Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8xfH5IUIWU.exe

Overview

General Information

Sample name:8xfH5IUIWU.exe
renamed because original name is a hash value
Original sample name:40a27408f7e3f7cd6938a4d7dd890d3f86001f9e2ef6090ba6a00e4dfc4ca081.exe
Analysis ID:1502258
MD5:a2c74b5aad6f1e7dc6b11a61c5ae2c46
SHA1:431faa2771a4090ea286cc6d6ecf77e32a4cf340
SHA256:40a27408f7e3f7cd6938a4d7dd890d3f86001f9e2ef6090ba6a00e4dfc4ca081
Tags:exe
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
AI detected suspicious sample
Contain functionality to detect virtual machines
Contains functionality to infect the boot sector
Contains functionality to inject code into remote processes
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Program does not show much activity (idle)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)

Classification

  • System is w10x64
  • 8xfH5IUIWU.exe (PID: 2124 cmdline: "C:\Users\user\Desktop\8xfH5IUIWU.exe" MD5: A2C74B5AAD6F1E7DC6B11A61C5AE2C46)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
Source: 8xfH5IUIWU.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A74423AB FindFirstFileW,FindClose,0_2_00007FF7A74423AB
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A74423B3 FindFirstFileW,FindClose,0_2_00007FF7A74423B3
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A744239E FindFirstFileW,FindClose,0_2_00007FF7A744239E
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A74423C0 FindFirstFileW,FindClose,0_2_00007FF7A74423C0
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 4x nop then dec rdx0_2_00007FF7A74793D0
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A7444DEA InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,GetLastError,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_00007FF7A7444DEA
Source: 8xfH5IUIWU.exeString found in binary or memory: https://enigmaprotector.com/taggant/spv.crl0
Source: 8xfH5IUIWU.exeString found in binary or memory: https://enigmaprotector.com/taggant/user.crl0
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://gcc.gnu.org/bugs/):

System Summary

barindex
Source: 8xfH5IUIWU.exeStatic PE information: section name:
Source: 8xfH5IUIWU.exeStatic PE information: section name:
Source: 8xfH5IUIWU.exeStatic PE information: section name:
Source: 8xfH5IUIWU.exeStatic PE information: section name:
Source: 8xfH5IUIWU.exeStatic PE information: section name:
Source: 8xfH5IUIWU.exeStatic PE information: section name:
Source: 8xfH5IUIWU.exeStatic PE information: section name:
Source: 8xfH5IUIWU.exeStatic PE information: section name:
Source: 8xfH5IUIWU.exeStatic PE information: section name:
Source: 8xfH5IUIWU.exeStatic PE information: section name:
Source: 8xfH5IUIWU.exeStatic PE information: section name:
Source: 8xfH5IUIWU.exeStatic PE information: section name:
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A7503240 NtReadFile,0_2_00007FF7A7503240
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A7503300 NtCreateFile,0_2_00007FF7A7503300
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A7503060 NtCreateSection,0_2_00007FF7A7503060
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A7502F90 NtMapViewOfSection,0_2_00007FF7A7502F90
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A76B9DA8 NtReadFile,0_2_00007FF7A76B9DA8
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A7441E8D: DeviceIoControl,OpenProcess,TerminateProcess,0_2_00007FF7A7441E8D
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A74450D80_2_00007FF7A74450D8
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A7443F9B0_2_00007FF7A7443F9B
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A74487920_2_00007FF7A7448792
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A74416160_2_00007FF7A7441616
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A744A22A0_2_00007FF7A744A22A
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A745124B0_2_00007FF7A745124B
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A74481B20_2_00007FF7A74481B2
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A744202A0_2_00007FF7A744202A
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A7455FB00_2_00007FF7A7455FB0
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A7441E8D0_2_00007FF7A7441E8D
Source: 8xfH5IUIWU.exeStatic PE information: Number of sections : 12 > 10
Source: 8xfH5IUIWU.exeStatic PE information: Section: ZLIB complexity 0.9956341911764706
Source: classification engineClassification label: mal88.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A7443F9B GetEnvironmentVariableW,GetFileAttributesW,GetEnvironmentVariableW,GetFileAttributesW,CreateToolhelp32Snapshot,Process32FirstW,_wcsicmp,Process32NextW,_wcsicmp,0_2_00007FF7A7443F9B
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeMutant created: \Sessions\1\BaseNamedObjects\Mutex object: Unique: 1383544257--904687418. Number: 0
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeFile read: C:\Users\user\Desktop\8xfH5IUIWU.exeJump to behavior
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}\InProcServer32Jump to behavior
Source: 8xfH5IUIWU.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: 8xfH5IUIWU.exeStatic file information: File size 3241472 > 1048576
Source: 8xfH5IUIWU.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x2c1a00

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeUnpacked PE file: 0.2.8xfH5IUIWU.exe.7ff7a7440000.0.unpack Unknown_Section0:EW;Unknown_Section1:EW;Unknown_Section2:EW;Unknown_Section3:EW;Unknown_Section4:EW;Unknown_Section5:W;Unknown_Section6:EW;Unknown_Section7:EW;Unknown_Section8:EW;Unknown_Section9:EW;Unknown_Section10:EW;Unknown_Section11:EW; vs Unknown_Section0:ER;Unknown_Section1:W;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:R;Unknown_Section5:W;Unknown_Section6:W;Unknown_Section7:W;Unknown_Section8:W;Unknown_Section9:R;Unknown_Section10:EW;Unknown_Section11:EW;
Source: 8xfH5IUIWU.exeStatic PE information: real checksum: 0x2fb10 should be: 0x31f037
Source: 8xfH5IUIWU.exeStatic PE information: section name:
Source: 8xfH5IUIWU.exeStatic PE information: section name:
Source: 8xfH5IUIWU.exeStatic PE information: section name:
Source: 8xfH5IUIWU.exeStatic PE information: section name:
Source: 8xfH5IUIWU.exeStatic PE information: section name:
Source: 8xfH5IUIWU.exeStatic PE information: section name:
Source: 8xfH5IUIWU.exeStatic PE information: section name:
Source: 8xfH5IUIWU.exeStatic PE information: section name:
Source: 8xfH5IUIWU.exeStatic PE information: section name:
Source: 8xfH5IUIWU.exeStatic PE information: section name:
Source: 8xfH5IUIWU.exeStatic PE information: section name:
Source: 8xfH5IUIWU.exeStatic PE information: section name:
Source: 8xfH5IUIWU.exeStatic PE information: section name: entropy: 7.992733295273297
Source: 8xfH5IUIWU.exeStatic PE information: section name: entropy: 7.808705679598211
Source: 8xfH5IUIWU.exeStatic PE information: section name: entropy: 7.73306314545859

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: DeviceIoControl,OpenProcess,TerminateProcess, \\.\PhysicalDrive00_2_00007FF7A7441E8D

Boot Survival

barindex
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: DeviceIoControl,OpenProcess,TerminateProcess, \\.\PhysicalDrive00_2_00007FF7A7441E8D
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: QEMU HARDDISK QEMU HARDDISK 0_2_00007FF7A7441E8D
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXE{
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023145757.000001F37B2B6000.00000004.00000020.00020000.00000000.sdmp, 8xfH5IUIWU.exe, 00000000.00000002.2022565810.000001F37A699000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AUTORUNSC.EXE
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X64DBG.EXE
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022565810.000001F37A699000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $FAKEHTTPSERVER.EXE#
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDUMP.EXEG
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022565810.000001F37A699000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $SANDBOXIERPCSS.EXE
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023145757.000001F37B2B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDBG.EXE{
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022565810.000001F37A630000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXEU
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023145757.000001F37B2B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TCPDUMP.EXES
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIESVC.EXE
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: QEMU-GA.EXEQ
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXEI
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023145757.000001F37B2B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: XENSERVICE.EXE)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022565810.000001F37A699000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIECTRL.EXEA\\CU
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022565810.000001F37A699000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $BEHAVIORDUMPER.EXE
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A940000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AUTORUNS.EXENS\PICTURES\
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022565810.000001F37A699000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IMPORTREC.EXEK
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022565810.000001F37A699000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HOOKEXPLORER.EXE+
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SYSANALYZER.EXE
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: XENSERVICE.EXEZ
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023145757.000001F37B2B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE_
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023145757.000001F37B2B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXEM
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXE
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022565810.000001F37A699000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CFF EXPLORER.EXE
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE&
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023145757.000001F37B2B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDBG.EXEW
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022068587.000001F378AC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE$
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: REGMON.EXE
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022103652.000001F378B0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: :FRIDA-WINJECTOR-HELPER-64.EXEUIWU.EXE,
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022565810.000001F37A699000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: NETSNIFFER.EXEO
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022565810.000001F37A699000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .SANDBOXIEDCOMLAUNCH.EXE
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022068587.000001F378AC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDBG.EXE]
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDBG.EXE`
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022565810.000001F37A699000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: "PROC_ANALYZER.EXE
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PETOOLS.EXE
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023145757.000001F37B2B6000.00000004.00000020.00020000.00000000.sdmp, 8xfH5IUIWU.exe, 00000000.00000002.2022068587.000001F378AC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TCPDUMP.EXE
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023145757.000001F37B2B6000.00000004.00000020.00020000.00000000.sdmp, 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SNIFF_HIT.EXE
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023145757.000001F37B2B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: XENSERVICE.EXEC
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022068587.000001F378AC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: XENSERVICE.EXE
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TCPDUMP.EXEZ
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A940000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $APIMONITOR-X86.EXETURES\
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022565810.000001F37A699000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: "PROCESSHACKER.EXECU
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMUSRVC.EXET
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023145757.000001F37B2B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXEW
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023145757.000001F37B2B6000.00000004.00000020.00020000.00000000.sdmp, 8xfH5IUIWU.exe, 00000000.00000002.2022565810.000001F37A630000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXE
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023145757.000001F37B2B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeWindow / User API: threadDelayed 665Jump to behavior
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeAPI coverage: 6.0 %
Source: C:\Users\user\Desktop\8xfH5IUIWU.exe TID: 6588Thread sleep count: 665 > 30Jump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A74423AB FindFirstFileW,FindClose,0_2_00007FF7A74423AB
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A74423B3 FindFirstFileW,FindClose,0_2_00007FF7A74423B3
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A744239E FindFirstFileW,FindClose,0_2_00007FF7A744239E
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A74423C0 FindFirstFileW,FindClose,0_2_00007FF7A74423C0
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 2012 Server Standard without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: basic_string::appendcannot create std::vector larger than max_size()Stop reversing the programReconsider your life choicesAnd go touch some grass\\.\PhysicalDrive0DADY HARDDISKQEMU HARDDISKvector::_M_range_insert
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: #Windows 10 Microsoft Hyper-V Server
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Microsoft Hyper-V Server
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Server Standard without Hyper-V
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Microsoft Hyper-V Server
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2012 Server Datacenter without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 2016 Server Standard without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Server Standard without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: (Windows 2012 R2 Microsoft Hyper-V Server
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 6Windows 2012 R2 Server Standard without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Server Standard without Hyper-V
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Server Datacenter without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Server Datacenter without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37AA6C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <hyper-v guest shutdown servicell
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023145757.000001F37B2B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareuser.exe
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 0Windows 8 Server Standard without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 6Windows 8.1 Essential Server Solutions without Hyper-V
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: vmware
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Server Standard without Hyper-V
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 4Windows 8 Essential Server Solutions without Hyper-V
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2012 Server Datacenter without Hyper-V (full)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Essential Server Solutions without Hyper-V
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmmemctl.exe
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 8Windows 2012 R2 Server Enterprise without Hyper-V (full)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2016 Server Datacenter without Hyper-V (full)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmtools
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 2Windows 8 Server Enterprise without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: "Windows 8 Microsoft Hyper-V Server
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 4Windows 8.1 Server Datacenter without Hyper-V (full)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Server Standard without Hyper-V
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Microsoft Hyper-V Server
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37AA6C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: >hyper-v guest service interfacel!
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: QEMU HARDDISK
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmtoolsd.exe
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2012 Server Enterprise without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Server Enterprise without Hyper-V (full)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Server Datacenter without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Essential Server Solutions without Hyper-V
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Server Standard without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Hyper-V (guest)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Essential Server Solutions without Hyper-V
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Microsoft Hyper-V Server
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Server Datacenter without Hyper-V (full)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022565810.000001F37A68B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #vmware physical disk helper service
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Microsoft Hyper-V Server
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022068587.000001F378AC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareuser.exe-
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: /Windows 2012 R2 Server Standard without Hyper-V
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023145757.000001F37B2B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareuser.exe)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: )Windows 8 Server Standard without Hyper-V
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2016 Server Datacenter without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2016 Server Enterprise without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Hyper-V
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: %Windows 2012 Microsoft Hyper-V Server
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: $Windows 8.1 Microsoft Hyper-V Server
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: ,Windows 2012 Server Standard without Hyper-V
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vboxservice
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmsrvc.exeE
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023145757.000001F37B2B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vboxservice.exe,
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: qemu-ga.exeq
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 10 Server Datacenter without Hyper-V (full)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Microsoft Hyper-V Server
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Server Enterprise without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 8Windows 2012 R2 Server Datacenter without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Essential Server Solutions without Hyper-V
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Essential Server Solutions without Hyper-V
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 8Windows 2012 R2 Server Datacenter without Hyper-V (full)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Server Enterprise without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Server Standard without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Server Enterprise without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 7Windows 2012 Essential Server Solutions without Hyper-V
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37AA6C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Fvmware physical disk helper service
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Server Enterprise without Hyper-V (full)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Server Enterprise without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Server Datacenter without Hyper-V (full)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Server Datacenter without Hyper-V (full)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: %Windows 2016 Microsoft Hyper-V Server
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2012 Server Enterprise without Hyper-V (full)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 10 Server Enterprise without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023145757.000001F37B2B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: qemu-ga
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 7Windows 2016 Essential Server Solutions without Hyper-V
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023145757.000001F37B2B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vboxtray.exe*
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: +Windows 8.1 Server Standard without Hyper-V
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Server Standard without Hyper-V
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 10 Server Datacenter without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 4Windows 8.1 Server Enterprise without Hyper-V (full)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2016 Server Enterprise without Hyper-V (full)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vboxservice.exe
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmusrvc.exet
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 2Windows 8 Server Datacenter without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Server Enterprise without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023145757.000001F37B2B6000.00000004.00000020.00020000.00000000.sdmp, 8xfH5IUIWU.exe, 00000000.00000002.2022068587.000001F378AC5000.00000004.00000020.00020000.00000000.sdmp, 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vboxtray.exe
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Server Datacenter without Hyper-V (full)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: :Windows 2012 R2 Essential Server Solutions without Hyper-V
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Server Standard without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwaretray.exe
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Server Standard without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 10 Essential Server Solutions without Hyper-V
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 8Windows 2012 R2 Server Enterprise without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A940000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Fvmware physical disk helper servicexe\windows\history\
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Server Datacenter without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 10 Server Enterprise without Hyper-V (full)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmscsi.exe}
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Server Enterprise without Hyper-V (full)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Server Enterprise without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Essential Server Solutions without Hyper-V
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: ,Windows 2016 Server Standard without Hyper-V
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Server Standard without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Server Datacenter without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Server Datacenter without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Server Enterprise without Hyper-V (full)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Server Datacenter without Hyper-V (full)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: VBoxService.exe
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Server Standard without Hyper-V
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Virtual MachinesbiedllVBoxService.exe
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: *Windows 10 Server Standard without Hyper-V
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 1Windows 10 Server Standard without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Server Enterprise without Hyper-V (full)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Server Datacenter without Hyper-V (full)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: VMWare
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37AA6C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Bhyper-v powershell direct servicel
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 4Windows 8.1 Server Enterprise without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Server Enterprise without Hyper-V (full)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 2Windows 8.1 Server Standard without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 2Windows 8 Server Datacenter without Hyper-V (full)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 4Windows 8.1 Server Datacenter without Hyper-V (core)
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022068587.000001F378AC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: qemu-ga`j+{
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 2Windows 8 Server Enterprise without Hyper-V (full)
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A74516E5 ??3@YAXPEAX@Z,IsDebuggerPresent,RaiseException,0_2_00007FF7A74516E5
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A7441131 Sleep,Sleep,_amsg_exit,_initterm,_initterm,SetUnhandledExceptionFilter,_malloc_dbg,strlen,_malloc_dbg,_cexit,0_2_00007FF7A7441131
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A7450708 RtlRemoveVectoredExceptionHandler,RtlAddVectoredExceptionHandler,TlsGetValue,TlsSetValue,0_2_00007FF7A7450708
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A74706B0 SetUnhandledExceptionFilter,0_2_00007FF7A74706B0

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A74450D8 ExitProcess,CreateMutexA,GetLastError,CreateProcessA,CreateProcessA,VirtualAllocEx,WriteProcessMemory,VirtualProtect,QueueUserAPC,ResumeThread,0_2_00007FF7A74450D8
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeNtSetInformationThread: Indirect: 0x7FF7A74B6B0DJump to behavior
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeNtProtectVirtualMemory: Indirect: 0x7FF7A7504AABJump to behavior
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeNtProtectVirtualMemory: Indirect: 0x7FF7A7F08EBAJump to behavior
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023056255.000001F37AE80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: progman service
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023056255.000001F37AE80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: program manager Chromeer
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9E4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: shell_traywnd
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A745BAD0 cpuid 0_2_00007FF7A745BAD0
Source: C:\Users\user\Desktop\8xfH5IUIWU.exeCode function: 0_2_00007FF7A7451870 GetSystemTimeAsFileTime,0_2_00007FF7A7451870
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022565810.000001F37A699000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: procdump.exe
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tcpview.exe
Source: 8xfH5IUIWU.exe, 00000000.00000002.2023145757.000001F37B2B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: wireshark.exe
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: spideragent.exe
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: fsaua.exe
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ollydbg.exe
Source: 8xfH5IUIWU.exe, 00000000.00000002.2022909989.000001F37A9A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: regmon.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
Bootkit
11
Process Injection
33
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
11
Process Injection
LSASS Memory441
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
Security Account Manager33
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDS3
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Bootkit
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
Software Packing
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSync23
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
8xfH5IUIWU.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://enigmaprotector.com/taggant/spv.crl00%Avira URL Cloudsafe
https://enigmaprotector.com/taggant/user.crl00%Avira URL Cloudsafe
https://gcc.gnu.org/bugs/):0%Avira URL Cloudsafe
https://enigmaprotector.com/taggant/user.crl00%VirustotalBrowse
https://gcc.gnu.org/bugs/):0%VirustotalBrowse
https://enigmaprotector.com/taggant/spv.crl00%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://gcc.gnu.org/bugs/):8xfH5IUIWU.exe, 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://enigmaprotector.com/taggant/spv.crl08xfH5IUIWU.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://enigmaprotector.com/taggant/user.crl08xfH5IUIWU.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1502258
Start date and time:2024-08-31 21:09:08 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 0s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:8xfH5IUIWU.exe
renamed because original name is a hash value
Original Sample Name:40a27408f7e3f7cd6938a4d7dd890d3f86001f9e2ef6090ba6a00e4dfc4ca081.exe
Detection:MAL
Classification:mal88.evad.winEXE@1/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
Entropy (8bit):7.9610912074285
TrID:
  • Win64 Executable (generic) (12005/4) 74.80%
  • Generic Win/DOS Executable (2004/3) 12.49%
  • DOS Executable Generic (2002/1) 12.47%
  • VXD Driver (31/22) 0.19%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
File name:8xfH5IUIWU.exe
File size:3'241'472 bytes
MD5:a2c74b5aad6f1e7dc6b11a61c5ae2c46
SHA1:431faa2771a4090ea286cc6d6ecf77e32a4cf340
SHA256:40a27408f7e3f7cd6938a4d7dd890d3f86001f9e2ef6090ba6a00e4dfc4ca081
SHA512:41c0857b61bc765b5ac2c96b1909e29703afb8a11225e822747a52349336c9a4788d1d8867f6a45308f327057f59bf1044c8ecc2c58220d75e2e94d083862888
SSDEEP:49152:CLaedx9/RYdZf/k4x+Nx0HLjCKkpC2bRw5To62pUkGTtfTzUnP6:sMHkPxavC9L2hoRfGTt+
TLSH:2FE53343FA4D22C8E292687154A5E122DF9725813FFB13419B1F579C31CB8B68B9F34A
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................(.......................@............................. ............`...@...... ........ ...... .....
Icon Hash:00928e8e8686b000
Entrypoint:0x140e6d1ec
Entrypoint Section:
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE
Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:c1fbf380722f62e9d13f77bc10915a89
Instruction
jmp 00007F5674BA3B6Ah
add byte ptr [ebp+eax+00h], bl
add byte ptr [eax], al
add byte ptr [eax], al
push eax
push ecx
push edx
push ebx
push ebp
push esi
push edi
inc ecx
push eax
inc ecx
push ecx
inc ecx
push edx
inc ecx
push ebx
inc ecx
push esp
inc ecx
push ebp
inc ecx
push esi
inc ecx
push edi
dec eax
pushfd
dec eax
sub esp, 00000008h
stmxcsr dword ptr [esp]
call 00007F5674BA3B65h
pop ebp
dec eax
sub ebp, 00000033h
dec eax
sub ebp, 00E6D1ECh
dec eax
sub esp, 00000020h
jmp 00007F5674BA3B69h
or dword ptr [edi-49h], eax
push esi
dec eax
mov eax, 00E6D1ECh
dec eax
add eax, ebp
dec eax
add eax, 00000084h
dec eax
mov ecx, 0000060Bh
dec eax
mov edx, 71FA03FFh
xor byte ptr [eax], dl
dec eax
inc eax
dec eax
dec ecx
jne 00007F5674BA3B58h
jmp 00007F5674BA3B69h
int 74h
jp 00007F5674BA3BA7h
mov bh, 76h
push ss
je 00007F5674BA3BD8h
ret
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0xbb30600xd3b
IMAGE_DIRECTORY_ENTRY_IMPORT0xbb3d9c0x2e8
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0xbb49a00x26ed4
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0xbb30400x10
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0xbb30000x28
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
0x10000x210000xee001534b42818ef35a35dca6f5687d75689False0.9956341911764706data7.992733295273297IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x220000x20000x200696a1134325787785c20aabbf456c4b5False0.48046875data4.017144721115484IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x240000x40000x1600a83f30c0be9427fb3243383d63ece46bFalse0.9540127840909091OpenPGP Public Key7.808705679598211IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x280000x40000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x2c0000x30000xa002705e0e58e752dd8f087a2f2efb9e435False0.96015625data7.73306314545859IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x2f0000x10000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x300000x20000x2005b462360c7913045d18e88c9b4aff987False0.19140625data1.5569017803969105IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x320000x10000x2006033cfe306fbae60ba7a285973e647e4False0.0859375data0.6015377733147627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x330000x10000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x340000x10000x4006b3fbcf4932b652979cb995f1b8ea760False0.79296875data6.55272403501495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x350000xb7b0000x44000c4f7b4c467b0846ae063321303766699unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0xbb00000x2c20000x2c1a00ba30b3ee32f9adb945b3187634115fa5unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
DLLImport
kernel32.dllGetModuleHandleA, GetProcAddress, ExitProcess, LoadLibraryA
user32.dllMessageBoxA
advapi32.dllRegCloseKey
oleaut32.dllSysFreeString
gdi32.dllCreateFontA
shell32.dllShellExecuteA
version.dllGetFileVersionInfoA
ole32.dllOleInitialize
msvcrt.dll__C_specific_handler
WININET.dllInternetCloseHandle
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:15:09:56
Start date:31/08/2024
Path:C:\Users\user\Desktop\8xfH5IUIWU.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\8xfH5IUIWU.exe"
Imagebase:0x7ff7a7440000
File size:3'241'472 bytes
MD5 hash:A2C74B5AAD6F1E7DC6B11A61C5AE2C46
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:3.2%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:46.5%
    Total number of Nodes:460
    Total number of Limit Nodes:6
    execution_graph 13389 7ff7a74450d8 13390 7ff7a74450f0 13389->13390 13391 7ff7a7445101 13390->13391 13392 7ff7a74450f6 ExitProcess 13390->13392 13427 7ff7a7441e8d 13391->13427 13394 7ff7a7445106 13441 7ff7a7441d95 13394->13441 13401 7ff7a7445135 13402 7ff7a744b9af 41 API calls 13401->13402 13411 7ff7a7445157 CreateMutexA GetLastError 13402->13411 13403 7ff7a744b9af 41 API calls 13403->13401 13405 7ff7a74451ed 13407 7ff7a744b9af 41 API calls 13405->13407 13406 7ff7a74451df 13408 7ff7a744520b 13407->13408 13409 7ff7a744b9af 41 API calls 13408->13409 13410 7ff7a744521a 13409->13410 13509 7ff7a7444dea 13410->13509 13411->13405 13411->13406 13414 7ff7a744b9af 41 API calls 13415 7ff7a74452ef 13414->13415 13416 7ff7a744b9af 41 API calls 13415->13416 13419 7ff7a74452fe 13416->13419 13418 7ff7a74453af 13420 7ff7a744b9af 41 API calls 13418->13420 13530 7ff7a7441424 strlen 13419->13530 13421 7ff7a74453f1 13420->13421 13422 7ff7a7445401 13421->13422 13423 7ff7a744b9af 41 API calls 13421->13423 13424 7ff7a744b9af 41 API calls 13422->13424 13423->13422 13426 7ff7a7445452 6 API calls 13424->13426 13426->13406 13428 7ff7a7441ec7 13427->13428 13429 7ff7a7441ed0 DeviceIoControl 13428->13429 13440 7ff7a7441f3a 13428->13440 13430 7ff7a7441f43 13429->13430 13429->13440 13431 7ff7a7441424 19 API calls 13430->13431 13432 7ff7a7441f5d 13431->13432 13534 7ff7a7458080 strlen 13432->13534 13434 7ff7a7441f6f 13435 7ff7a7441f74 13434->13435 13436 7ff7a7458080 strlen 13434->13436 13437 7ff7a7441f7a OpenProcess 13435->13437 13435->13440 13436->13435 13438 7ff7a7441fa7 13437->13438 13439 7ff7a7441fb4 TerminateProcess 13438->13439 13438->13440 13439->13440 13440->13394 13442 7ff7a744b9af 41 API calls 13441->13442 13443 7ff7a7441da8 13442->13443 13444 7ff7a744b9af 41 API calls 13443->13444 13448 7ff7a7441db7 RegOpenKeyExA 13444->13448 13446 7ff7a7441e72 RegCloseKey exit 13447 7ff7a7441e85 13446->13447 13449 7ff7a7441616 13447->13449 13448->13446 13448->13447 13450 7ff7a744b9af 41 API calls 13449->13450 13451 7ff7a7441638 13450->13451 13452 7ff7a744b9af 41 API calls 13451->13452 13456 7ff7a7441647 13452->13456 13453 7ff7a744b9af 41 API calls 13454 7ff7a74416f2 13453->13454 13455 7ff7a744b9af 41 API calls 13454->13455 13460 7ff7a7441701 13455->13460 13456->13453 13457 7ff7a744b9af 41 API calls 13458 7ff7a74417b3 13457->13458 13459 7ff7a744b9af 41 API calls 13458->13459 13464 7ff7a74417c2 13459->13464 13460->13457 13461 7ff7a744b9af 41 API calls 13462 7ff7a744187b 13461->13462 13463 7ff7a744b9af 41 API calls 13462->13463 13468 7ff7a744188a 13463->13468 13464->13461 13465 7ff7a744b9af 41 API calls 13466 7ff7a7441930 13465->13466 13467 7ff7a744b9af 41 API calls 13466->13467 13473 7ff7a744193f 13467->13473 13468->13465 13469 7ff7a744b9af 41 API calls 13470 7ff7a74419f9 13469->13470 13471 7ff7a744b9af 41 API calls 13470->13471 13472 7ff7a7441a08 13471->13472 13474 7ff7a744b9af 41 API calls 13472->13474 13473->13469 13475 7ff7a7441ac2 13474->13475 13476 7ff7a744b9af 41 API calls 13475->13476 13480 7ff7a7441ad1 13476->13480 13477 7ff7a744b9af 41 API calls 13478 7ff7a7441b7c 13477->13478 13479 7ff7a744b9af 41 API calls 13478->13479 13484 7ff7a7441b8b 13479->13484 13480->13477 13481 7ff7a744b9af 41 API calls 13482 7ff7a7441c5e 13481->13482 13483 7ff7a744b9af 41 API calls 13482->13483 13488 7ff7a7441c6d 13483->13488 13484->13481 13485 7ff7a7441d19 VirtualProtect 13486 7ff7a7441d3f VirtualProtect 13485->13486 13487 7ff7a7441d81 13485->13487 13486->13488 13490 7ff7a744b9af 13487->13490 13488->13485 13488->13487 13489 7ff7a7441d62 FlushInstructionCache 13488->13489 13489->13488 13491 7ff7a744b9c7 13490->13491 13492 7ff7a744ba12 13490->13492 13536 7ff7a7450a63 13491->13536 13572 7ff7a74504de GetLastError 13492->13572 13495 7ff7a744ba1d 13497 7ff7a744ba49 13495->13497 13498 7ff7a744ba25 _calloc_dbg 13495->13498 13501 7ff7a744ba44 13497->13501 13504 7ff7a744ba5f _realloc_dbg 13497->13504 13500 7ff7a744ba3f abort 13498->13500 13498->13501 13500->13501 13503 7ff7a7445123 13501->13503 13505 7ff7a744babb _malloc_dbg 13501->13505 13506 7ff7a744bad6 _malloc_dbg 13501->13506 13576 7ff7a745053d GetLastError 13501->13576 13503->13401 13503->13403 13504->13500 13504->13501 13505->13500 13505->13503 13506->13500 13506->13503 13510 7ff7a7444e00 13509->13510 13511 7ff7a744b9af 41 API calls 13510->13511 13512 7ff7a7444e15 13511->13512 13513 7ff7a744b9af 41 API calls 13512->13513 13517 7ff7a7444e24 InternetOpenW 13513->13517 13515 7ff7a7444f47 13515->13406 13515->13414 13516 7ff7a7444f00 InternetOpenUrlW 13518 7ff7a7444f3c InternetCloseHandle 13516->13518 13528 7ff7a7444f29 13516->13528 13517->13515 13517->13516 13518->13515 13519 7ff7a7444faa InternetReadFile 13520 7ff7a7444fc7 13519->13520 13519->13528 13521 7ff7a74450a2 GetLastError 13520->13521 13522 7ff7a7445088 InternetCloseHandle InternetCloseHandle 13520->13522 13521->13522 13523 7ff7a74450ac InternetCloseHandle InternetCloseHandle 13521->13523 13522->13515 13523->13515 13524 7ff7a745b120 memcpy 13524->13528 13526 7ff7a745b160 memcpy 13526->13528 13528->13519 13528->13521 13528->13524 13528->13526 13657 7ff7a745b120 13528->13657 13660 7ff7a7461140 13528->13660 13673 7ff7a7460090 13528->13673 13531 7ff7a744144f 13530->13531 13533 7ff7a744145f 13530->13533 13735 7ff7a745d3f0 13531->13735 13533->13418 13535 7ff7a74580c0 13534->13535 13535->13434 13537 7ff7a744b9da 13536->13537 13538 7ff7a7450a81 13536->13538 13554 7ff7a744f718 13537->13554 13538->13537 13539 7ff7a744f718 6 API calls 13538->13539 13540 7ff7a7450aa0 13539->13540 13541 7ff7a7450aa8 13540->13541 13542 7ff7a7450af0 13540->13542 13584 7ff7a7450a4c 13541->13584 13547 7ff7a7450b06 fprintf 13542->13547 13553 7ff7a7450ae0 13542->13553 13545 7ff7a744f76f 4 API calls 13548 7ff7a7450b25 13545->13548 13546 7ff7a7450a4c 26 API calls 13549 7ff7a7450ace 13546->13549 13547->13553 13587 7ff7a744fc12 13548->13587 13552 7ff7a7450a4c 26 API calls 13549->13552 13552->13553 13553->13545 13555 7ff7a744f61c 13554->13555 13650 7ff7a744f609 13555->13650 13557 7ff7a744f62d 13559 7ff7a744f68d 13557->13559 13560 7ff7a744f664 GetCurrentThreadId 13557->13560 13561 7ff7a744b9e9 13557->13561 13564 7ff7a744f646 13557->13564 13558 7ff7a744f650 GetCurrentThreadId 13558->13561 13562 7ff7a744f694 CreateEventA 13559->13562 13559->13564 13560->13559 13560->13561 13565 7ff7a744f76f 13561->13565 13563 7ff7a744f6ac GetLastError 13562->13563 13562->13564 13563->13561 13564->13558 13564->13561 13566 7ff7a744f609 2 API calls 13565->13566 13567 7ff7a744f77a 13566->13567 13568 7ff7a744f7ab 13567->13568 13569 7ff7a744f797 GetCurrentThreadId 13567->13569 13571 7ff7a744f7b2 13567->13571 13570 7ff7a744f7cb SetEvent 13568->13570 13568->13571 13569->13568 13569->13571 13570->13571 13571->13492 13573 7ff7a744febf 26 API calls 13572->13573 13574 7ff7a74504f9 13573->13574 13575 7ff7a7450527 SetLastError 13574->13575 13575->13495 13577 7ff7a744febf 26 API calls 13576->13577 13578 7ff7a7450560 13577->13578 13579 7ff7a74505b7 13578->13579 13580 7ff7a7450574 _realloc_dbg 13578->13580 13582 7ff7a7450602 SetLastError 13579->13582 13581 7ff7a7450594 _realloc_dbg 13580->13581 13583 7ff7a74505a8 13580->13583 13581->13579 13581->13583 13582->13583 13583->13501 13596 7ff7a744febf 13584->13596 13588 7ff7a744fca0 13587->13588 13589 7ff7a744fc25 13587->13589 13588->13537 13590 7ff7a744fc83 13589->13590 13592 7ff7a744fc55 13589->13592 13591 7ff7a744fc8e fprintf 13590->13591 13591->13588 13592->13588 13646 7ff7a744f840 13592->13646 13610 7ff7a744fe28 13596->13610 13599 7ff7a744fee3 13618 7ff7a744fcd5 13599->13618 13602 7ff7a744ff02 GetCurrentThreadId CreateEventA 13631 7ff7a744fd81 13602->13631 13606 7ff7a744ff61 DuplicateHandle 13607 7ff7a744ff94 GetThreadPriority TlsSetValue 13606->13607 13608 7ff7a744ff8f abort 13606->13608 13607->13608 13609 7ff7a744ffcb 13607->13609 13608->13607 13609->13546 13611 7ff7a744fea8 TlsGetValue 13610->13611 13612 7ff7a744fe38 13610->13612 13611->13599 13611->13609 13613 7ff7a744f718 6 API calls 13612->13613 13614 7ff7a744fe56 13613->13614 13617 7ff7a744fe67 13614->13617 13637 7ff7a744fbf3 TlsAlloc 13614->13637 13616 7ff7a744f76f 4 API calls 13616->13611 13617->13616 13619 7ff7a744f718 6 API calls 13618->13619 13620 7ff7a744fceb 13619->13620 13621 7ff7a744fcf7 _calloc_dbg 13620->13621 13622 7ff7a744fd31 13620->13622 13623 7ff7a744fd0e 13621->13623 13629 7ff7a744fd1b 13621->13629 13624 7ff7a744faca 2 API calls 13622->13624 13640 7ff7a744faca 13623->13640 13624->13629 13626 7ff7a744f76f 4 API calls 13628 7ff7a744fd76 13626->13628 13628->13602 13628->13609 13629->13626 13630 7ff7a744fd27 ??3@YAXPEAX 13630->13629 13632 7ff7a744fe16 GetCurrentThread 13631->13632 13633 7ff7a744fd97 13631->13633 13632->13606 13633->13632 13634 7ff7a744fda0 GetCurrentThreadId _ultoa 13633->13634 13635 7ff7a744fde4 OutputDebugStringA abort 13634->13635 13635->13632 13638 7ff7a744fc0d 13637->13638 13639 7ff7a744fc07 abort 13637->13639 13638->13617 13639->13638 13641 7ff7a744fae6 13640->13641 13643 7ff7a744fade 13640->13643 13642 7ff7a744fafe _malloc_dbg 13641->13642 13644 7ff7a744fb0d 13641->13644 13642->13643 13642->13644 13643->13629 13643->13630 13644->13643 13645 7ff7a744fbab memcpy 13644->13645 13645->13643 13647 7ff7a744f856 13646->13647 13648 7ff7a744f872 ??3@YAXPEAX 13646->13648 13649 7ff7a744f865 ??3@YAXPEAX 13647->13649 13648->13588 13649->13648 13651 7ff7a744f61b 13650->13651 13652 7ff7a744f5a0 _malloc_dbg 13650->13652 13651->13557 13654 7ff7a744f5ff 13652->13654 13655 7ff7a744f5be 13652->13655 13654->13557 13655->13654 13656 7ff7a744f5f7 ??3@YAXPEAX 13655->13656 13656->13654 13658 7ff7a745b147 13657->13658 13659 7ff7a745b134 memcpy 13657->13659 13658->13519 13659->13658 13679 7ff7a7460150 _malloc_dbg 13660->13679 13662 7ff7a7461153 13685 7ff7a7460520 13662->13685 13664 7ff7a7461177 13695 7ff7a744b6e8 RtlCaptureContext RtlUnwindEx abort 13664->13695 13674 7ff7a74600a4 _malloc_dbg 13673->13674 13675 7ff7a74600ed 13674->13675 13676 7ff7a74600b1 13674->13676 13675->13528 13676->13674 13677 7ff7a7460150 15 API calls 13676->13677 13678 7ff7a7460520 6 API calls 13676->13678 13677->13676 13678->13676 13680 7ff7a746016d 13679->13680 13681 7ff7a7460182 13679->13681 13696 7ff7a74564a0 13680->13696 13681->13662 13686 7ff7a7460539 13685->13686 13727 7ff7a744b6a8 RaiseException 13686->13727 13688 7ff7a7460562 13689 7ff7a74601a0 2 API calls 13688->13689 13690 7ff7a746056a 13689->13690 13691 7ff7a745fdb0 2 API calls 13690->13691 13692 7ff7a746056f 13691->13692 13728 7ff7a744b4c5 13692->13728 13705 7ff7a74568e0 13696->13705 13701 7ff7a745fdb0 13702 7ff7a745fdb9 13701->13702 13719 7ff7a7455ec0 13702->13719 13706 7ff7a744f718 6 API calls 13705->13706 13707 7ff7a74568e9 13706->13707 13708 7ff7a7460150 15 API calls 13707->13708 13711 7ff7a74564b8 13707->13711 13709 7ff7a74568f7 13708->13709 13710 7ff7a7460520 6 API calls 13709->13710 13710->13711 13712 7ff7a7456920 13711->13712 13713 7ff7a744f76f 4 API calls 13712->13713 13714 7ff7a7456929 13713->13714 13715 7ff7a7460150 15 API calls 13714->13715 13718 7ff7a7456529 13714->13718 13716 7ff7a7456937 13715->13716 13717 7ff7a7460520 6 API calls 13716->13717 13717->13718 13718->13681 13718->13701 13720 7ff7a7455ec6 abort 13719->13720 13723 7ff7a74601a0 13720->13723 13724 7ff7a74601ad 13723->13724 13725 7ff7a7455ed3 abort 13724->13725 13726 7ff7a745fdb0 2 API calls 13724->13726 13726->13725 13727->13688 13729 7ff7a744b509 13728->13729 13730 7ff7a744b4f5 13728->13730 13729->13730 13732 7ff7a744b645 abort 13729->13732 13733 7ff7a744b510 13729->13733 13734 7ff7a744b5d2 RaiseException 13729->13734 13730->13664 13731 7ff7a744b686 RtlUnwindEx 13731->13732 13732->13733 13733->13730 13733->13731 13733->13732 13734->13732 13736 7ff7a745d406 13735->13736 13737 7ff7a745d412 13735->13737 13738 7ff7a7461140 18 API calls 13736->13738 13738->13737 13739 7ff7a744e00d 13743 7ff7a74f410e 13739->13743 13740 7ff7a74f4451 13742 7ff7a74f455b 13740->13742 13762 7ff7a7507280 13740->13762 13743->13740 13753 7ff7a7503300 13743->13753 13746 7ff7a74f433a 13756 7ff7a7503060 13746->13756 13747 7ff7a74f44be 13747->13742 13749 7ff7a7507280 NtReadFile 13747->13749 13749->13747 13750 7ff7a74f43f4 13750->13740 13751 7ff7a74f437d 13751->13750 13759 7ff7a7502f90 13751->13759 13754 7ff7a7503376 NtCreateFile 13753->13754 13755 7ff7a74f4332 13753->13755 13754->13755 13755->13740 13755->13746 13757 7ff7a75030b5 NtCreateSection 13756->13757 13758 7ff7a7503081 13756->13758 13757->13758 13758->13751 13760 7ff7a7503002 NtMapViewOfSection 13759->13760 13761 7ff7a7502fb2 13759->13761 13760->13761 13761->13750 13763 7ff7a75072b2 13762->13763 13770 7ff7a75072c2 13762->13770 13764 7ff7a7507311 13763->13764 13765 7ff7a7507643 13763->13765 13763->13770 13773 7ff7a7503240 13764->13773 13767 7ff7a7503240 NtReadFile 13765->13767 13769 7ff7a750774b 13765->13769 13767->13769 13768 7ff7a7503240 NtReadFile 13768->13770 13769->13768 13769->13770 13770->13747 13771 7ff7a7503240 NtReadFile 13772 7ff7a750742e 13771->13772 13772->13770 13772->13771 13774 7ff7a7503262 13773->13774 13775 7ff7a75032ab NtReadFile 13773->13775 13774->13772 13775->13774 13776 7ff7a7443f9b 13869 7ff7a74413b0 13776->13869 13778 7ff7a7443faf 13779 7ff7a744b9af 41 API calls 13778->13779 13780 7ff7a7443fc7 13779->13780 13781 7ff7a744b9af 41 API calls 13780->13781 13783 7ff7a7443fd6 13781->13783 13782 7ff7a74413b0 18 API calls 13784 7ff7a74440b7 13782->13784 13783->13782 13785 7ff7a744b9af 41 API calls 13784->13785 13786 7ff7a74440cf 13785->13786 13787 7ff7a744b9af 41 API calls 13786->13787 13789 7ff7a74440de 13787->13789 13788 7ff7a74413b0 18 API calls 13790 7ff7a74441bf 13788->13790 13789->13788 13791 7ff7a744b9af 41 API calls 13790->13791 13792 7ff7a74441d7 13791->13792 13793 7ff7a744b9af 41 API calls 13792->13793 13794 7ff7a74441e6 13793->13794 13795 7ff7a74413b0 18 API calls 13794->13795 13796 7ff7a74442a5 13795->13796 13797 7ff7a744b9af 41 API calls 13796->13797 13798 7ff7a74442bd 13797->13798 13799 7ff7a744b9af 41 API calls 13798->13799 13801 7ff7a74442cc 13799->13801 13800 7ff7a74413b0 18 API calls 13802 7ff7a74443ac 13800->13802 13801->13800 13803 7ff7a744b9af 41 API calls 13802->13803 13804 7ff7a74443c4 13803->13804 13805 7ff7a744b9af 41 API calls 13804->13805 13807 7ff7a74443d3 13805->13807 13806 7ff7a74413b0 18 API calls 13808 7ff7a74444b3 13806->13808 13807->13806 13809 7ff7a744b9af 41 API calls 13808->13809 13810 7ff7a74444cb 13809->13810 13811 7ff7a744b9af 41 API calls 13810->13811 13813 7ff7a74444da 13811->13813 13812 7ff7a74413b0 18 API calls 13814 7ff7a74445bb 13812->13814 13813->13812 13815 7ff7a744b9af 41 API calls 13814->13815 13816 7ff7a74445d3 13815->13816 13817 7ff7a744b9af 41 API calls 13816->13817 13818 7ff7a74445e2 13817->13818 13819 7ff7a74413b0 18 API calls 13818->13819 13820 7ff7a74446b5 13819->13820 13821 7ff7a744b9af 41 API calls 13820->13821 13822 7ff7a74446cd 13821->13822 13823 7ff7a744b9af 41 API calls 13822->13823 13824 7ff7a74446dc 13823->13824 13825 7ff7a74413b0 18 API calls 13824->13825 13826 7ff7a74447bd 13825->13826 13873 7ff7a74414c0 13826->13873 13828 7ff7a74447f3 13829 7ff7a744b9af 41 API calls 13828->13829 13830 7ff7a744482a 13829->13830 13831 7ff7a744b9af 41 API calls 13830->13831 13833 7ff7a7444839 GetEnvironmentVariableW 13831->13833 13834 7ff7a7444c88 CreateToolhelp32Snapshot 13833->13834 13835 7ff7a7444931 13833->13835 13837 7ff7a7444ca1 Process32FirstW 13834->13837 13868 7ff7a7444c65 13834->13868 13836 7ff7a744b9af 41 API calls 13835->13836 13838 7ff7a744493d 13836->13838 13839 7ff7a7444ccc 13837->13839 13837->13868 13840 7ff7a744b9af 41 API calls 13838->13840 13841 7ff7a7444cea Process32NextW 13839->13841 13842 7ff7a7444d04 _wcsicmp 13839->13842 13843 7ff7a744494c 13840->13843 13841->13839 13841->13868 13842->13839 13842->13868 13844 7ff7a74413b0 18 API calls 13843->13844 13845 7ff7a7444a09 13844->13845 13879 7ff7a745e640 wcslen 13845->13879 13847 7ff7a7444a14 13848 7ff7a7444a2c GetFileAttributesW 13847->13848 13849 7ff7a7444c7b 13848->13849 13850 7ff7a7444a3f 13848->13850 13851 7ff7a744b9af 41 API calls 13850->13851 13852 7ff7a7444a4b 13851->13852 13853 7ff7a744b9af 41 API calls 13852->13853 13857 7ff7a7444a5a GetEnvironmentVariableW 13853->13857 13855 7ff7a7444b2e 13858 7ff7a744b9af 41 API calls 13855->13858 13856 7ff7a7444c6c 13856->13834 13857->13855 13857->13856 13859 7ff7a7444b3a 13858->13859 13860 7ff7a744b9af 41 API calls 13859->13860 13863 7ff7a7444b49 13860->13863 13862 7ff7a74413b0 18 API calls 13864 7ff7a7444c30 13862->13864 13863->13862 13865 7ff7a745e640 19 API calls 13864->13865 13866 7ff7a7444c3b 13865->13866 13867 7ff7a7444c53 GetFileAttributesW 13866->13867 13867->13856 13867->13868 13868->13849 13870 7ff7a74413cc 13869->13870 13872 7ff7a74413f4 13870->13872 13884 7ff7a745f0c0 13870->13884 13872->13778 13874 7ff7a74414f9 13873->13874 13875 7ff7a7441505 13873->13875 13876 7ff7a7461140 18 API calls 13874->13876 13877 7ff7a7460090 16 API calls 13875->13877 13878 7ff7a7441512 13875->13878 13876->13875 13877->13878 13878->13828 13888 7ff7a74588b0 13879->13888 13881 7ff7a745e66d 13883 7ff7a745f000 13881->13883 13892 7ff7a745f120 13881->13892 13883->13847 13885 7ff7a745f0d6 13884->13885 13886 7ff7a745f0e2 13884->13886 13887 7ff7a7461140 18 API calls 13885->13887 13887->13886 13889 7ff7a74588d0 13888->13889 13891 7ff7a74588d5 13888->13891 13890 7ff7a7461140 18 API calls 13889->13890 13890->13891 13891->13881 13893 7ff7a745f160 13892->13893 13894 7ff7a745f0c0 18 API calls 13893->13894 13895 7ff7a745f170 13894->13895 13895->13883 13896 7ff7a74412ff 13897 7ff7a7441305 13896->13897 13898 7ff7a7441335 13896->13898 13901 7ff7a7441131 13897->13901 13902 7ff7a744115a 13901->13902 13903 7ff7a7441172 13902->13903 13904 7ff7a7441169 Sleep 13902->13904 13905 7ff7a7441188 _amsg_exit 13903->13905 13906 7ff7a7441194 13903->13906 13904->13902 13907 7ff7a74411b5 13905->13907 13906->13907 13908 7ff7a744119a _initterm 13906->13908 13909 7ff7a74411de 13907->13909 13910 7ff7a74411c5 _initterm 13907->13910 13908->13907 13922 7ff7a744ab3b 13909->13922 13910->13909 13913 7ff7a744122e 13914 7ff7a7441233 _malloc_dbg 13913->13914 13915 7ff7a7441253 13914->13915 13916 7ff7a7441258 strlen _malloc_dbg 13915->13916 13917 7ff7a7441283 13915->13917 13916->13915 13933 7ff7a7461520 13917->13933 13923 7ff7a7441208 SetUnhandledExceptionFilter 13922->13923 13925 7ff7a744ab59 13922->13925 13923->13913 13924 7ff7a744ad5f 13924->13923 13927 7ff7a744ad87 VirtualProtect 13924->13927 13925->13924 13926 7ff7a744abd0 13925->13926 13930 7ff7a744ac0f 13925->13930 13926->13924 13928 7ff7a744abee 13926->13928 13927->13924 13928->13926 13939 7ff7a744a9f4 13928->13939 13930->13924 13931 7ff7a744ac7a 13930->13931 13932 7ff7a744a9f4 3 API calls 13931->13932 13932->13930 13934 7ff7a7461531 13933->13934 13936 7ff7a746154f _ismbblead 13934->13936 13938 7ff7a746153e GetStartupInfoA 13934->13938 13936->13934 13937 7ff7a74615b4 13938->13937 13940 7ff7a744aa1a 13939->13940 13941 7ff7a744aa7f VirtualQuery 13940->13941 13945 7ff7a744ab23 13940->13945 13942 7ff7a744aaa8 13941->13942 13943 7ff7a744aad7 VirtualProtect 13942->13943 13942->13945 13944 7ff7a744ab0f GetLastError 13943->13944 13943->13945 13944->13945 13945->13928

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 7ff7a74450d8-7ff7a74450f4 call 7ff7a74432f9 3 7ff7a7445101-7ff7a7445129 call 7ff7a7441e8d call 7ff7a7441d95 call 7ff7a7441616 call 7ff7a744b9af 0->3 4 7ff7a74450f6-7ff7a74450fb ExitProcess 0->4 13 7ff7a744512b-7ff7a744514c call 7ff7a744b9af 3->13 14 7ff7a744514f-7ff7a744515f call 7ff7a744b9af 3->14 13->14 19 7ff7a74451be-7ff7a74451dd CreateMutexA GetLastError 14->19 20 7ff7a7445161-7ff7a7445164 14->20 21 7ff7a74451ed-7ff7a7445221 call 7ff7a744b9af * 2 19->21 22 7ff7a74451df-7ff7a74451e8 call 7ff7a74704e8 19->22 23 7ff7a7445167-7ff7a7445174 20->23 41 7ff7a744524d-7ff7a7445251 21->41 42 7ff7a7445223-7ff7a7445249 21->42 33 7ff7a74455b3-7ff7a74455c8 22->33 26 7ff7a744517a-7ff7a7445181 23->26 27 7ff7a7445176-7ff7a7445178 23->27 31 7ff7a7445188-7ff7a744518b 26->31 32 7ff7a7445183-7ff7a7445186 26->32 30 7ff7a74451ac-7ff7a74451b0 27->30 30->23 35 7ff7a744518d-7ff7a7445190 31->35 36 7ff7a7445192-7ff7a7445199 31->36 32->30 38 7ff7a74451b2-7ff7a74451bc 35->38 39 7ff7a744519b-7ff7a744519e 36->39 40 7ff7a74451a0-7ff7a74451a7 36->40 38->19 38->23 39->30 40->38 43 7ff7a74451a9 40->43 44 7ff7a74452c6-7ff7a74452dd call 7ff7a7444dea 41->44 45 7ff7a7445253-7ff7a7445271 41->45 42->41 43->30 51 7ff7a7445584 44->51 52 7ff7a74452e3-7ff7a7445308 call 7ff7a744b9af * 2 44->52 47 7ff7a7445275-7ff7a744527e 45->47 49 7ff7a74452a9-7ff7a74452bb 47->49 50 7ff7a7445280-7ff7a7445286 47->50 49->47 50->49 53 7ff7a7445288-7ff7a744528b 50->53 55 7ff7a7445589-7ff7a7445591 call 7ff7a745c0a0 51->55 66 7ff7a744530a-7ff7a7445332 52->66 67 7ff7a7445335-7ff7a7445339 52->67 56 7ff7a7445299-7ff7a744529f 53->56 57 7ff7a744528d-7ff7a7445297 53->57 55->33 56->49 59 7ff7a74452a1-7ff7a74452a4 56->59 58 7ff7a74452bd-7ff7a74452c4 57->58 58->44 58->47 59->58 62 7ff7a74452a6 59->62 62->49 66->67 68 7ff7a7445398-7ff7a74453f7 call 7ff7a7441424 call 7ff7a744242b call 7ff7a744b9af 67->68 69 7ff7a744533b-7ff7a744533e 67->69 88 7ff7a744544a-7ff7a744545d call 7ff7a744b9af 68->88 89 7ff7a74453f9-7ff7a7445445 call 7ff7a744b9af 68->89 70 7ff7a7445341-7ff7a744534e 69->70 72 7ff7a7445350-7ff7a7445352 70->72 73 7ff7a7445354-7ff7a744535b 70->73 75 7ff7a7445386-7ff7a744538a 72->75 76 7ff7a744535d-7ff7a7445360 73->76 77 7ff7a7445362-7ff7a7445365 73->77 75->70 76->75 80 7ff7a7445367-7ff7a744536a 77->80 81 7ff7a744536c-7ff7a7445373 77->81 83 7ff7a744538c-7ff7a7445396 80->83 84 7ff7a744537a-7ff7a7445381 81->84 85 7ff7a7445375-7ff7a7445378 81->85 83->68 83->70 84->83 87 7ff7a7445383 84->87 85->75 87->75 94 7ff7a74454bc-7ff7a7445582 CreateProcessA VirtualAllocEx WriteProcessMemory VirtualProtect QueueUserAPC ResumeThread call 7ff7a745c0d0 88->94 95 7ff7a744545f-7ff7a7445462 88->95 89->88 94->55 97 7ff7a7445465-7ff7a7445472 95->97 99 7ff7a7445478-7ff7a744547f 97->99 100 7ff7a7445474-7ff7a7445476 97->100 102 7ff7a7445481-7ff7a7445484 99->102 103 7ff7a7445486-7ff7a7445489 99->103 101 7ff7a74454aa-7ff7a74454ae 100->101 101->97 102->101 104 7ff7a744548b-7ff7a744548e 103->104 105 7ff7a7445490-7ff7a7445497 103->105 106 7ff7a74454b0-7ff7a74454ba 104->106 107 7ff7a7445499-7ff7a744549c 105->107 108 7ff7a744549e-7ff7a74454a5 105->108 106->94 106->97 107->101 108->106 109 7ff7a74454a7 108->109 109->101
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: Process$CreateVirtual$AllocErrorExitLastMemoryMutexProtectQueueResumeThreadUserWrite
    • String ID: @
    • API String ID: 2997260034-2766056989
    • Opcode ID: c9dfee0022c00a0f101e23ed8fc8fd3e6d44756e734118970932e24aa76351ea
    • Instruction ID: 287cce47776564b2e0361ad78b6f52efd78ef5d59b5de8eaf9761eb2168e2660
    • Opcode Fuzzy Hash: c9dfee0022c00a0f101e23ed8fc8fd3e6d44756e734118970932e24aa76351ea
    • Instruction Fuzzy Hash: D5E10372A0A68297EB20AF15D801779FBA1EB51B84FD6C030DA0D477A1DF7CE846DB11

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: _initterm_malloc_dbg$ExceptionFilterSleepUnhandled_amsg_exit_cexitstrlen
    • String ID:
    • API String ID: 4167734774-0
    • Opcode ID: f5def7a0a038ed72c2c70a7d61577592dc1a50a328b9bb233c42d826715b854f
    • Instruction ID: c95c73ba9a5a403b5cc421d81a445fd23d495c9976b538de7a188c8dbcaa1646
    • Opcode Fuzzy Hash: f5def7a0a038ed72c2c70a7d61577592dc1a50a328b9bb233c42d826715b854f
    • Instruction Fuzzy Hash: 7E516EA1E4B64286FB51FF65E852679A3A1BF48784F868436CD0D873B1DE3CE4429331
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: _malloc_dbg$_calloc_dbg_realloc_dbgabort
    • String ID:
    • API String ID: 1593204669-0
    • Opcode ID: 90b3f885854590a53720ed776d606190da0ed1b7dfbe4464046fe4ccbf83bcd9
    • Instruction ID: 5fe2cc726cf2abb94bfef5c091b92e5b6fde034e7837f9bcd0526c6b3462acd7
    • Opcode Fuzzy Hash: 90b3f885854590a53720ed776d606190da0ed1b7dfbe4464046fe4ccbf83bcd9
    • Instruction Fuzzy Hash: 4392E472A1A5D286EB20AF18D40177DFBA0FB55B88F9AC130C60A037A0DF3AE557D751

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 508 7ff7a7503300-7ff7a7503322 509 7ff7a7503376-7ff7a75033c0 NtCreateFile 508->509 510 7ff7a7503324-7ff7a7503374 508->510 511 7ff7a75033c3-7ff7a75033cc 509->511 510->511
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: cbc32dd1c763ee5ecd0ebd6ae3f4f151f1639d920806004329b1dda2cc8b0a25
    • Instruction ID: 9ae20fe77f92116bf01f9d47fe216816bb9463d0048dc9287d023d7e0a8b5167
    • Opcode Fuzzy Hash: cbc32dd1c763ee5ecd0ebd6ae3f4f151f1639d920806004329b1dda2cc8b0a25
    • Instruction Fuzzy Hash: 2B318176A19B80CFD750CFA9E88069D7BB4F389398B101526EF4D93B28DB38D581CB50

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 513 7ff7a7503240-7ff7a7503260 514 7ff7a7503262-7ff7a75032a9 513->514 515 7ff7a75032ab-7ff7a75032ec NtReadFile 513->515 516 7ff7a75032ef-7ff7a75032f8 514->516 515->516
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: FileRead
    • String ID:
    • API String ID: 2738559852-0
    • Opcode ID: a01786c52720697b127a25d83a9d85298d6443b40b642374534a565a78f97def
    • Instruction ID: ff5a494d3684d55ffae491fb08010d3bda03c89741d4b54295855e65c2eaff8b
    • Opcode Fuzzy Hash: a01786c52720697b127a25d83a9d85298d6443b40b642374534a565a78f97def
    • Instruction Fuzzy Hash: 5621AE76A15F44DEE790CFA5E88029C7BB4F388798B501026EF8D93B28DB38C191CB50

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: Thread$Current$Valueabort$CreateDebugDuplicateEventHandleOutputPriorityString_calloc_dbg_ultoa
    • String ID:
    • API String ID: 3003713025-0
    • Opcode ID: a61d9d2d8d11fb6f948b1d83da85a79279535a2f833a9b0ebb3d01c5994a3b1e
    • Instruction ID: 6276344e93fa7fc85d1ef83d6596f6d1fff3679ee7a985f3292a18dbd3e97b54
    • Opcode Fuzzy Hash: a61d9d2d8d11fb6f948b1d83da85a79279535a2f833a9b0ebb3d01c5994a3b1e
    • Instruction Fuzzy Hash: FA31B771A0774187E750EF34A805669B6A0FF45BA4F8A5235D91C477B4EF3CD442CB20

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: _malloc_dbg$CurrentThread_calloc_dbg_realloc_dbgabort
    • String ID:
    • API String ID: 4037631172-0
    • Opcode ID: cb5c8176ac3f29cbf0b090c9bff4790e59892fb4a21ba06188dce8fdd6fb2cf5
    • Instruction ID: 89e3fd5dfe7fea3d81d2f2e56601427b1ee35d4c0d311bbd207a08ba9a5a3b02
    • Opcode Fuzzy Hash: cb5c8176ac3f29cbf0b090c9bff4790e59892fb4a21ba06188dce8fdd6fb2cf5
    • Instruction Fuzzy Hash: 3C41BE62B0BA4296EB05FF15D8061B9A365AF04BD4FCA8431DE0D177A5EE3CE807D320

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: fprintf
    • String ID: once %p is %d
    • API String ID: 383729395-95064319
    • Opcode ID: 069a526b1ca29d6d2cd1234aed11e83b57c5bb9da3725ca1570d7859e625ba5c
    • Instruction ID: d05846ab594aec069f38c89b3fb34ac88dcff7a026a28452e9477748561e0ea0
    • Opcode Fuzzy Hash: 069a526b1ca29d6d2cd1234aed11e83b57c5bb9da3725ca1570d7859e625ba5c
    • Instruction Fuzzy Hash: 0F118439A0AA4645F720BF21E4016B9BB64AF54BC4FD58030EE4D07775DE3CE8428730
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: Internet$CloseHandle$Open_malloc_dbg$ErrorFileLastRead_calloc_dbg_realloc_dbgabort
    • String ID: vector::_M_range_insert
    • API String ID: 264723552-1989829942
    • Opcode ID: 017bc6dbc77b26f7f5cccc6715b48ffd4ce5d46ff7d23ab9cfe8d0e1996e692e
    • Instruction ID: e1b14a792c895c69091e6f90ef254ff51085b9b41ee62f5b9c58160540a44a02
    • Opcode Fuzzy Hash: 017bc6dbc77b26f7f5cccc6715b48ffd4ce5d46ff7d23ab9cfe8d0e1996e692e
    • Instruction Fuzzy Hash: 5D81066260A78786EB60AF2AA80526AF790FF44BD4F958130DE5E077B0DE3CE447D710
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: strlen
    • String ID: Auth$Auth$Genu$Genu$default$hardware$rand_s$random_device::random_device(const std::string&): device not available$random_device::random_device(const std::string&): unsupported token$rdrand$rdrnd$rdseed
    • API String ID: 39653677-628424350
    • Opcode ID: 872e677486dcfd82242d52c130103bd2ece8de99e6215b88830f85ad13c42478
    • Instruction ID: 26f022017ccd9f0d8970afa7696f1347798d0e8ba13620a54e0a29e8e4afcf1e
    • Opcode Fuzzy Hash: 872e677486dcfd82242d52c130103bd2ece8de99e6215b88830f85ad13c42478
    • Instruction Fuzzy Hash: 50414B60A0E60B51FE64BF15A8912B4A2505F41780FD78139CC0E876F9EE6DEE07C33A
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: Process$ControlDeviceOpenTerminatestrlen
    • String ID: DADY HARDDISK$QEMU HARDDISK$\\.\PhysicalDrive0
    • API String ID: 310750680-373463814
    • Opcode ID: c9f3093746e9c76ecf5eedd497b65db6876328f3d5b61e7279b48e2101a6ee4d
    • Instruction ID: bebccfa69e1a36b5cd2b25963e2c778a5d9ccfac817c348c0fc879b8b8ef0da4
    • Opcode Fuzzy Hash: c9f3093746e9c76ecf5eedd497b65db6876328f3d5b61e7279b48e2101a6ee4d
    • Instruction Fuzzy Hash: 9931E521B5E65282F760BF25B51177AE291AF84B90F865131DE4E03BB4EF3CD5078B10
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: EventSleep$CreatePriorityResetThread_beginthreadex_calloc_dbg
    • String ID:
    • API String ID: 1989753889-0
    • Opcode ID: f9bd57d1675830643987745c89b7ed90095948890b46850970418ca1d4964acc
    • Instruction ID: 8d4c847802ccc16f27f92179d72c38e31cd9ff0127f0ea002fe13e5eca24ed8f
    • Opcode Fuzzy Hash: f9bd57d1675830643987745c89b7ed90095948890b46850970418ca1d4964acc
    • Instruction Fuzzy Hash: 2F518131A0A74286E764AF74945077DB6A0EB44B64F9A4335DE2E47BF4DF38D842C710
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: strlen$_strncoll
    • String ID: _GLOBAL_
    • API String ID: 3979851410-770460502
    • Opcode ID: 5effe14cda6150c3d789026d1830ca87b6b119f5c09e978b584deabdc8b959d7
    • Instruction ID: bd72565b51ad935321bedebfd05be031285dd0eaff9864dc6313d5963789d8d2
    • Opcode Fuzzy Hash: 5effe14cda6150c3d789026d1830ca87b6b119f5c09e978b584deabdc8b959d7
    • Instruction Fuzzy Hash: 69C1B472B0A7C18BFB60AF7098463EEB7A1BB04388F854135DA4D07B95DF389597A710
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: ExceptionHandlerVectored$Remove
    • String ID:
    • API String ID: 3670940754-0
    • Opcode ID: 30e25ca606a908c3c77ad5bf51a2b4120e00b8f6cb6c01133260b5ce20f67392
    • Instruction ID: 36fd5c98a018b007faadd793dda1634aab854f526a2d27d7d319491cc6e4594e
    • Opcode Fuzzy Hash: 30e25ca606a908c3c77ad5bf51a2b4120e00b8f6cb6c01133260b5ce20f67392
    • Instruction Fuzzy Hash: 1D416E69E0BA0286FB64BF319561778AB90EF94B44FC74135CD0E066B5DF2CA843C761
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: ProtectVirtual_malloc_dbg$CacheFlushInstruction_calloc_dbg_realloc_dbgabort
    • String ID:
    • API String ID: 4203908447-0
    • Opcode ID: b801f07323f567c1f67f9b575f470bc806e416ca52103e225e01151822b5cc0d
    • Instruction ID: c17a832924477399efc257e380408bc0307215de0033afa34e6e6669779d9a70
    • Opcode Fuzzy Hash: b801f07323f567c1f67f9b575f470bc806e416ca52103e225e01151822b5cc0d
    • Instruction Fuzzy Hash: FE32D732A5E2D69AF721AF14D801A79FB92EB51B40FDAC031C649037A1DF7CE846D712
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: ??3@DebuggerExceptionPresentRaise
    • String ID:
    • API String ID: 3279378595-0
    • Opcode ID: 2e72401c0cad45c492d3f28a0a3c7ec8f1773598b95bc1ceb0aaab6d12aa8799
    • Instruction ID: cf24c8956bb59c93ab0bd37378eff9d732c89b0f47669fe7c864d4c4ceb920ff
    • Opcode Fuzzy Hash: 2e72401c0cad45c492d3f28a0a3c7ec8f1773598b95bc1ceb0aaab6d12aa8799
    • Instruction Fuzzy Hash: CA218A25E0A61146FB51BF299450B79A7A09F847A4FCA4235DD5E473E0EF3CDC428760
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: Find$CaptureCloseContextFileFirstUnwindabort
    • String ID:
    • API String ID: 1173583122-0
    • Opcode ID: f41b677438223da7a46e2798f1a31f3eece2fd216ba5b74784c056f71f3a44ef
    • Instruction ID: 80f11251e99a957fba661b341d1bd3cf6667e6bf5639710d0c73c050734e3851
    • Opcode Fuzzy Hash: f41b677438223da7a46e2798f1a31f3eece2fd216ba5b74784c056f71f3a44ef
    • Instruction Fuzzy Hash: 85F01C16E4F50392EE64BE71A41A37D91216F81BA4FD70330EC3E462F2DC6CA406A724
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: Find$CaptureCloseContextFileFirstUnwindabort
    • String ID:
    • API String ID: 1173583122-0
    • Opcode ID: d2b7b5e4e4d4903b2067ac58cda3c73e49b602dad230a0c53b7a789532316b38
    • Instruction ID: 3c139620c5c6120ff9c677087e8b332c0ecee52c8f1f67837134aacf831a2679
    • Opcode Fuzzy Hash: d2b7b5e4e4d4903b2067ac58cda3c73e49b602dad230a0c53b7a789532316b38
    • Instruction Fuzzy Hash: 63E06D16E4F40282EA50BF71941A37D9120AF44BB4FD70330E83E862F2EC5C90069720
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: Find$CaptureCloseContextFileFirstUnwindabort
    • String ID:
    • API String ID: 1173583122-0
    • Opcode ID: 914610cf9d3d9227e65c187e472236fd9f93fddb216c463d2714c3a429159952
    • Instruction ID: 4cd186f48259bb599de883d061734979e13b8c80b4e6f10d4434c45ce8e80825
    • Opcode Fuzzy Hash: 914610cf9d3d9227e65c187e472236fd9f93fddb216c463d2714c3a429159952
    • Instruction Fuzzy Hash: 3BE06D12A4E00282EA50BB31941937D9210AB45B74FC60330E83E462F1DD5C90069720
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: Find$CaptureCloseContextFileFirstUnwindabort
    • String ID:
    • API String ID: 1173583122-0
    • Opcode ID: 8f603ed01b97c1f512cc208b8baf28061b46fecf35cb2b4958718e7a6b045037
    • Instruction ID: 08bc9ac2fecf22200f55e7ff06298a96a68a79469c235ab3594f1d927e526f24
    • Opcode Fuzzy Hash: 8f603ed01b97c1f512cc208b8baf28061b46fecf35cb2b4958718e7a6b045037
    • Instruction Fuzzy Hash: B8E08612B4B40286EF90BF35D8193789210AB55B74FC70330E93E863F1ED6C90068710
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID:
    • String ID: std$string literal
    • API String ID: 0-2980153874
    • Opcode ID: aa7718613de81c81ab0da101cb38be5f76b8bf14329ad2edd72083dfb1550644
    • Instruction ID: a285675ed14bed7ab05e361ca77236f01c124564cdce5d782ed7105c6a76292a
    • Opcode Fuzzy Hash: aa7718613de81c81ab0da101cb38be5f76b8bf14329ad2edd72083dfb1550644
    • Instruction Fuzzy Hash: 0071C652F0EA4642FA65BE255C03279D6899F41B94F8A8530DA1D473F5EE3CF843A360
    APIs
      • Part of subcall function 00007FF7A7441FF0: GetModuleFileNameA.KERNEL32 ref: 00007FF7A744200C
      • Part of subcall function 00007FF7A744B9AF: _calloc_dbg.MSVCRT ref: 00007FF7A744BA32
      • Part of subcall function 00007FF7A744B9AF: abort.MSVCRT(?,?,00000000,?,00007FF7A7441638), ref: 00007FF7A744BA3F
      • Part of subcall function 00007FF7A744B9AF: _malloc_dbg.MSVCRT ref: 00007FF7A744BABF
      • Part of subcall function 00007FF7A744B9AF: _realloc_dbg.MSVCRT ref: 00007FF7A744BA6A
      • Part of subcall function 00007FF7A744B9AF: _malloc_dbg.MSVCRT ref: 00007FF7A744BADB
    • ShellExecuteA.SHELL32 ref: 00007FF7A7442379
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: _malloc_dbg$ExecuteFileModuleNameShell_calloc_dbg_realloc_dbgabort
    • String ID:
    • API String ID: 1988290971-0
    • Opcode ID: dc65c2f86ff53822ab6fa6e49b52be19be44138d922a814b3a7da31c45c91a0a
    • Instruction ID: 40f398050d5d3eb1b56e73780011689a068b0429fb6b259586e698cdc50c962e
    • Opcode Fuzzy Hash: dc65c2f86ff53822ab6fa6e49b52be19be44138d922a814b3a7da31c45c91a0a
    • Instruction Fuzzy Hash: FDB1C736A0E18297E721AF20D406779FBA1EB91B80FD6C031D60D472A1DF7CA947D725
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: SectionView
    • String ID:
    • API String ID: 1323581903-0
    • Opcode ID: 528b05e9cc6b4df32d1c2766c75bc3ee61be69a5a132acc8aa064f40dc82e32b
    • Instruction ID: 76e43f47b24403718ee8e8cf8b5ecf4899d8432148e1fe679a92819d3c064843
    • Opcode Fuzzy Hash: 528b05e9cc6b4df32d1c2766c75bc3ee61be69a5a132acc8aa064f40dc82e32b
    • Instruction Fuzzy Hash: 9221F676A19B40CED750CFA9E88059D7BB4F38D798B101426EF8D93B28DB38D590CB10
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: CreateSection
    • String ID:
    • API String ID: 2449625523-0
    • Opcode ID: 2e9e50bfab5740a14588598e2ab8d9cb19d3d38ff1179786d2990e1b39e353ad
    • Instruction ID: a756006c3c0fc2efc2c9014b60db79d8e05f6266fd7f7b0b284b26ec786a22f7
    • Opcode Fuzzy Hash: 2e9e50bfab5740a14588598e2ab8d9cb19d3d38ff1179786d2990e1b39e353ad
    • Instruction Fuzzy Hash: 9A11EF76A19B40DEE750CFA4E88059C7BB4F38C358B141126EF4DA3B28DB38D582CB50
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: Time$FileSystem
    • String ID:
    • API String ID: 2086374402-0
    • Opcode ID: 06b714334ece55f816e9b8b0b34d539c0cb158430d8de723e4e09ab0daaa5613
    • Instruction ID: 465eb2f2fe8f0d3a989096285b82bd848db7f54b4d6bf4b241a77b72f8e12e8f
    • Opcode Fuzzy Hash: 06b714334ece55f816e9b8b0b34d539c0cb158430d8de723e4e09ab0daaa5613
    • Instruction Fuzzy Hash: 53D05EAAF0854487DB20DB10F445116B722EBD8399F848121EE4D46728DE3CD6678F00
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 7535b4de21109a093e06d6470f75b173737e89990db753913e80a83cbdb06915
    • Instruction ID: 2d11b3149d437905218b337bc0a5c29990e86769cf779fef0aad686f468dbe05
    • Opcode Fuzzy Hash: 7535b4de21109a093e06d6470f75b173737e89990db753913e80a83cbdb06915
    • Instruction Fuzzy Hash: FFD18A51F0F64647FB64BE155853279D69AAF81B84FDB8031CA1D137E5DE3CE883A220
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 56d9710f2c56e218d2d3573632ab62a7169e96cd0065a10416511275e92a0c56
    • Instruction ID: e1bdc48b38443bfb4114096bb3980452dd35a36d8cb425dcc7597cafe0f0f2d2
    • Opcode Fuzzy Hash: 56d9710f2c56e218d2d3573632ab62a7169e96cd0065a10416511275e92a0c56
    • Instruction Fuzzy Hash: 14B1A722A0E78181FA61AF15E01037EE791FB85B84FC54135EE8D477A9DF3CE8468752
    Memory Dump Source
    • Source File: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ea88672dd1ffb5430322d8e6cb9690b4efafaa478607b106da9101461615f464
    • Instruction ID: 605d38960977daba03ea2ccbcb2befb93d70d99c9c6ea567fdc55489e760e7a0
    • Opcode Fuzzy Hash: ea88672dd1ffb5430322d8e6cb9690b4efafaa478607b106da9101461615f464
    • Instruction Fuzzy Hash: 9481C5F3A0EF9589EB149F198085368E3A0F714B95FA25231CF5E576B1CA2AD4E3C710
    Memory Dump Source
    • Source File: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d44c2f10f09bfc9bcf34c4302529c4037be47bb10c65892144451d2728afb84c
    • Instruction ID: b599d1eaeefb7f77b63aa3c3573666d1fa1b77433a2cbe42de9075c26d9f2736
    • Opcode Fuzzy Hash: d44c2f10f09bfc9bcf34c4302529c4037be47bb10c65892144451d2728afb84c
    • Instruction Fuzzy Hash: 27F0F95BA8FBC18BF7679A6408351586F619BE39057CA90B7C3C4872E3D44E180AC366
    Memory Dump Source
    • Source File: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5338b2410c88fadbddd5476d659243740ef45eec0dfff78edda5a85c0f4bb367
    • Instruction ID: e8544e1f3ef89495dcc7e3576f10e51f519670ab7c23515600a6e389cb2d4ea1
    • Opcode Fuzzy Hash: 5338b2410c88fadbddd5476d659243740ef45eec0dfff78edda5a85c0f4bb367
    • Instruction Fuzzy Hash: 01D0C987F4FBC385F15296A8093D1199ED19F92924F5EC27ACE680B2F2D90A6C035761

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: fputs$??3@_fputcharabort
    • String ID: what(): $not enough space for format expansion (Please submit full bug report at https://gcc.gnu.org/bugs/): $terminate called after throwing an instance of '$terminate called recursively$terminate called without an active exception
    • API String ID: 708758616-2619835231
    • Opcode ID: 03df02dc98cc8839d30060f0d2be1441028e1b2bb4f5cd27b03a2b79452e0f9c
    • Instruction ID: e3c8fe2c7d8f0a4d9e5f5b8553405be5cece0e05bf2d31355adb0e8936412c80
    • Opcode Fuzzy Hash: 03df02dc98cc8839d30060f0d2be1441028e1b2bb4f5cd27b03a2b79452e0f9c
    • Instruction Fuzzy Hash: 2B41B150B0B14696FB20BF6194163B9E241AF94BC4FC58139DD5D077F6EE2CA5038332
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: Unwindabort
    • String ID: CCG $CCG!$CCG!$CCG"$basic_string::_M_create
    • API String ID: 2187188232-955483099
    • Opcode ID: 5c11fb32fddcd6020f564f55c892b7a8362662d2fcca294fb10a82fd64d06b88
    • Instruction ID: 0b6c299b6f4c357f40584ea6261c3d58b377148fd6788fb6b7db64dbaf4aad5c
    • Opcode Fuzzy Hash: 5c11fb32fddcd6020f564f55c892b7a8362662d2fcca294fb10a82fd64d06b88
    • Instruction Fuzzy Hash: 78516172609B4082D7709F49E4812ADB3A4F788B98F614136EF8D47B68DF3DD892C701
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: Virtual$ErrorLastProtectQuery
    • String ID: Unknown pseudo relocation protocol version %d.$ VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
    • API String ID: 637304234-2693646698
    • Opcode ID: 45274ac9ef603680abd18d8f8fecf1d52b65f8dbcdd6c6544261d3d9f28096a7
    • Instruction ID: cc8e6ed20027afc2e7bd82dba993e73e065e2184557e5e108135d5bd74bac7bd
    • Opcode Fuzzy Hash: 45274ac9ef603680abd18d8f8fecf1d52b65f8dbcdd6c6544261d3d9f28096a7
    • Instruction Fuzzy Hash: 2B318272B0B74296EB00BF11E845169A7A1BB84B94F868535DE4C47374DE3CE487C750
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: Thread$Event$Context$CurrentHandleInformationObjectResumeSingleSuspendWait
    • String ID:
    • API String ID: 47337953-0
    • Opcode ID: 27f02c62d9415308b88906aaa5bb19e0af21946852c98ca8fe3fb38fe1ce8cc0
    • Instruction ID: 4412bb330ec6fc7f7f0c13ab413e406ed99da57271022a15a60defa7fb9dccc2
    • Opcode Fuzzy Hash: 27f02c62d9415308b88906aaa5bb19e0af21946852c98ca8fe3fb38fe1ce8cc0
    • Instruction Fuzzy Hash: 4A41B96AA0B54286FB65BF31945027CAF60AF45B74FC60230DD5D462F5DF2CD8478720
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: CriticalSection$DeleteLeave$AcquireLock$??3@
    • String ID:
    • API String ID: 224785017-0
    • Opcode ID: 1ff8e04dd4b8a04b36bf890e0e3cb9745a107817c28e865f2f861b65b7d8fe62
    • Instruction ID: aa14cfb240d275ebf33c23cf927e6984b239e445da0b187d587ed4ef87bc3502
    • Opcode Fuzzy Hash: 1ff8e04dd4b8a04b36bf890e0e3cb9745a107817c28e865f2f861b65b7d8fe62
    • Instruction Fuzzy Hash: 0831C161B0A64256E664BF26B9102BAA350AF45BA4FC14232DE6E477F1CE3CE8439314
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: CriticalInitializeSection$CreateSemaphore$??3@_calloc_dbg
    • String ID:
    • API String ID: 278339251-0
    • Opcode ID: bf98f47723efefa634e8925d1203b70c7d3bd4a0b706e5b27215a6e2f3ceb217
    • Instruction ID: d52753cf0a823881b82260e84ecab76877c76e0a6dd9fdb9aed97fe75aed85c5
    • Opcode Fuzzy Hash: bf98f47723efefa634e8925d1203b70c7d3bd4a0b706e5b27215a6e2f3ceb217
    • Instruction Fuzzy Hash: 9E21E57170764286FB68EF35E95077A6291EF50B94FCA8136CE5D8B3A4DE3C9842C720
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: exitfprintf
    • String ID: ($(((rwlock_t *)*rwl)->valid == LIFE_RWLOCK) && (((rwlock_t *)*rwl)->busy > 0)$/mingw-w64-v11.0.0/mingw-w64-libraries/winpthreads/src/rwlock.c$Assertion failed: (%s), file %s, line %d
    • API String ID: 4243785698-3600795083
    • Opcode ID: 07f5d123ec4a99d66df522e411186e11b47df596a6235e599fcc669a190e2e7c
    • Instruction ID: d7912bb7a0b7f315adb13caef6e27d6ceeb0f2a0be2b1e81f361e38fb060d743
    • Opcode Fuzzy Hash: 07f5d123ec4a99d66df522e411186e11b47df596a6235e599fcc669a190e2e7c
    • Instruction Fuzzy Hash: F5018466B0A64592F700AF24E9152B8E711AB44B94FC68036DD0D073B6DFBDDC47C362
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: strcmp
    • String ID:
    • API String ID: 1004003707-0
    • Opcode ID: 18849e5a546d5317a71dd11980ccb38660b53e008e329bdc2d272acacbb80f03
    • Instruction ID: 12407b2f19819e1fb47bda769cb44688599e6013b0fa2ec9bafe4964a940838b
    • Opcode Fuzzy Hash: 18849e5a546d5317a71dd11980ccb38660b53e008e329bdc2d272acacbb80f03
    • Instruction Fuzzy Hash: F8919051E0E28347FA64BE2658472B9D2854F42B82FDAC035D94E077F6DE2CE943B321
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: CurrentThread$??3@_malloc_dbg
    • String ID: basic_string::_M_create
    • API String ID: 581562805-3122258987
    • Opcode ID: bc7a7ee65b1ecb8bcbc3017fe0d6439e0a09fe84b4c09e96669dfaffec9f4652
    • Instruction ID: 89d2fdc2be4d7187cf4a14134252f37a82748d79d7bde8c52e8cd5c87e3aad65
    • Opcode Fuzzy Hash: bc7a7ee65b1ecb8bcbc3017fe0d6439e0a09fe84b4c09e96669dfaffec9f4652
    • Instruction Fuzzy Hash: 86319121E0B2039BFB656E649806339A591BF44755F9E8035DD0D862F4EE3CE883E771
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: CurrentDebugOutputStringThread_ultoaabort
    • String ID: Error cleaning up spin_keys for thread
    • API String ID: 4191895893-2906507043
    • Opcode ID: dacbd3911e222d57cacfaeadd5447095d891d6e8f2abf5efbcf0ed51b3a84f37
    • Instruction ID: 3680b56bc36ae66b9e8e6a1586e1552408a2459c316626346324688afe76f6cc
    • Opcode Fuzzy Hash: dacbd3911e222d57cacfaeadd5447095d891d6e8f2abf5efbcf0ed51b3a84f37
    • Instruction Fuzzy Hash: E5110852B0F60282FF21AB24E51437A9AA1DB45765FD90330CA6D4A3F5CE2CD8478725
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: ObjectSingleWait$EventReset
    • String ID:
    • API String ID: 466820088-0
    • Opcode ID: c1c73f9e16f899d95e94b6f4e59d718316d90df37484412a4e23620487738ba7
    • Instruction ID: 2dc54a7a7ac29dd029d70dee103e28c40ba55d489d8a7daae16a6a4b545f22d7
    • Opcode Fuzzy Hash: c1c73f9e16f899d95e94b6f4e59d718316d90df37484412a4e23620487738ba7
    • Instruction Fuzzy Hash: A3517B92F0E60342FAB47DA6848537AC6809F96700FDB0133DD4EA66F2DD5CAC47913A
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: CurrentThread$Value$EventSleep_endthreadex
    • String ID:
    • API String ID: 197234052-0
    • Opcode ID: 6baeca634922873dd4ceb8e89880999fe2e386df8df25a18b82bf994a4dc4886
    • Instruction ID: 803b10a6b392d695047a081ec8551f70fcf325a316b6920bc30747c2e84a32e5
    • Opcode Fuzzy Hash: 6baeca634922873dd4ceb8e89880999fe2e386df8df25a18b82bf994a4dc4886
    • Instruction Fuzzy Hash: 5B41FA65A0A74286FB40FF22D8511B9A760FB85B94FCA4531E91E473B5DE3CE846D320
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: CriticalLeaveSection$AcquireLock
    • String ID:
    • API String ID: 602743569-0
    • Opcode ID: ce9b49317acdec01005a075105c737f91ae751c963191ea0a905082830937bc6
    • Instruction ID: 59d33144ba1ca5d65c44d1de4e06cabe7e206db50a87ec3add0820f89e6a7a17
    • Opcode Fuzzy Hash: ce9b49317acdec01005a075105c737f91ae751c963191ea0a905082830937bc6
    • Instruction Fuzzy Hash: 8101A722B0B60246E714AF56BD91739D2516F9AB91FC58130DD4E86760DD2CA8838714
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: _errno$ErrorLastOpenProcess
    • String ID:
    • API String ID: 90818072-0
    • Opcode ID: 80ba77a71dfa169f0255d3c17314ada1875425b4c48a71b41787d6493320c567
    • Instruction ID: 3f1b6220f12aed7599c36588583318d6898a7e2c15192e8e728aca820632f9fa
    • Opcode Fuzzy Hash: 80ba77a71dfa169f0255d3c17314ada1875425b4c48a71b41787d6493320c567
    • Instruction Fuzzy Hash: BE017120B5B60696FB567FA1AC84138A594AF55B59FC74534CD0E4A3B0CE3C3C4B9B31
    APIs
    • VirtualProtect.KERNEL32(?,?,00007FF7A746F078,00000000,?,?,?,00007FF7A746F070,00007FF7A7441208), ref: 00007FF7A744AD92
    Strings
    • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 00007FF7A744AD2D
    • Unknown pseudo relocation protocol version %d., xrefs: 00007FF7A744AC32
    • Unknown pseudo relocation bit size %d., xrefs: 00007FF7A744ACBB
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: ProtectVirtual
    • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
    • API String ID: 544645111-1286557213
    • Opcode ID: e25a082c85769d3cbbc96d63a987aef09790b4ab5927b19e99f6cde364bfa7fd
    • Instruction ID: 57985c86cfd6ab6510af4e76284844801bbd4779f5da4ae3c0253f227fe48f45
    • Opcode Fuzzy Hash: e25a082c85769d3cbbc96d63a987aef09790b4ab5927b19e99f6cde364bfa7fd
    • Instruction Fuzzy Hash: FF6191A1F0A74287FB64AF11D84227AA7A1AB44794F868131DA1C077F9DF3CE5C2D721
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: CurrentThread
    • String ID: T%p %d %s$T%p %d V=%0X H=%p %s
    • API String ID: 2882836952-2059990036
    • Opcode ID: 8413c510d5cdcff8d95115becfb6cf38646dd406880fb16d7e77bc95e3aa644a
    • Instruction ID: bb86ceee8198069c03179e5c3093974ea7ecbf88d4ab6c1b2447b36e4e739977
    • Opcode Fuzzy Hash: 8413c510d5cdcff8d95115becfb6cf38646dd406880fb16d7e77bc95e3aa644a
    • Instruction Fuzzy Hash: 2F117076A0E75681EA10AF62F840469FB61FB947D4F858032EE5E03B74DE3CE842CB11
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: fprintf
    • String ID: C%p %d %s$C%p %d V=%0X w=%ld %s
    • API String ID: 383729395-884133013
    • Opcode ID: 363bebb7f777ff019ce84671e4d0ec8035539763ecc47460501ae2349624b095
    • Instruction ID: 7ecdec151df4be99f9394cd96040bb2af0ff4a4aeaf0a99bf98168e0abe1d88f
    • Opcode Fuzzy Hash: 363bebb7f777ff019ce84671e4d0ec8035539763ecc47460501ae2349624b095
    • Instruction Fuzzy Hash: 5B019EB6A0AB0585E720AF26F840568B760BB88BC8F869036DD4C43774DF3CE443C711
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: ??3@$strlen
    • String ID:
    • API String ID: 4288758904-0
    • Opcode ID: 77d83bdf5125a55431555ab4afc99044e0b2693a106f80fbabe8acf31025ff09
    • Instruction ID: b29bcd7b3aab8aea0a268f21b07374aa0cc0d90838605416cd1fccb32afa3f96
    • Opcode Fuzzy Hash: 77d83bdf5125a55431555ab4afc99044e0b2693a106f80fbabe8acf31025ff09
    • Instruction Fuzzy Hash: 0D21B462B0B74257FBB5BE11650227AD1907F547A4F9A4130EE8E06BE5DE2CE4C3A720
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: CriticalLeaveSection$AcquireLock
    • String ID:
    • API String ID: 602743569-0
    • Opcode ID: e43043ebd284bbac4e4832c21c9bbf8c11aebde8df7d4da4865f1934f31c12e3
    • Instruction ID: c2092e433abe537fa00416c8331ad8667a0c3437db21b7aee8a68f4bc1932062
    • Opcode Fuzzy Hash: e43043ebd284bbac4e4832c21c9bbf8c11aebde8df7d4da4865f1934f31c12e3
    • Instruction Fuzzy Hash: 833143B3B0A6418AEB64DE359840679A390EB44BA4FC94133DD2D972E4DE38EC46C664
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: Byte$CharMultiWide$Lead_errno
    • String ID:
    • API String ID: 2766522060-0
    • Opcode ID: f998819e1c94d35a5e6b629fcb1f20398e65272cd3df907615ba179711f83a59
    • Instruction ID: 8414b7ca00dcdd22bf23bc7ca5ba16416c52fdcfdd64b93cf3c5a4a00f608bdc
    • Opcode Fuzzy Hash: f998819e1c94d35a5e6b629fcb1f20398e65272cd3df907615ba179711f83a59
    • Instruction Fuzzy Hash: E531F876A0E6824BF3705F21A40177AAA60BB95788F8D8131DA88477E5CF3ED4429B20
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: Thread$CurrentErrorLastValue_realloc_dbg$CreateDuplicateEventHandlePriorityabort
    • String ID:
    • API String ID: 276713024-0
    • Opcode ID: 35d8b904a353473470a72823a59e0bb755945ea002d97c9797830bf140ee0540
    • Instruction ID: 19239eec2d02a5818d0274b1da35096d3bca5213b8543e196c1db642179afed6
    • Opcode Fuzzy Hash: 35d8b904a353473470a72823a59e0bb755945ea002d97c9797830bf140ee0540
    • Instruction Fuzzy Hash: 7D21C2727166859ADB08EF39A45426CA792FB48BD4FC64135CE0E47365EE3CD882C310
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: CriticalLeaveSection$AcquireLock
    • String ID:
    • API String ID: 602743569-0
    • Opcode ID: a7c7ee627f41c0ddbc9b5bfbd996a08413fa7091e63f250ce32d91d8e6cf3616
    • Instruction ID: 2072d999607e360eed76cab2e125553b020dad35c4d55cd03a90afb0ca27925c
    • Opcode Fuzzy Hash: a7c7ee627f41c0ddbc9b5bfbd996a08413fa7091e63f250ce32d91d8e6cf3616
    • Instruction Fuzzy Hash: E0215372A096428AE751DF35D14077DB390FB85B58FD98132DE0D87299DF38E882C764
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: Value$Thread$Current$CreateDuplicateEventHandlePriority_endthreadexabortlongjmp
    • String ID:
    • API String ID: 843818611-0
    • Opcode ID: 4144d13ba3f8fa4985f916005d52704b2626d94dd0760b50547f56c1cf8d60be
    • Instruction ID: 8960614d2d7002ad743222a40a6fba7d3bce33a27815558f5d0c759f52bbfefd
    • Opcode Fuzzy Hash: 4144d13ba3f8fa4985f916005d52704b2626d94dd0760b50547f56c1cf8d60be
    • Instruction Fuzzy Hash: 8421306590B64282EB65BF71D454338BAA1EF88B54F8A8035CE0D0B3B0DF3CA846C760
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: AcquireCriticalLeaveLockSection
    • String ID:
    • API String ID: 1584331419-0
    • Opcode ID: 11cf4df7c76df1f7af7f59934eb865f030e08f678413375f0af960a6a42e348a
    • Instruction ID: adc3879321ac321caa96382aae116be954da96d50a309f4a8876e8b75c8658bf
    • Opcode Fuzzy Hash: 11cf4df7c76df1f7af7f59934eb865f030e08f678413375f0af960a6a42e348a
    • Instruction Fuzzy Hash: D101D673B076518AD616DF17BC0052AA750FB98BD0F854132EE0947761CE3CDC528BC0
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: signal
    • String ID: CCG
    • API String ID: 1946981877-1584390748
    • Opcode ID: 3ffd34e54c127d4a93b65e2eb8953f0d0c3a7b03006955fc460bbb12d766246a
    • Instruction ID: cd5cf3b39ea4f1920ec3b8ce2b5c37ad379ebeac835f9428ee88f6baa4bed508
    • Opcode Fuzzy Hash: 3ffd34e54c127d4a93b65e2eb8953f0d0c3a7b03006955fc460bbb12d766246a
    • Instruction Fuzzy Hash: 1F2180A6F4F70243FB647D50844237AE1C19F55364FEB8936C91D822F1DE2DA8C36229
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: ??3@fprintf
    • String ID: %p not found?!?!
    • API String ID: 4236183796-11085004
    • Opcode ID: 8cdc897e61e294d50c0e53b30f369981baf1cb99e2050b053c28a36e01660210
    • Instruction ID: d96a240b38bf4ff9fa328d0e590d500db42b6917c90727d2f7db8e4dacc76521
    • Opcode Fuzzy Hash: 8cdc897e61e294d50c0e53b30f369981baf1cb99e2050b053c28a36e01660210
    • Instruction Fuzzy Hash: E4115E61E0BA0692FB35BF55A4121789290BF58BD4FCA5835CD1D063B5EF2CA883A370
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: printf
    • String ID: RWL%p %d %s$RWL%p %d V=%0X B=%d r=%ld w=%ld L=%p %s
    • API String ID: 3524737521-1971217749
    • Opcode ID: b1bc1984cc0dc195373680ff09ea0f24bc5ca7f46f2a323e45553ef56f7cbc10
    • Instruction ID: 464cd26e704846b7ee19439b0bd2c0b503290b0a5a3b4dcb5df0e3fb759c2aa0
    • Opcode Fuzzy Hash: b1bc1984cc0dc195373680ff09ea0f24bc5ca7f46f2a323e45553ef56f7cbc10
    • Instruction Fuzzy Hash: 54019273B0A50586EB21AF55F44056AB7A0F758BD4F85C035EE4D43B64DB3DD882CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: ??3@CurrentEventThread_malloc_dbg
    • String ID: basic_string::_M_create
    • API String ID: 3602570239-3122258987
    • Opcode ID: a51f37c2005890dbe744ece342cc84c1bccea1778b5eb3b3c09acc112c83829a
    • Instruction ID: 863752e8a37b1539c83d5ed25533081610eb53cdc148b949371807b61bcac07e
    • Opcode Fuzzy Hash: a51f37c2005890dbe744ece342cc84c1bccea1778b5eb3b3c09acc112c83829a
    • Instruction Fuzzy Hash: 96016232A171018BFB65AF35D801365A6D0EB04B18F9E8531E918C72E8EE2CD882D761
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-3474627141
    • Opcode ID: bc54f14b6f1e064d76f3f6fdff09fad391532c2aa13ccadd92f6bec4456298a9
    • Instruction ID: 51fc68ebc21d040ee604d5d30a9cb5a32351f27a7a50b2c6edd294a34b8a505b
    • Opcode Fuzzy Hash: bc54f14b6f1e064d76f3f6fdff09fad391532c2aa13ccadd92f6bec4456298a9
    • Instruction Fuzzy Hash: 58117362909E84C2D3119F1CE4413EAB3B0FFAA759F915726EBC826624DF3AD153C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-4283191376
    • Opcode ID: 886ae4c81da4b56329d96e924009fcc8e8aecf891fb9769fbff69d503ffb97d2
    • Instruction ID: 5b51a8b2f9bbcb2e79dd3aa372f95a6e7a988ea8208b71e60f0a6562174eabd4
    • Opcode Fuzzy Hash: 886ae4c81da4b56329d96e924009fcc8e8aecf891fb9769fbff69d503ffb97d2
    • Instruction Fuzzy Hash: D0F01D66809F8482D2119F2CE4012ABB370FF9E789F615726EFC926524DF2DD5439B10
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-4273532761
    • Opcode ID: 975ced0795814e3260122893c874e81c544344f54141e5e88e378f522a447fad
    • Instruction ID: b917c15a57b63e899709c5768b0acd655ddac8ce889288881930c7065378263a
    • Opcode Fuzzy Hash: 975ced0795814e3260122893c874e81c544344f54141e5e88e378f522a447fad
    • Instruction Fuzzy Hash: D6F01D66809F8482D2119F1CE4012ABB370FF9E789FA15726EFC926564DF2DD5439B10
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-2713391170
    • Opcode ID: 63446f2e33afa28456cbbd0f67c1009258ab652de5a3f07ac3cad71ec56a8f21
    • Instruction ID: a6045cf65257923e6ab3f1065310fa5b3fcc25303114d111beb9e5b574f8bafa
    • Opcode Fuzzy Hash: 63446f2e33afa28456cbbd0f67c1009258ab652de5a3f07ac3cad71ec56a8f21
    • Instruction Fuzzy Hash: 01F01D66809F8482D2119F1CE4012ABB370FF9E789F615726EFC926568DF2DD5439B10
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-4064033741
    • Opcode ID: 5e358847d3dac0a26045cfffe352c68a52e63f66b2906fc804fcbd336f738b52
    • Instruction ID: 60f3a9f3f03f4dad531e10939fd90f109b954fff011151f7d598a17624a54a08
    • Opcode Fuzzy Hash: 5e358847d3dac0a26045cfffe352c68a52e63f66b2906fc804fcbd336f738b52
    • Instruction Fuzzy Hash: 9EF01D66809F8482D2119F1CE4012ABB370FF9E789F615726EFC926524DF2DD5439B10
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: fprintf
    • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-2187435201
    • Opcode ID: 7e57657d9f93e0cfddf5bb36a2151157289811cdec9520688d657ce15531e64c
    • Instruction ID: 0e2347b8629087cf8b679bc003a47fce9356e9ce3915a9eda410c0f09305bdf4
    • Opcode Fuzzy Hash: 7e57657d9f93e0cfddf5bb36a2151157289811cdec9520688d657ce15531e64c
    • Instruction Fuzzy Hash: 17F01D66809F8482D211DF1CE4012ABB370FF9E789F615726EFC926524DF2DD5479B10
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2023284224.00007FF7A7441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A7440000, based on PE: true
    • Associated: 00000000.00000002.2023271220.00007FF7A7440000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023303220.00007FF7A7462000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A7464000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023314833.00007FF7A746C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023339330.00007FF7A746F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023350906.00007FF7A7474000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7475000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77EA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A77FE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7828000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7851000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7954000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7D2C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2023362697.00007FF7A7FF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7a7440000_8xfH5IUIWU.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-2468659920
    • Opcode ID: 13b8e93ce3fd3b2efe3cb277abf4edb8425643be30d24c23b23e1728a30e4db7
    • Instruction ID: 2b2123534e7ca0b7c3454134e5ef1cf6c163ba0f85f31d835232642e55d80b8c
    • Opcode Fuzzy Hash: 13b8e93ce3fd3b2efe3cb277abf4edb8425643be30d24c23b23e1728a30e4db7
    • Instruction Fuzzy Hash: 41F03166809F8482D211DF1CE4002ABB370FF9E789F615326EFC826624DF3DD1428710