            • Instruction ID: 85ee2e93b7b2840548cf42b4aa2073a047721f15c3f32fd20e8b27492870b370
            • Opcode Fuzzy Hash: e32d291d3ae18add421cd5930f97da2bf0bdaa83747d8569411df8fdcf1cf2f1
            • Instruction Fuzzy Hash: 9E318522E187C246EB708B16B9043BE6391FB95790F004375EA9DC7B9AEF7CD0948701
            APIs
            • GetLastError.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99ED1F
            • FlsGetValue.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99ED34
            • FlsSetValue.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99ED55
            • FlsSetValue.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99ED82
            • FlsSetValue.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99ED93
            • FlsSetValue.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99EDA4
            • SetLastError.KERNEL32(?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F,?,?,?,00007FF62A9966E3), ref: 00007FF62A99EDBF
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Value$ErrorLast
            • String ID:
            • API String ID: 2506987500-0
            • Opcode ID: f2de6421f07b29a90cfdc6310c4a09f0568ac7a9393794dea83b72160e9ddcb3
            • Instruction ID: 888059e937f506586af0d8f7018dca00fb94f255317ce76353ffdc1a1855febb
            • Opcode Fuzzy Hash: f2de6421f07b29a90cfdc6310c4a09f0568ac7a9393794dea83b72160e9ddcb3
            • Instruction Fuzzy Hash: 00216A20E2960356FF94A3235F4513912865F88BA0F1486B5E93EC66D7DEACB4014A03
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
            • String ID: CONOUT$
            • API String ID: 3230265001-3130406586
            • Opcode ID: 459cac5f161fe15dedf5efeb1a5c45af724dbddd491f92cbd2d9a7ab51bbc5e3
            • Instruction ID: b101e70ef9821bb9abbd7132754901c1df5b79426eca7d7f25812574f23451de
            • Opcode Fuzzy Hash: 459cac5f161fe15dedf5efeb1a5c45af724dbddd491f92cbd2d9a7ab51bbc5e3
            • Instruction Fuzzy Hash: 67118422F28A4186EB508B57EC5432966A1FB48BE5F004276E95DC7796CFBCD4148742
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: File$CloseCreateHandleMutexObjectPointerReleaseSingleWaitWritelstrlen
            • String ID:
            • API String ID: 4202892810-0
            • Opcode ID: 1770146ed1a2281a067c6a80d48e2834b530e15e6b9c6a9fb3f6106c2579b985
            • Instruction ID: 3ca425724e8779d99690f5897a6fe0cca4c6017f57c9011301a7110168eec081
            • Opcode Fuzzy Hash: 1770146ed1a2281a067c6a80d48e2834b530e15e6b9c6a9fb3f6106c2579b985
            • Instruction Fuzzy Hash: 17117775E28A4182FB10DB16FC487657761FB88BA4F004272D95E837E6CFBCD4458B02
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Value$CloseDeleteOpen
            • String ID: Console$IpDatespecial
            • API String ID: 3183427449-1840232981
            • Opcode ID: 227ad8f4b06cdb6b08930102bada313d7f8b98b7889bc09013c0be248a67a942
            • Instruction ID: 64a1ff87b047737ebcc7022bc1399d3edf211b170d1090e8070284a6733c21b1
            • Opcode Fuzzy Hash: 227ad8f4b06cdb6b08930102bada313d7f8b98b7889bc09013c0be248a67a942
            • Instruction Fuzzy Hash: 15016136A18ED186EB218F25EC1076A3721FB84B55F044263CE4D87796CF7CD599CB05
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Process$CommandCreateExitFileInfoLineModuleNameStartup
            • String ID:
            • API String ID: 3421218197-3916222277
            • Opcode ID: aa1260efbfd046cd4269c4db6a47a0747b5d48ad13e0b0b72107f694596a2f32
            • Instruction ID: 3ca01d9c36aba4f9459411e15ff5fa2d956f8dce91fb8ec3b26d46c485b36f4f
            • Opcode Fuzzy Hash: aa1260efbfd046cd4269c4db6a47a0747b5d48ad13e0b0b72107f694596a2f32
            • Instruction Fuzzy Hash: 7EF03632E28A8186DB608F25F84875EB3A1FB89744F500136D68E87A65DF7CC149CB01
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ErrorLast$recv
            • String ID:
            • API String ID: 316788870-0
            • Opcode ID: 1bfb22ba95e7e7656d2d5e0fb302539e9b3bee6e0c9b932fa958a4b538105933
            • Instruction ID: af1afe414ec354ce540c9a6a4d4ffa7f5786bd07081ecb84bebc0898fae689db
            • Opcode Fuzzy Hash: 1bfb22ba95e7e7656d2d5e0fb302539e9b3bee6e0c9b932fa958a4b538105933
            • Instruction Fuzzy Hash: 7D314772E2864282EF948F2AEC4437D23A1EB86B44F544576CA1DC7297DFBDD4848712
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
            • String ID: csm$csm$csm
            • API String ID: 3523768491-393685449
            • Opcode ID: f0c8ce6e5c114cb55c7e972b5d7e00f12528d3fa075699b5c4d5ef1c378b05c7
            • Instruction ID: 735d8bb46c5d20022ddc9448457a3c2427f9b46bc9403239659de6bb9c592c66
            • Opcode Fuzzy Hash: f0c8ce6e5c114cb55c7e972b5d7e00f12528d3fa075699b5c4d5ef1c378b05c7
            • Instruction Fuzzy Hash: 72E1C172E287839EEB609F2AD9402AC77A0FB44748F248175DA5DC7657DF78E085CB02
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: EventReset$Thread$CurrentErrorLastObjectSingleSwitchTimeWait_invalid_parameter_noinfotime
            • String ID:
            • API String ID: 2235205178-0
            • Opcode ID: 0c3c5ec39e87adfa389bf838caece4e6fe7672a6e350a85bf5e893da95473e9b
            • Instruction ID: f3ae7886bcbd4e0a55fc8176ddfa75de9f3acb927458486a781bac69c0375e9c
            • Opcode Fuzzy Hash: 0c3c5ec39e87adfa389bf838caece4e6fe7672a6e350a85bf5e893da95473e9b
            • Instruction Fuzzy Hash: E6217E72E18A8186EB40CF2AEC4426973A4FB84B98F184172DE4DCB76ACF78D441C752
            APIs
            • GetLastError.KERNEL32(?,?,0000E12CD978A873,00007FF62A998DA5,?,?,?,?,00007FF62A9A27E6,?,?,00000000,00007FF62A99A69B,?,?,?), ref: 00007FF62A99EE97
            • FlsSetValue.KERNEL32(?,?,0000E12CD978A873,00007FF62A998DA5,?,?,?,?,00007FF62A9A27E6,?,?,00000000,00007FF62A99A69B,?,?,?), ref: 00007FF62A99EECD
            • FlsSetValue.KERNEL32(?,?,0000E12CD978A873,00007FF62A998DA5,?,?,?,?,00007FF62A9A27E6,?,?,00000000,00007FF62A99A69B,?,?,?), ref: 00007FF62A99EEFA
            • FlsSetValue.KERNEL32(?,?,0000E12CD978A873,00007FF62A998DA5,?,?,?,?,00007FF62A9A27E6,?,?,00000000,00007FF62A99A69B,?,?,?), ref: 00007FF62A99EF0B
            • FlsSetValue.KERNEL32(?,?,0000E12CD978A873,00007FF62A998DA5,?,?,?,?,00007FF62A9A27E6,?,?,00000000,00007FF62A99A69B,?,?,?), ref: 00007FF62A99EF1C
            • SetLastError.KERNEL32(?,?,0000E12CD978A873,00007FF62A998DA5,?,?,?,?,00007FF62A9A27E6,?,?,00000000,00007FF62A99A69B,?,?,?), ref: 00007FF62A99EF37
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Value$ErrorLast
            • String ID:
            • API String ID: 2506987500-0
            • Opcode ID: 3654d854b1b7b54d09208102c236c7adbe92e0b1e90858cb6ea83a43bfdf338d
            • Instruction ID: 2e5fc79b442a3dc89b1a831cf85be51d534687d298bb3dfb16b47f82a1f2c367
            • Opcode Fuzzy Hash: 3654d854b1b7b54d09208102c236c7adbe92e0b1e90858cb6ea83a43bfdf338d
            • Instruction Fuzzy Hash: 5811AC20E2975356FF94A3235F4503922466F887B0F0496BAE83EC67C7DEECB4014A03
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: AddressFreeHandleLibraryModuleProc
            • String ID: CorExitProcess$mscoree.dll
            • API String ID: 4061214504-1276376045
            • Opcode ID: 69936be9a3c9092073ccdecace5a334f9bb4337f6d94747144cad9e03172cb9f
            • Instruction ID: 248c541bdc613071da4a40fb608fa02e17066b60fc3b01a0aa83228c58c23c92
            • Opcode Fuzzy Hash: 69936be9a3c9092073ccdecace5a334f9bb4337f6d94747144cad9e03172cb9f
            • Instruction Fuzzy Hash: 9CF0C866E3960251FF10CB25EC443796320AF48761F544776CA5EC55E6CFACD048C702
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CloseDeleteOpenValue
            • String ID: Console$IpDatespecial
            • API String ID: 849931509-1840232981
            • Opcode ID: 428edfecf080eeaca7e0c1c67ef556d191498152a1b600a56db6dc59e929ff35
            • Instruction ID: bbbf2857d38b889daf6434759680851878b29c10a4e56eafbad6818d9eef72cb
            • Opcode Fuzzy Hash: 428edfecf080eeaca7e0c1c67ef556d191498152a1b600a56db6dc59e929ff35
            • Instruction Fuzzy Hash: 1FF01276E18DD185EB208F15EC107AA7321E78476AF000272CD0D9766ADE7DD5DA8B05
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: AdjustPointer
            • String ID:
            • API String ID: 1740715915-0
            • Opcode ID: 95c273c5d9a602b1e514679a9057b242ded82a174dba946a287035d63dc3020a
            • Instruction ID: 431013e61d151037b78f32819ef828f7a9eb0ecccaf95445c8e12d01abf50044
            • Opcode Fuzzy Hash: 95c273c5d9a602b1e514679a9057b242ded82a174dba946a287035d63dc3020a
            • Instruction Fuzzy Hash: 52B1D922E2A643A9FF659B179E402386290EF44BC4F15C4B6DE6DC7787DEBCE4418342
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: _set_statfp
            • String ID:
            • API String ID: 1156100317-0
            • Opcode ID: 3a9c703ea5aaac55ee3dcba71a43574e980d604707a0521e319b1fc91c9c8b59
            • Instruction ID: 8ebb37fb66e7f728f9c8b35ace59458f65733adf787d2722ec6388fa87ee88f8
            • Opcode Fuzzy Hash: 3a9c703ea5aaac55ee3dcba71a43574e980d604707a0521e319b1fc91c9c8b59
            • Instruction Fuzzy Hash: 3B119426E3CB0341FF5411AADD433755493AF953B4E1886F6E66ECE2DB8E9CA841C203
            APIs
            • FlsGetValue.KERNEL32(?,?,?,00007FF62A993C9B,?,?,00000000,00007FF62A993F36,?,?,?,?,?,00007FF62A993EC2), ref: 00007FF62A99EF6F
            • FlsSetValue.KERNEL32(?,?,?,00007FF62A993C9B,?,?,00000000,00007FF62A993F36,?,?,?,?,?,00007FF62A993EC2), ref: 00007FF62A99EF8E
            • FlsSetValue.KERNEL32(?,?,?,00007FF62A993C9B,?,?,00000000,00007FF62A993F36,?,?,?,?,?,00007FF62A993EC2), ref: 00007FF62A99EFB6
            • FlsSetValue.KERNEL32(?,?,?,00007FF62A993C9B,?,?,00000000,00007FF62A993F36,?,?,?,?,?,00007FF62A993EC2), ref: 00007FF62A99EFC7
            • FlsSetValue.KERNEL32(?,?,?,00007FF62A993C9B,?,?,00000000,00007FF62A993F36,?,?,?,?,?,00007FF62A993EC2), ref: 00007FF62A99EFD8
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Value
            • String ID:
            • API String ID: 3702945584-0
            • Opcode ID: 4047813a2c2501da88736eb8979464a470432fe091b6a2381c64cb1679d0dde5
            • Instruction ID: 8cc97485d5e4a74c7c919052fbc88b03673613c001db7820db9e9ff8b7d83345
            • Opcode Fuzzy Hash: 4047813a2c2501da88736eb8979464a470432fe091b6a2381c64cb1679d0dde5
            • Instruction Fuzzy Hash: 0111AF10E2976355FF9893279F4113912466F483A0F0897BAE87EC67D7DEACB4014A03
            APIs
            • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F), ref: 00007FF62A99EDF5
            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F), ref: 00007FF62A99EE14
            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F), ref: 00007FF62A99EE3C
            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F), ref: 00007FF62A99EE4D
            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF62A9A7113,?,?,?,00007FF62A99F444,?,?,?,00007FF62A99843F), ref: 00007FF62A99EE5E
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Value
            • String ID:
            • API String ID: 3702945584-0
            • Opcode ID: f4b63a2d358e16832ea89596edc1dbf90b4b2fd2f1616095919a36d422ba38cd
            • Instruction ID: 2b86afef9f4dad0ad2aaeaee493d5df8c146641135ef74fa2bb8535abc4aa564
            • Opcode Fuzzy Hash: f4b63a2d358e16832ea89596edc1dbf90b4b2fd2f1616095919a36d422ba38cd
            • Instruction Fuzzy Hash: 3B112A10E293075AFF98A2635E52079124A5F49370F189BB9E93ECA2D3DDECB8414A03
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CriticalSection$EnterLeave
            • String ID:
            • API String ID: 3168844106-0
            • Opcode ID: 7d1c33e0fc199dc1a1b2b98ae86d416f77ce0655480dcc5f384a8a26f1c27f0c
            • Instruction ID: baac7f9bc5a80b5a9b7bf8ec55bf943534e80122e754d9b693c2818add76e3ee
            • Opcode Fuzzy Hash: 7d1c33e0fc199dc1a1b2b98ae86d416f77ce0655480dcc5f384a8a26f1c27f0c
            • Instruction Fuzzy Hash: F8111232E2454187DF909B26F8843AD63A1FB44755F445072DB8FC6A56CF7CE485C701
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CriticalSection$Enter$DeleteGdiplusLeaveObjectShutdown
            • String ID:
            • API String ID: 1513102227-0
            • Opcode ID: cb3a45266a7c72afb3eef7b31d32061257325c5ad6beb33f20a6e81f88ef5b24
            • Instruction ID: ef59ac61f531dba50103d31180a81decd5e4b105380063c555f2b3c878f33e57
            • Opcode Fuzzy Hash: cb3a45266a7c72afb3eef7b31d32061257325c5ad6beb33f20a6e81f88ef5b24
            • Instruction Fuzzy Hash: 2A116D33D25B4281EF008F2AEC8412873B4FB08F68B248236D65D862A2DF78D953C342
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CloseHandleObjectSingleThreadWait$CurrentErrorLastSleepSwitch
            • String ID:
            • API String ID: 1535946027-0
            • Opcode ID: 311de798c0593289d29e071e9f78a1d734eb52b4581ef33c1cbfd426072e5f36
            • Instruction ID: c35913732474c0145fe818ef9a1adb6f71d2e766fd9fe699fc22a40de912cb1a
            • Opcode Fuzzy Hash: 311de798c0593289d29e071e9f78a1d734eb52b4581ef33c1cbfd426072e5f36
            • Instruction Fuzzy Hash: 0CF03136E1494182EB049F2BDC582683361FB89F59F184172C92DC73A2CF78D8418352
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CallEncodePointerTranslator
            • String ID: MOC$RCC
            • API String ID: 3544855599-2084237596
            • Opcode ID: 85eb8fbd3e06a99c4afa559b4d80cf249f4e954e0195537aa802c98b0a840f84
            • Instruction ID: cf71b79ed33c80c8530b55b55764ce1949e01e62eafcd655452262e6f7e60ae7
            • Opcode Fuzzy Hash: 85eb8fbd3e06a99c4afa559b4d80cf249f4e954e0195537aa802c98b0a840f84
            • Instruction Fuzzy Hash: 7591F173E187829AEB50CF26D8402AC77A0FB04788F14817AEA8DD7B56DF78D195CB01
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
            • String ID: csm
            • API String ID: 2395640692-1018135373
            • Opcode ID: c305225e0e2b3a2203a822812f960376c115b044745f784688940b7b0a399dcc
            • Instruction ID: 6e807a6706b54583054a0d1165fa32a3ef9487c7b580d9bb3b287c06b3c6636c
            • Opcode Fuzzy Hash: c305225e0e2b3a2203a822812f960376c115b044745f784688940b7b0a399dcc
            • Instruction Fuzzy Hash: DC519F22E2A6028EDF148A1AE844B793391EB44B88F109176EA4DC774BDFBCE841C701
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
            • String ID: csm$csm
            • API String ID: 3896166516-3733052814
            • Opcode ID: 544592ab7251effa554c0990b2f03f08321f7b0f5e6baf8f1fc1d42750b8d711
            • Instruction ID: 81874b708f2cce0911894b16af4f8de8165d3757a1de17ac3a439873a223e80f
            • Opcode Fuzzy Hash: 544592ab7251effa554c0990b2f03f08321f7b0f5e6baf8f1fc1d42750b8d711
            • Instruction Fuzzy Hash: 0B518032D283439EEF788A129A4436CB794EB55B94F148175DA9CC7B96CFB8E460C702
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: FileWrite$ConsoleErrorLastOutput
            • String ID:
            • API String ID: 2718003287-0
            • Opcode ID: b0a5a2f5e03aa4de9bb2610dcdd396f5b9cdbd820afb8483674e8d26cbad73da
            • Instruction ID: edaf7321fd7702c6a319fe98d482743f5a1887aca5b625ee4998b47427d2862f
            • Opcode Fuzzy Hash: b0a5a2f5e03aa4de9bb2610dcdd396f5b9cdbd820afb8483674e8d26cbad73da
            • Instruction Fuzzy Hash: 79D1A232F286818AEB11CF66D8402AC37B2FB44799B144277DE5DD7B9ADE78D446C302
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
            • String ID:
            • API String ID: 73155330-0
            • Opcode ID: 9836cfd4f00772ab983df51a940828b549011ef8ebab5eaf54ddafcf2ed5cfb4
            • Instruction ID: 9ab95ac884260bde22b95411e4e5a528ddd715a030ea70e690e70c9fe24f6c85
            • Opcode Fuzzy Hash: 9836cfd4f00772ab983df51a940828b549011ef8ebab5eaf54ddafcf2ed5cfb4
            • Instruction Fuzzy Hash: 8C91A062F24A8249EF14CB57D9842BD6362BB04BE0F548671DB6DC7BCADFACD0858301
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo_noreturn
            • String ID:
            • API String ID: 3668304517-0
            • Opcode ID: d455572cb0b53bd605dd2c5479bbb32fa5d957f89605b264ea43e35a7a78a5b6
            • Instruction ID: f58b0ecf88993a830a0552fc3716c625e7962b3fc97ccaf905d58fa031959720
            • Opcode Fuzzy Hash: d455572cb0b53bd605dd2c5479bbb32fa5d957f89605b264ea43e35a7a78a5b6
            • Instruction Fuzzy Hash: CDB17E62F24B55C9FF008BA6D8447AC2372FB447D8F405265DE6CA7B9ADFB9A481C301
            APIs
            • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00007FF62A9AB36F), ref: 00007FF62A9AB4A0
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00007FF62A9AB36F), ref: 00007FF62A9AB52B
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ConsoleErrorLastMode
            • String ID:
            • API String ID: 953036326-0
            • Opcode ID: c0b9c452233083e8ba344db7b85cdb6942af15e1945070f1535423c6b6b64ca2
            • Instruction ID: 94d3f8809492ca394f9f9afb3040c659c2bf884c8d86473633e67d2a72448a59
            • Opcode Fuzzy Hash: c0b9c452233083e8ba344db7b85cdb6942af15e1945070f1535423c6b6b64ca2
            • Instruction Fuzzy Hash: 1091D722E28A5285FF509F6698502BD2BA2BB04B88F1451B6DF0DD7687DEB8D841C703
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
            • String ID:
            • API String ID: 3936042273-0
            • Opcode ID: 6b86777ed2056881ec85e37c8b53bc7b1ae53672222ced7e915cb6963593c230
            • Instruction ID: 1a6e440c8c908d03fa7884dc6736a70cd3a4fa61009dbfb7ef71e9322e8eeb73
            • Opcode Fuzzy Hash: 6b86777ed2056881ec85e37c8b53bc7b1ae53672222ced7e915cb6963593c230
            • Instruction Fuzzy Hash: D871AF62E24B9589EF04DB66D80836D6361EB84FE0F548671DE6C87BC6DFB8E581C301
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Process32$CreateFirstNextSnapshotToolhelp32_invalid_parameter_noinfo_invalid_parameter_noinfo_noreturn
            • String ID:
            • API String ID: 4260596558-0
            • Opcode ID: be836d38096120c0cd8b151b43bf66e5befb7495844985f2fd7b9594a703298f
            • Instruction ID: e0978295a8a2747d73f63987274e200f1591515b27bc4e86065397ccb68669e9
            • Opcode Fuzzy Hash: be836d38096120c0cd8b151b43bf66e5befb7495844985f2fd7b9594a703298f
            • Instruction Fuzzy Hash: F071B3A2E28A4181EF249B26DC4436D6261FB847E0F444272EA6ED77D6DFBCD540C711
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: Virtual$AllocInfoProtectQuerySystem
            • String ID:
            • API String ID: 3562403962-0
            • Opcode ID: de052ff2da3a860ebe00b2b1188a3b3a24b5d5626fd4b16e4c5629aca21b164b
            • Instruction ID: 8a1ee0b829d8cd0ecbe869c83a1f3b3102e094d7821c2917e92f11cdc83c94ae
            • Opcode Fuzzy Hash: de052ff2da3a860ebe00b2b1188a3b3a24b5d5626fd4b16e4c5629aca21b164b
            • Instruction Fuzzy Hash: 88314A32B24A829EDB20CF32D9547A823A5FB48788F444026EA5DC7B5ADF78E645C701
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CriticalSection$Leave$EnterEvent
            • String ID:
            • API String ID: 3394196147-0
            • Opcode ID: 401af7361c6d18c862ea4f071fb6758f38da9ad67756e4e78bac1cd16ae14490
            • Instruction ID: 0e6b23426017b03c9f1b8a63e72912b27cbba51cf01333b54b5aa969561a384c
            • Opcode Fuzzy Hash: 401af7361c6d18c862ea4f071fb6758f38da9ad67756e4e78bac1cd16ae14490
            • Instruction Fuzzy Hash: 08213E32B14B8197DB88CB2AE9842ADB3A4FB48B84F544035DB5DC7726DF78E4A1C740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
            • String ID:
            • API String ID: 2933794660-0
            • Opcode ID: e05f7aef3380f0f9b3312b24ce1aa7c1f593c40dbd43f636e11a9c4c637e2614
            • Instruction ID: 11e599fa5900fa63eae96cb062fe044dff3813562ac043617e7ddb98f9e1467c
            • Opcode Fuzzy Hash: e05f7aef3380f0f9b3312b24ce1aa7c1f593c40dbd43f636e11a9c4c637e2614
            • Instruction Fuzzy Hash: C1110626F25F068AEF00CF61EC542B833A4FB19758F441A32DA6DC6BA5DFB8D5548381
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ObjectSingleWait$Sleep
            • String ID:
            • API String ID: 2961732021-0
            • Opcode ID: 83ddd93f6670c03bec4b7f128343a3e6a6daf1263786cfff0f95db90d503808b
            • Instruction ID: 8186ab58c6f3c17d889c2523ecad8da8da7200ce0b63538a3757c8c90cb2be7f
            • Opcode Fuzzy Hash: 83ddd93f6670c03bec4b7f128343a3e6a6daf1263786cfff0f95db90d503808b
            • Instruction Fuzzy Hash: E3F0D072F14A4486DB409B7EDC5822432A1EB89B39F554372CA2DC73E5CF78C4858352
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: __except_validate_context_record
            • String ID: csm$csm
            • API String ID: 1467352782-3733052814
            • Opcode ID: f15189d2199330c0f402dae8ecdfa2ca81426a1eff024833c44a8ddbe4b12987
            • Instruction ID: d1e38f3757446e4522295c53715dbdba69302c616ba83c2aa6340e1af2ae638d
            • Opcode Fuzzy Hash: f15189d2199330c0f402dae8ecdfa2ca81426a1eff024833c44a8ddbe4b12987
            • Instruction Fuzzy Hash: 6871AF729186829AEF608F269950679BBA0FB04F84F14C1B5DE4CC7A8BDF7CD591C702
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: EncodePointer
            • String ID: MOC$RCC
            • API String ID: 2118026453-2084237596
            • Opcode ID: ff6c3586205ef54b92cc1381aa76c713ce5aef96bda724e5a14e442f6a8185ef
            • Instruction ID: 4e8f4854d33616a92fd1904fce4721f2071235c136e7244adf0e65af9beb4132
            • Opcode Fuzzy Hash: ff6c3586205ef54b92cc1381aa76c713ce5aef96bda724e5a14e442f6a8185ef
            • Instruction Fuzzy Hash: B161C432D19BC595DB608B16E9403EAB7A0FB85794F148225EB9C83B96CFBCD494CB01
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CloseHandlewsprintf
            • String ID: %s_bin
            • API String ID: 3088109604-2665034546
            • Opcode ID: 6c4a203584ddb297e8f688e5e79792300aa0f32cdc759f08306399289e0b91f9
            • Instruction ID: ea3122cb8f56b46c68f3fc7a9394af49e8d0d06e48544b889bf42c3a647b2569
            • Opcode Fuzzy Hash: 6c4a203584ddb297e8f688e5e79792300aa0f32cdc759f08306399289e0b91f9
            • Instruction Fuzzy Hash: 295181A2F25BA681EF50DB1AC8147B92355EF84B84F458176DA0DCB7C2DE7CD501C712
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: _get_daylight$_invalid_parameter_noinfo
            • String ID: ?
            • API String ID: 1286766494-1684325040
            • Opcode ID: 73dd6a1d9a5ad4992f3991f8c36a8220d63358c9d054768064d2836bf5e58140
            • Instruction ID: bc09e6779a1e81ce590771599b1bc292aa59aa12b19a5dc2f6411dc7d76f067e
            • Opcode Fuzzy Hash: 73dd6a1d9a5ad4992f3991f8c36a8220d63358c9d054768064d2836bf5e58140
            • Instruction Fuzzy Hash: 2C412822F2839245FF208B2799013799652EB807A4F204276EE5DC6AE7DFBCD441CB03
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: CreateFrameInfo__except_validate_context_record
            • String ID: csm
            • API String ID: 2558813199-1018135373
            • Opcode ID: f28967bb51a8388d528e36e8d1b9cbe39d4a27893e421944e70fc0d8e7df8c72
            • Instruction ID: 78764f36e95cd0a3c1b13c41575d065307456c3f8645b983ae81bd662fc34ef4
            • Opcode Fuzzy Hash: f28967bb51a8388d528e36e8d1b9cbe39d4a27893e421944e70fc0d8e7df8c72
            • Instruction Fuzzy Hash: 7F518133A287429ADB209F26E94026E77A4F788B90F105175DB8D87B57DF7CE050C702
            APIs
            • _invalid_parameter_noinfo.LIBCMT ref: 00007FF62A99C256
              • Part of subcall function 00007FF62A99E95C: RtlFreeHeap.NTDLL(?,?,?,00007FF62A9A6862,?,?,?,00007FF62A9A6BDF,?,?,00000000,00007FF62A9A7025,?,?,?,00007FF62A9A6F57), ref: 00007FF62A99E972
              • Part of subcall function 00007FF62A99E95C: GetLastError.KERNEL32(?,?,?,00007FF62A9A6862,?,?,?,00007FF62A9A6BDF,?,?,00000000,00007FF62A9A7025,?,?,?,00007FF62A9A6F57), ref: 00007FF62A99E97C
            • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF62A98E051), ref: 00007FF62A99C274
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
            • String ID: C:\Users\user\Desktop\yIR0BZUT2A.exe
            • API String ID: 3580290477-3557223276
            • Opcode ID: aee35bfe6285ca872dc023e0e85ec8bac6debb86297f70b490d45f268cf6f652
            • Instruction ID: b2c854f4137e7b5bcea0dbd34eca7e3b63a8cfd9dc5ad6609f523050f3dd96fa
            • Opcode Fuzzy Hash: aee35bfe6285ca872dc023e0e85ec8bac6debb86297f70b490d45f268cf6f652
            • Instruction Fuzzy Hash: 9C417C36E28B039DEF54DF26AE510BD23A9AF48780B448075E94DC7B87DEB8E440C302
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ErrorFileLastWrite
            • String ID: U
            • API String ID: 442123175-4171548499
            • Opcode ID: 82c14a47abd65dfd2f18e3d0d2973b2ccc07122a063a358567b3cbc0c6ba3651
            • Instruction ID: 27c79b3c75c498ac6e7b6da2fe36aa990d5c670abb4bc70cf88d57aab39d0a2f
            • Opcode Fuzzy Hash: 82c14a47abd65dfd2f18e3d0d2973b2ccc07122a063a358567b3cbc0c6ba3651
            • Instruction Fuzzy Hash: 6741B432E28A8191DB608F26E8543BA77A1F798794F414032DE4DC7796DF7CD801C742
            APIs
            • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF62A971111), ref: 00007FF62A990340
            • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF62A971111), ref: 00007FF62A990381
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ExceptionFileHeaderRaise
            • String ID: csm
            • API String ID: 2573137834-1018135373
            • Opcode ID: 4e14dd832fb4824443fa8c0aec862097db35212d867c479028c393dfe5930aef
            • Instruction ID: f3ced64e4b1a328bd47a91e2b4d2686dce8760f710fbf34dccd6925d1d1076ee
            • Opcode Fuzzy Hash: 4e14dd832fb4824443fa8c0aec862097db35212d867c479028c393dfe5930aef
            • Instruction Fuzzy Hash: A3116032A28B4182EB208F26F94026977E5FB88B84F588275DE9C8776ADF7CD551C701
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4110534894.00007FF62A971000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62A970000, based on PE: true
            • Associated: 00000000.00000002.4110518816.00007FF62A970000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110561163.00007FF62A9AF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110579544.00007FF62A9C5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110594536.00007FF62A9C8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110611118.00007FF62A9CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4110670974.00007FF62A9D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff62a970000_yIR0BZUT2A.jbxd
            Similarity
            • API ID: ErrorLastRead
            • String ID:
            • API String ID: 4100373531-0
            • Opcode ID: 82ac0250d1ecd3177f83757e94cf9be5bc81ee4aab1a059e0fd8dc4cfb57a079
            • Instruction ID: 859e1bba504e4ce1f80b3e33709c529696d706e54b9d622c5394b0ce5da37999
            • Opcode Fuzzy Hash: 82ac0250d1ecd3177f83757e94cf9be5bc81ee4aab1a059e0fd8dc4cfb57a079
            • Instruction Fuzzy Hash: 1D413AA6F19A418AEF148B16D94422933A0FF48B91F064475CF4EC7B5ADFBCE4A1C311