Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
AMSilence.exe

Overview

General Information

Sample name:AMSilence.exe
Analysis ID:1523566
MD5:c1dc0bfe65e66a2822986bf30d93c6c5
SHA1:2cb4013675c2de31bbe4acdd4e568c39709c900c
SHA256:df3b8aeae03934ed902a40e32e7974c9cbd1480f7cf869413d24824f0efd5ee1
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found direct / indirect Syscall (likely to bypass EDR)
Tries to delay execution (extensive OutputDebugStringW loop)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Detected potential crypto function
Enables debug privileges
Enables driver privileges
Enables security privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found potential string decryption / allocating functions
Installs a raw input device (often for capturing keystrokes)
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider
Yara detected Keylogger Generic

Classification

  • System is w10x64native
  • AMSilence.exe (PID: 8496 cmdline: "C:\Users\user\Desktop\AMSilence.exe" MD5: C1DC0BFE65E66A2822986BF30D93C6C5)
    • conhost.exe (PID: 8524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.867065735.000001D9E4940000.00000002.00001000.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    Process Memory Space: AMSilence.exe PID: 8496JoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B3273100 BCryptGenRandom,SystemFunction036,BCryptGenRandom,SystemFunction036,0_2_00007FF6B3273100
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B3273220 SystemFunction036,BCryptGenRandom,memcmp,0_2_00007FF6B3273220
      Source: AMSilence.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: Binary string: kernel32.pdbUGP source: AMSilence.exe, 00000000.00000002.864715336.000001D9E4170000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: msvcrt.pdbGCTL source: AMSilence.exe, 00000000.00000002.868808213.000001D9E5060000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: rpcrt4.pdb source: AMSilence.exe, 00000000.00000002.868465957.000001D9E4F60000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: bcrypt.pdb source: AMSilence.exe, 00000000.00000002.868040567.000001D9E4D90000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: sechost.pdb source: AMSilence.exe, 00000000.00000002.869622968.000001D9E5420000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: ucrtbase.pdb source: AMSilence.exe, 00000000.00000002.866352920.000001D9E46C0000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: D:\a01\_work\9\s\\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: AMSilence.exe, 00000000.00000002.869833791.000001D9E54B0000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: msvcrt.pdb source: AMSilence.exe, 00000000.00000002.868808213.000001D9E5060000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: ntdll.pdbUGP source: AMSilence.exe, 00000000.00000002.864485270.000001D9E40D0000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: rpcrt4.pdbUGP source: AMSilence.exe, 00000000.00000002.868465957.000001D9E4F60000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: apphelp.pdbUGP source: AMSilence.exe, 00000000.00000002.865275547.000001D9E4350000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: bcryptprimitives.pdbUGP source: AMSilence.exe, 00000000.00000002.866180475.000001D9E4660000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: advapi32.pdb source: AMSilence.exe, 00000000.00000002.868648031.000001D9E4FE0000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: sechost.pdbUGP source: AMSilence.exe, 00000000.00000002.869622968.000001D9E5420000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: kernelbase.pdbUGP source: AMSilence.exe, 00000000.00000002.867065735.000001D9E4940000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: AMSilence.pdb source: AMSilence.exe
      Source: Binary string: msvcp_win.pdb source: AMSilence.exe, 00000000.00000002.866727460.000001D9E47C0000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: msvcp_win.pdbUGP source: AMSilence.exe, 00000000.00000002.866727460.000001D9E47C0000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: cryptbase.pdb source: AMSilence.exe, 00000000.00000002.869996844.000001D9E5510000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: advapi32.pdbUGP source: AMSilence.exe, 00000000.00000002.868648031.000001D9E4FE0000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: oleaut32.pdbUGP source: AMSilence.exe, 00000000.00000002.865771573.000001D9E4550000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: bcryptprimitives.pdb source: AMSilence.exe, 00000000.00000002.866180475.000001D9E4660000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: combase.pdb source: AMSilence.exe, 00000000.00000002.867537828.000001D9E4B80000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: ntdll.pdb source: AMSilence.exe, 00000000.00000002.864485270.000001D9E40D0000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: kernel32.pdb source: AMSilence.exe, 00000000.00000002.864715336.000001D9E4170000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: oleaut32.pdb source: AMSilence.exe, 00000000.00000002.865771573.000001D9E4550000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: combase.pdbUGP source: AMSilence.exe, 00000000.00000002.867537828.000001D9E4B80000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: apphelp.pdb source: AMSilence.exe, 00000000.00000002.865275547.000001D9E4350000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: ucrtbase.pdbUGP source: AMSilence.exe, 00000000.00000002.866352920.000001D9E46C0000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: cryptbase.pdbUGP source: AMSilence.exe, 00000000.00000002.869996844.000001D9E5510000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: bcrypt.pdbUGP source: AMSilence.exe, 00000000.00000002.868040567.000001D9E4D90000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: kernelbase.pdb source: AMSilence.exe, 00000000.00000002.867065735.000001D9E4940000.00000002.00001000.00020000.00000000.sdmp
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B325CBC0 HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,memset,FindFirstFileW,memmove,HeapFree,GetLastError,HeapFree,HeapFree,memmove,memmove,FindClose,memmove,FindClose,memcmp,HeapFree,HeapFree,HeapFree,memmove,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,FindClose,0_2_00007FF6B325CBC0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B3283A70 GetFileInformationByHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,memset,FindFirstFileW,FindClose,HeapFree,0_2_00007FF6B3283A70
      Source: AMSilence.exeString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-supportinternal_codedescriptionunknown_codeos_errorUnknow
      Source: AMSilence.exe, 00000000.00000002.867065735.000001D9E4940000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: DirectInput8Creatememstr_9414f9d0-e
      Source: AMSilence.exe, 00000000.00000002.867065735.000001D9E4940000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_57a49ad2-5
      Source: Yara matchFile source: 00000000.00000002.867065735.000001D9E4940000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: AMSilence.exe PID: 8496, type: MEMORYSTR
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B3253250 OutputDebugStringW,memset,OutputDebugStringW,GetModuleFileNameW,HeapFree,HeapFree,memset,OutputDebugStringW,HeapFree,CreateToolhelp32Snapshot,GetLastError,HeapFree,memset,ProcessPrng,Module32FirstW,HeapFree,GetLastError,GetLastError,GetLastError,HeapFree,HeapFree,HeapFree,HeapFree,Module32NextW,memcmp,memcmp,memset,HeapFree,memset,HeapFree,memset,OutputDebugStringW,HeapFree,memset,OutputDebugStringW,HeapFree,memset,OutputDebugStringW,HeapFree,OutputDebugStringW,HeapFree,GetModuleHandleW,HeapFree,GetModuleFileNameW,HeapFree,memset,memset,OutputDebugStringW,HeapFree,memset,OutputDebugStringW,HeapFree,HeapFree,memset,OutputDebugStringW,HeapFree,GetLastError,HeapFree,OutputDebugStringW,HeapFree,GetErrorInfo,HeapFree,memset,OutputDebugStringW,HeapFree,NtOpenFile,memset,memset,OutputDebugStringW,HeapFree,GetErrorInfo,HeapFree,OutputDebugStringW,HeapFree,HeapFree,memset,NtCreateSection,memset,memset,OutputDebugStringW,HeapFree,OutputDebugStringW,HeapFree,CloseHandle,GetLastError,GetErrorInfo,HeapFree,HeapFree,HeapFree,HeapFree,memset,OutputDebugStringW,HeapFree,Module32NextW,HeapFree,OutputDebugStringW,HeapFree,HeapFree,memset,GetCurrentProcess,NtMapViewOfSection,memset,memset,OutputDebugStringW,HeapFree,OutputDebugStringW,HeapFree,CloseHandle,CloseHandle,GetLastError,CloseHandle,GetLastError,OutputDebugStringW,HeapFree,HeapFree,memset,HeapFree,memset,OutputDebugStringW,HeapFree,GetCurrentProcess,memset,memset,OutputDebugStringW,HeapFree,GetCurrentProcess,memset,memset,OutputDebugStringW,HeapFree,memmove,memset,OutputDebugStringW,HeapFree,memset,memset,OutputDebugStringW,HeapFree,OutputDebugStringW,HeapFree,OutputDebugStringW,HeapFree,HeapFree,memset,OutputDebugStringW,HeapFree,HeapFree,NtUnmapViewOfSection,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,memset,OutputDebugStringW,HeapFree,memcmp,HeapFree,HeapFree,OutputDebugStringW,HeapFree,CloseHandle,CloseHandle,GetLastError,CloseHandle,GetLastError,GetLastError,HeapFree,CloseHandle,GetLastError,memset,OutputDebugStringW,HeapFree,HeapFree,HeapFree,GetLastError,CloseHandle,0_2_00007FF6B3253250
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B327B520 GetStdHandle,GetLastError,GetConsoleMode,NtWriteFile,WaitForSingleObject,RtlNtStatusToDosError,CloseHandle,0_2_00007FF6B327B520
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B325DD200_2_00007FF6B325DD20
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B325C3B00_2_00007FF6B325C3B0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B32583F00_2_00007FF6B32583F0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B325CBC00_2_00007FF6B325CBC0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B32532500_2_00007FF6B3253250
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B325B9F00_2_00007FF6B325B9F0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B32521E00_2_00007FF6B32521E0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B32588B00_2_00007FF6B32588B0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B3269D700_2_00007FF6B3269D70
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B328C4500_2_00007FF6B328C450
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B326E4500_2_00007FF6B326E450
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B32984E00_2_00007FF6B32984E0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B3281D300_2_00007FF6B3281D30
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B32703900_2_00007FF6B3270390
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B327F3F00_2_00007FF6B327F3F0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B3262C300_2_00007FF6B3262C30
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B3276C200_2_00007FF6B3276C20
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B3264A600_2_00007FF6B3264A60
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B327EAA00_2_00007FF6B327EAA0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B3292A900_2_00007FF6B3292A90
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B326B2F00_2_00007FF6B326B2F0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B32742F00_2_00007FF6B32742F0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B32972D00_2_00007FF6B32972D0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B32662C00_2_00007FF6B32662C0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B32511500_2_00007FF6B3251150
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B32651A00_2_00007FF6B32651A0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B328C1900_2_00007FF6B328C190
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B32732200_2_00007FF6B3273220
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B326C2100_2_00007FF6B326C210
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B32940600_2_00007FF6B3294060
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B32668900_2_00007FF6B3266890
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B32710800_2_00007FF6B3271080
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B32678B60_2_00007FF6B32678B6
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B326D1300_2_00007FF6B326D130
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B327B9000_2_00007FF6B327B900
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B328E7400_2_00007FF6B328E740
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B327BFA00_2_00007FF6B327BFA0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B327CF800_2_00007FF6B327CF80
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B328DFC00_2_00007FF6B328DFC0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B32678000_2_00007FF6B3267800
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B3283EA00_2_00007FF6B3283EA0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B3264EC00_2_00007FF6B3264EC0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B328CF300_2_00007FF6B328CF30
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B329A7200_2_00007FF6B329A720
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B327FF100_2_00007FF6B327FF10
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B32957000_2_00007FF6B3295700
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B3264D500_2_00007FF6B3264D50
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B3284D400_2_00007FF6B3284D40
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B326B5B00_2_00007FF6B326B5B0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B326C5A00_2_00007FF6B326C5A0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B327E5A00_2_00007FF6B327E5A0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B326ADE00_2_00007FF6B326ADE0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B32516200_2_00007FF6B3251620
      Source: C:\Users\user\Desktop\AMSilence.exeProcess token adjusted: Load DriverJump to behavior
      Source: C:\Users\user\Desktop\AMSilence.exeProcess token adjusted: SecurityJump to behavior
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: String function: 00007FF6B326E9D0 appears 59 times
      Source: AMSilence.exe, 00000000.00000002.865229613.000001D9E4330000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs AMSilence.exe
      Source: AMSilence.exe, 00000000.00000002.868879395.000001D9E5090000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsvcrt.dllj% vs AMSilence.exe
      Source: AMSilence.exe, 00000000.00000002.866289703.000001D9E46A0000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamebcryptprimitives.dllj% vs AMSilence.exe
      Source: AMSilence.exe, 00000000.00000002.868593632.000001D9E4FC0000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamerpcrt4.dllj% vs AMSilence.exe
      Source: AMSilence.exe, 00000000.00000002.865275547.000001D9E4350000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: {18A8B5B2-9D2F-4DB2-8307-196B5CC0CE6B}{9DE6F12F-0CB2-45E3-BAF1-FB0978255646}{22624CAC-FE50-451E-9261-E7F22AAB93EC}{5F72496A-514E-45FD-BF6C-21D75296EB78}{63C7DCCD-B53C-4A01-A9E3-30F6C38D793E}{8F5A098F-FE98-46EB-B2F6-859078D5E2F7}{E1236381-9522-4BB0-B0AB-AEF2CAB1205F}{10C4200A-0E69-40EA-8153-5F6ABB003C08}{E6B77E90-C966-4BC5-A29B-3EF9B2ADFFD1}{D2F983A5-5880-4964-B98F-67319C3625C4}{6E71D560-6E08-49E6-BF04-F94C85B54355}{3BE690E1-0665-430A-8F6D-89DDD4857989}{AB0BCAAD-7CC5-4CDA-A544-F858E7FF5B8D}{8AEE3B6E-E9A4-40B1-96EC-042F74EB8DCC}{0E7910B7-47A1-4EA8-AC71-63BD4126BF30}{59723693-A1CD-43FC-B4EC-CB48BDACF030}{73A8CA94-C105-4027-90FE-648F9D7B00ED}{9BD0B321-F521-46FA-9B06-0A5E6B0461C8}{A0B2DCF2-CBA3-4534-8EE2-D12D26ABB17B}{852EA32A-1D7A-49CC-8166-77B9DAEFBF7D}{9E248A91-7917-4105-BD0D-31E4965EC06E}{CCF7A2DD-43C3-4C6F-AB68-AF441163D0A0}{097A5E89-584D-4C58-B374-F31A68CA381D}{F83A0FCD-6D48-4714-8A38-D06D376AA7A0}{CECAF199-3F16-46C9-9F81-2905C16E0042}{8FFCB6B3-B3FF-401A-AD20-A5390AAA62B7}{A9C0CE5E-9A1A-47C9-82B6-538C880FDFF0}{8E412EFC-5B34-4C46-9BB4-71F7290EFE3F}FileVersionProductVersionFileDescriptionCompanyNameProductNameOriginalFilenameInternalNameLegalCopyrightAcGenral.dllAcLayers.dllAcRes.dllAcSpecfc.dllAcWinRT.dllacwow64.dllAcXtrnal.dllKeyboardFilterShim.dllMasterShim.dlldepdetctuacdetctluadgmgt.dllluapriv.dllEMET.dllEMET64.dllLogExts.dllLogShim.dllInstallerDetectionSetupLayer.exeDXGUseWarpRenderingEntry.exeContainer32bitCompatModeEntry.exeNTDLL.DLLVERIFIER.DLLETW0 vs AMSilence.exe
      Source: AMSilence.exe, 00000000.00000002.868091100.000001D9E4DD0000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamebcrypt.dllj% vs AMSilence.exe
      Source: AMSilence.exe, 00000000.00000002.866482949.000001D9E4720000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameucrtbase.dllj% vs AMSilence.exe
      Source: AMSilence.exe, 00000000.00000002.868760246.000001D9E5040000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameadvapi32.dllj% vs AMSilence.exe
      Source: AMSilence.exe, 00000000.00000002.867484560.000001D9E4B60000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsvcp_win.dllj% vs AMSilence.exe
      Source: AMSilence.exe, 00000000.00000002.869759728.000001D9E5480000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesechost.dllj% vs AMSilence.exe
      Source: AMSilence.exe, 00000000.00000002.870048646.000001D9E5550000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamecryptbase.dllj% vs AMSilence.exe
      Source: AMSilence.exe, 00000000.00000002.869946835.000001D9E54F0000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs AMSilence.exe
      Source: AMSilence.exe, 00000000.00000002.864715336.000001D9E4170000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: FileVersionProductVersionFileDescriptionCompanyNameProductNameOriginalFilenameInternalNameLegalCopyright vs AMSilence.exe
      Source: AMSilence.exe, 00000000.00000002.865661302.000001D9E44E0000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs AMSilence.exe
      Source: AMSilence.exe, 00000000.00000002.865371563.000001D9E43A0000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameApphelpj% vs AMSilence.exe
      Source: AMSilence.exe, 00000000.00000002.869345089.000001D9E52F0000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCOMBASE.DLLj% vs AMSilence.exe
      Source: AMSilence.exe, 00000000.00000002.864922036.000001D9E4200000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKernelbase.dllj% vs AMSilence.exe
      Source: AMSilence.exe, 00000000.00000002.865939840.000001D9E45B0000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOLEAUT32.DLLj% vs AMSilence.exe
      Source: classification engineClassification label: mal48.evad.winEXE@2/0@0/0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B327CF80 memset,GetModuleHandleW,FormatMessageW,memmove,GetLastError,HeapFree,HeapFree,0_2_00007FF6B327CF80
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B325DD20 GetCurrentProcess,OpenProcessToken,memmove,GetLastError,LookupPrivilegeValueA,AdjustTokenPrivileges,HeapFree,memset,GetLastError,HeapFree,memset,OutputDebugStringW,HeapFree,OutputDebugStringW,HeapFree,ProcessPrng,memset,OutputDebugStringW,memset,memset,OutputDebugStringW,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,HeapFree,HeapFree,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,HeapFree,memset,memset,OutputDebugStringW,HeapFree,GetCurrentProcess,memset,OutputDebugStringW,HeapFree,memset,OutputDebugStringW,HeapFree,memset,OutputDebugStringW,memset,OutputDebugStringW,HeapFree,memset,OutputDebugStringW,HeapFree,WriteProcessMemory,HeapFree,memset,OutputDebugStringW,memset,OutputDebugStringW,HeapFree,memset,OutputDebugStringW,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,memset,OutputDebugStringW,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,HeapFree,memset,OutputDebugStringW,HeapFree,HeapFree,HeapFree,HeapFree,memset,HeapFree,HeapFree,OutputDebugStringW,HeapFree,OutputDebugStringW,HeapFree,HeapFree,HeapFree,memset,OutputDebugStringW,HeapFree,memset,OutputDebugStringW,HeapFree,memset,OutputDebugStringW,OutputDebugStringW,memset,OutputDebugStringW,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,memmove,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,memset,OutputDebugStringW,HeapFree,memset,OutputDebugStringW,HeapFree,memset,OutputDebugStringW,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,HeapFree,HeapFree,HeapFree,memset,OutputDebugStringW,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,0_2_00007FF6B325DD20
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B3253250 OutputDebugStringW,memset,OutputDebugStringW,GetModuleFileNameW,HeapFree,HeapFree,memset,OutputDebugStringW,HeapFree,CreateToolhelp32Snapshot,GetLastError,HeapFree,memset,ProcessPrng,Module32FirstW,HeapFree,GetLastError,GetLastError,GetLastError,HeapFree,HeapFree,HeapFree,HeapFree,Module32NextW,memcmp,memcmp,memset,HeapFree,memset,HeapFree,memset,OutputDebugStringW,HeapFree,memset,OutputDebugStringW,HeapFree,memset,OutputDebugStringW,HeapFree,OutputDebugStringW,HeapFree,GetModuleHandleW,HeapFree,GetModuleFileNameW,HeapFree,memset,memset,OutputDebugStringW,HeapFree,memset,OutputDebugStringW,HeapFree,HeapFree,memset,OutputDebugStringW,HeapFree,GetLastError,HeapFree,OutputDebugStringW,HeapFree,GetErrorInfo,HeapFree,memset,OutputDebugStringW,HeapFree,NtOpenFile,memset,memset,OutputDebugStringW,HeapFree,GetErrorInfo,HeapFree,OutputDebugStringW,HeapFree,HeapFree,memset,NtCreateSection,memset,memset,OutputDebugStringW,HeapFree,OutputDebugStringW,HeapFree,CloseHandle,GetLastError,GetErrorInfo,HeapFree,HeapFree,HeapFree,HeapFree,memset,OutputDebugStringW,HeapFree,Module32NextW,HeapFree,OutputDebugStringW,HeapFree,HeapFree,memset,GetCurrentProcess,NtMapViewOfSection,memset,memset,OutputDebugStringW,HeapFree,OutputDebugStringW,HeapFree,CloseHandle,CloseHandle,GetLastError,CloseHandle,GetLastError,OutputDebugStringW,HeapFree,HeapFree,memset,HeapFree,memset,OutputDebugStringW,HeapFree,GetCurrentProcess,memset,memset,OutputDebugStringW,HeapFree,GetCurrentProcess,memset,memset,OutputDebugStringW,HeapFree,memmove,memset,OutputDebugStringW,HeapFree,memset,memset,OutputDebugStringW,HeapFree,OutputDebugStringW,HeapFree,OutputDebugStringW,HeapFree,HeapFree,memset,OutputDebugStringW,HeapFree,HeapFree,NtUnmapViewOfSection,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,memset,OutputDebugStringW,HeapFree,memcmp,HeapFree,HeapFree,OutputDebugStringW,HeapFree,CloseHandle,CloseHandle,GetLastError,CloseHandle,GetLastError,GetLastError,HeapFree,CloseHandle,GetLastError,memset,OutputDebugStringW,HeapFree,HeapFree,HeapFree,GetLastError,CloseHandle,0_2_00007FF6B3253250
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8524:304:WilStaging_02
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8524:120:WilError_03
      Source: AMSilence.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\AMSilence.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\AMSilence.exe "C:\Users\user\Desktop\AMSilence.exe"
      Source: C:\Users\user\Desktop\AMSilence.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\AMSilence.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\AMSilence.exeSection loaded: vcruntime140.dllJump to behavior
      Source: C:\Users\user\Desktop\AMSilence.exeSection loaded: cryptbase.dllJump to behavior
      Source: AMSilence.exeStatic PE information: Image base 0x140000000 > 0x60000000
      Source: AMSilence.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: AMSilence.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: kernel32.pdbUGP source: AMSilence.exe, 00000000.00000002.864715336.000001D9E4170000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: msvcrt.pdbGCTL source: AMSilence.exe, 00000000.00000002.868808213.000001D9E5060000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: rpcrt4.pdb source: AMSilence.exe, 00000000.00000002.868465957.000001D9E4F60000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: bcrypt.pdb source: AMSilence.exe, 00000000.00000002.868040567.000001D9E4D90000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: sechost.pdb source: AMSilence.exe, 00000000.00000002.869622968.000001D9E5420000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: ucrtbase.pdb source: AMSilence.exe, 00000000.00000002.866352920.000001D9E46C0000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: D:\a01\_work\9\s\\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: AMSilence.exe, 00000000.00000002.869833791.000001D9E54B0000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: msvcrt.pdb source: AMSilence.exe, 00000000.00000002.868808213.000001D9E5060000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: ntdll.pdbUGP source: AMSilence.exe, 00000000.00000002.864485270.000001D9E40D0000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: rpcrt4.pdbUGP source: AMSilence.exe, 00000000.00000002.868465957.000001D9E4F60000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: apphelp.pdbUGP source: AMSilence.exe, 00000000.00000002.865275547.000001D9E4350000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: bcryptprimitives.pdbUGP source: AMSilence.exe, 00000000.00000002.866180475.000001D9E4660000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: advapi32.pdb source: AMSilence.exe, 00000000.00000002.868648031.000001D9E4FE0000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: sechost.pdbUGP source: AMSilence.exe, 00000000.00000002.869622968.000001D9E5420000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: kernelbase.pdbUGP source: AMSilence.exe, 00000000.00000002.867065735.000001D9E4940000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: AMSilence.pdb source: AMSilence.exe
      Source: Binary string: msvcp_win.pdb source: AMSilence.exe, 00000000.00000002.866727460.000001D9E47C0000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: msvcp_win.pdbUGP source: AMSilence.exe, 00000000.00000002.866727460.000001D9E47C0000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: cryptbase.pdb source: AMSilence.exe, 00000000.00000002.869996844.000001D9E5510000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: advapi32.pdbUGP source: AMSilence.exe, 00000000.00000002.868648031.000001D9E4FE0000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: oleaut32.pdbUGP source: AMSilence.exe, 00000000.00000002.865771573.000001D9E4550000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: bcryptprimitives.pdb source: AMSilence.exe, 00000000.00000002.866180475.000001D9E4660000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: combase.pdb source: AMSilence.exe, 00000000.00000002.867537828.000001D9E4B80000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: ntdll.pdb source: AMSilence.exe, 00000000.00000002.864485270.000001D9E40D0000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: kernel32.pdb source: AMSilence.exe, 00000000.00000002.864715336.000001D9E4170000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: oleaut32.pdb source: AMSilence.exe, 00000000.00000002.865771573.000001D9E4550000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: combase.pdbUGP source: AMSilence.exe, 00000000.00000002.867537828.000001D9E4B80000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: apphelp.pdb source: AMSilence.exe, 00000000.00000002.865275547.000001D9E4350000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: ucrtbase.pdbUGP source: AMSilence.exe, 00000000.00000002.866352920.000001D9E46C0000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: cryptbase.pdbUGP source: AMSilence.exe, 00000000.00000002.869996844.000001D9E5510000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: bcrypt.pdbUGP source: AMSilence.exe, 00000000.00000002.868040567.000001D9E4D90000.00000002.00001000.00020000.00000000.sdmp
      Source: Binary string: kernelbase.pdb source: AMSilence.exe, 00000000.00000002.867065735.000001D9E4940000.00000002.00001000.00020000.00000000.sdmp
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B3292A90 SetLastError,GetCurrentDirectoryW,GetLastError,GetLastError,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlLookupFunctionEntry,WaitForSingleObjectEx,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetCurrentProcess,memset,GetProcAddress,GetCurrentProcess,lstrlenW,GetCurrentProcessId,CreateMutexA,CloseHandle,ReleaseMutex,GetProcAddress,GetCurrentProcess,GetProcAddress,GetCurrentProcess,HeapFree,GetCurrentProcess,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,ReleaseMutex,RtlVirtualUnwind,memset,WideCharToMultiByte,HeapFree,HeapFree,HeapFree,0_2_00007FF6B3292A90
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B3292A90 SetLastError,GetCurrentDirectoryW,GetLastError,GetLastError,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlLookupFunctionEntry,WaitForSingleObjectEx,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetCurrentProcess,memset,GetProcAddress,GetCurrentProcess,lstrlenW,GetCurrentProcessId,CreateMutexA,CloseHandle,ReleaseMutex,GetProcAddress,GetCurrentProcess,GetProcAddress,GetCurrentProcess,HeapFree,GetCurrentProcess,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,ReleaseMutex,RtlVirtualUnwind,memset,WideCharToMultiByte,HeapFree,HeapFree,HeapFree,0_2_00007FF6B3292A90

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\AMSilence.exeSection loaded: OutputDebugStringW count: 1984
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B325CBC0 HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,memset,FindFirstFileW,memmove,HeapFree,GetLastError,HeapFree,HeapFree,memmove,memmove,FindClose,memmove,FindClose,memcmp,HeapFree,HeapFree,HeapFree,memmove,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,FindClose,0_2_00007FF6B325CBC0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B3283A70 GetFileInformationByHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,memset,FindFirstFileW,FindClose,HeapFree,0_2_00007FF6B3283A70
      Source: AMSilence.exe, 00000000.00000002.867065735.000001D9E4940000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: DisableGuestVmNetworkConnectivity
      Source: AMSilence.exe, 00000000.00000002.867065735.000001D9E4940000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: EnableGuestVmNetworkConnectivity
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B325C3B0 OutputDebugStringW,memset,OutputDebugStringW,HeapFree,memset,memset,OutputDebugStringW,LdrLoadDll,memset,memset,OutputDebugStringW,HeapFree,OutputDebugStringW,HeapFree,0_2_00007FF6B325C3B0
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B3297E60 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6B3297E60
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B325DD20 GetCurrentProcess,OpenProcessToken,memmove,GetLastError,LookupPrivilegeValueA,AdjustTokenPrivileges,HeapFree,memset,GetLastError,HeapFree,memset,OutputDebugStringW,HeapFree,OutputDebugStringW,HeapFree,ProcessPrng,memset,OutputDebugStringW,memset,memset,OutputDebugStringW,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,HeapFree,HeapFree,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,HeapFree,memset,memset,OutputDebugStringW,HeapFree,GetCurrentProcess,memset,OutputDebugStringW,HeapFree,memset,OutputDebugStringW,HeapFree,memset,OutputDebugStringW,memset,OutputDebugStringW,HeapFree,memset,OutputDebugStringW,HeapFree,WriteProcessMemory,HeapFree,memset,OutputDebugStringW,memset,OutputDebugStringW,HeapFree,memset,OutputDebugStringW,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,memset,OutputDebugStringW,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,HeapFree,memset,OutputDebugStringW,HeapFree,HeapFree,HeapFree,HeapFree,memset,HeapFree,HeapFree,OutputDebugStringW,HeapFree,OutputDebugStringW,HeapFree,HeapFree,HeapFree,memset,OutputDebugStringW,HeapFree,memset,OutputDebugStringW,HeapFree,memset,OutputDebugStringW,OutputDebugStringW,memset,OutputDebugStringW,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,memmove,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,memset,OutputDebugStringW,HeapFree,memset,OutputDebugStringW,HeapFree,memset,OutputDebugStringW,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,HeapFree,HeapFree,HeapFree,memset,OutputDebugStringW,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,0_2_00007FF6B325DD20
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B3292A90 SetLastError,GetCurrentDirectoryW,GetLastError,GetLastError,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlLookupFunctionEntry,WaitForSingleObjectEx,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetCurrentProcess,memset,GetProcAddress,GetCurrentProcess,lstrlenW,GetCurrentProcessId,CreateMutexA,CloseHandle,ReleaseMutex,GetProcAddress,GetCurrentProcess,GetProcAddress,GetCurrentProcess,HeapFree,GetCurrentProcess,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,ReleaseMutex,RtlVirtualUnwind,memset,WideCharToMultiByte,HeapFree,HeapFree,HeapFree,0_2_00007FF6B3292A90
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B3292A60 HeapAlloc,GetProcessHeap,HeapAlloc,0_2_00007FF6B3292A60
      Source: C:\Users\user\Desktop\AMSilence.exeProcess token adjusted: DebugJump to behavior
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B3298004 SetUnhandledExceptionFilter,0_2_00007FF6B3298004
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B3297E60 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6B3297E60

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\AMSilence.exeNtUnmapViewOfSection: Indirect: 0x7FF6B3257AF9Jump to behavior
      Source: C:\Users\user\Desktop\AMSilence.exeQueries volume information: C:\ProgramData\Microsoft\Windows Defender\Platform VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\AMSilence.exeQueries volume information: C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2107.4-0 VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\AMSilence.exeQueries volume information: C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2108.7-0 VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\AMSilence.exeQueries volume information: C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2108.7-0\MpClient.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\AMSilence.exeQueries volume information: C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2108.7-0\MpOAV.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\AMSilence.exeQueries volume information: C:\ProgramData\Microsoft\Windows Defender\Platform VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\AMSilence.exeQueries volume information: C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2107.4-0 VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\AMSilence.exeQueries volume information: C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2108.7-0 VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\AMSilence.exeQueries volume information: C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2108.7-0\MpClient.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\AMSilence.exeQueries volume information: C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2108.7-0\MpOAV.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B328E740 ProcessPrng,GetCurrentProcessId,ProcessPrng,HeapFree,ProcessPrng,CreateNamedPipeW,GetLastError,HeapFree,HeapFree,HeapFree,CloseHandle,HeapFree,HeapFree,ProcessPrng,HeapFree,0_2_00007FF6B328E740
      Source: C:\Users\user\Desktop\AMSilence.exeCode function: 0_2_00007FF6B3297D38 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6B3297D38
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      LSASS Driver
      1
      Access Token Manipulation
      1
      Virtualization/Sandbox Evasion
      21
      Input Capture
      1
      System Time Discovery
      Remote Services21
      Input Capture
      2
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      DLL Side-Loading
      2
      Process Injection
      1
      Access Token Manipulation
      LSASS Memory31
      Security Software Discovery
      Remote Desktop Protocol1
      Archive Collected Data
      Junk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      Abuse Elevation Control Mechanism
      2
      Process Injection
      Security Account Manager1
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
      LSASS Driver
      1
      Deobfuscate/Decode Files or Information
      NTDS1
      Process Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
      DLL Side-Loading
      1
      Abuse Elevation Control Mechanism
      LSA Secrets1
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Obfuscated Files or Information
      Cached Domain Credentials12
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      https://docs.rs/getrandom#nodejs-es-module-supportinternal_codedescriptionunknown_codeos_errorUnknowAMSilence.exefalse
        unknown
        No contacted IP infos
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1523566
        Start date and time:2024-10-01 19:29:22 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 8m 6s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
        Number of analysed new started processes analysed:4
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:AMSilence.exe
        Detection:MAL
        Classification:mal48.evad.winEXE@2/0@0/0
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 18
        • Number of non-executed functions: 79
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Stop behavior analysis, all processes terminated
        • Exclude process from analysis (whitelisted): dllhost.exe
        • Not all processes where analyzed, report is missing behavior information
        • VT rate limit hit for: AMSilence.exe
        No simulations
        No context
        No context
        No context
        No context
        No context
        No created / dropped files found
        File type:PE32+ executable (console) x86-64, for MS Windows
        Entropy (8bit):6.3723334444952595
        TrID:
        • Win64 Executable Console (202006/5) 92.65%
        • Win64 Executable (generic) (12005/4) 5.51%
        • Generic Win/DOS Executable (2004/3) 0.92%
        • DOS Executable Generic (2002/1) 0.92%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:AMSilence.exe
        File size:380'928 bytes
        MD5:c1dc0bfe65e66a2822986bf30d93c6c5
        SHA1:2cb4013675c2de31bbe4acdd4e568c39709c900c
        SHA256:df3b8aeae03934ed902a40e32e7974c9cbd1480f7cf869413d24824f0efd5ee1
        SHA512:de3a8500a39b80d3f173219dc5200bd690edd1f05e7fa3f05d93451a5f03c36130ecc17349e6d963ccdef27c9c18adfa8603e65d2d308cfd85ebaf4a19695b7d
        SSDEEP:6144:J96K4oWCpn8Tn3khs4K9ywkV6M4WxZvB/ROpKuLLiy8bvmhnCFB2PahzqWwd:J96K4oWCpEn3khsEQcLPOLR+2GqW
        TLSH:CA843A16FA55A8FCD05AC074C35AA6737A327C891B35BDFB12C856343F65AE06A3CB04
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......z.o.>...>...>...7...2....&..<....&..=....&..7....&..)...>.......>...+...v'..?...Rich>...........................PE..d....0.f...
        Icon Hash:90cececece8e8eb0
        Entrypoint:0x140047adc
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x140000000
        Subsystem:windows cui
        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Time Stamp:0x66FC30F6 [Tue Oct 1 17:27:18 2024 UTC]
        TLS Callbacks:0x4002c730, 0x1
        CLR (.Net) Version:
        OS Version Major:6
        OS Version Minor:0
        File Version Major:6
        File Version Minor:0
        Subsystem Version Major:6
        Subsystem Version Minor:0
        Import Hash:4641514754548e870c8697239bced05e
        Instruction
        dec eax
        sub esp, 28h
        call 00007F18048D28D8h
        dec eax
        add esp, 28h
        jmp 00007F18048D24F7h
        int3
        int3
        jmp 00007F18048D2C78h
        int3
        int3
        int3
        dec eax
        sub esp, 28h
        call 00007F18048D2F40h
        test eax, eax
        je 00007F18048D26A3h
        dec eax
        mov eax, dword ptr [00000030h]
        dec eax
        mov ecx, dword ptr [eax+08h]
        jmp 00007F18048D2687h
        dec eax
        cmp ecx, eax
        je 00007F18048D2696h
        xor eax, eax
        dec eax
        cmpxchg dword ptr [000146B4h], ecx
        jne 00007F18048D2670h
        xor al, al
        dec eax
        add esp, 28h
        ret
        mov al, 01h
        jmp 00007F18048D2679h
        int3
        int3
        int3
        dec eax
        sub esp, 28h
        test ecx, ecx
        jne 00007F18048D2689h
        mov byte ptr [0001469Dh], 00000001h
        call 00007F18048D2C2Dh
        call 00007F18048D2940h
        test al, al
        jne 00007F18048D2686h
        xor al, al
        jmp 00007F18048D2696h
        call 00007F18048D2933h
        test al, al
        jne 00007F18048D268Bh
        xor ecx, ecx
        call 00007F18048D2928h
        jmp 00007F18048D266Ch
        mov al, 01h
        dec eax
        add esp, 28h
        ret
        int3
        int3
        inc eax
        push ebx
        dec eax
        sub esp, 20h
        cmp byte ptr [00014664h], 00000000h
        mov ebx, ecx
        jne 00007F18048D26E9h
        cmp ecx, 01h
        jnbe 00007F18048D26ECh
        call 00007F18048D2EB6h
        test eax, eax
        je 00007F18048D26AAh
        test ebx, ebx
        jne 00007F18048D26A6h
        dec eax
        lea ecx, dword ptr [0001464Eh]
        call 00007F18048D2F5Eh
        test eax, eax
        jne 00007F18048D2692h
        Programming Language:
        • [IMP] VS2008 SP1 build 30729
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x5a45c0x140.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x5d0000x1e90.pdata
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x5f0000x584.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x557500x54.rdata
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x558000x28.rdata
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x556100x140.rdata
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x4b0000x458.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x49da30x49e00dc29cf1fd2a57960651f8d0fbafd29c2False0.48717414868866327data6.329665812914689IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0x4b0000x105140x106006771a5cb3519441c06af93163579c529False0.3880456822519084data5.628015629850922IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0x5c0000x2600x20040fa3f513bda18808a1f247a421f5545False0.216796875data1.4582419783356335IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .pdata0x5d0000x1e900x20007f91fe75228a988bd052bacbcbcf046bFalse0.49609375data5.506768558176253IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x5f0000x5840x600df4bac8055ab5d0ff68e76d88cc7b0b9False0.6256510416666666data5.200238501935515IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        DLLImport
        bcryptprimitives.dllProcessPrng
        api-ms-win-core-synch-l1-2-0.dllWaitOnAddress, WakeByAddressAll, WakeByAddressSingle
        kernel32.dllSetThreadStackGuarantee, GetCurrentThread, WriteFileEx, SleepEx, ReadFileEx, WaitForMultipleObjects, GetOverlappedResult, GetExitCodeProcess, GetCurrentProcessId, CancelIo, ReadFile, HeapAlloc, GetProcessHeap, GetCurrentDirectoryW, RtlCaptureContext, RtlLookupFunctionEntry, WaitForSingleObjectEx, LoadLibraryA, CreateMutexA, ReleaseMutex, RtlVirtualUnwind, WideCharToMultiByte, LoadLibraryExA, DeleteProcThreadAttributeList, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, QueryPerformanceCounter, UpdateProcThreadAttribute, InitializeProcThreadAttributeList, CreateThread, DuplicateHandle, GetFileAttributesW, CreateProcessW, GetWindowsDirectoryW, GetSystemDirectoryW, CompareStringOrdinal, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetFileInformationByHandleEx, GetFileInformationByHandle, GetFullPathNameW, IsDebuggerPresent, SetFileInformationByHandle, CreateFileW, GetEnvironmentVariableW, lstrlenW, FormatMessageW, SetLastError, GetProcAddress, WriteConsoleW, MultiByteToWideChar, UnhandledExceptionFilter, WaitForSingleObject, SetUnhandledExceptionFilter, GetConsoleMode, GetStdHandle, HeapReAlloc, FindNextFileW, FindClose, FindFirstFileW, GetModuleHandleA, GetCurrentProcess, GetModuleHandleW, Module32NextW, Module32FirstW, CreateToolhelp32Snapshot, GetModuleFileNameW, OutputDebugStringW, GetLastError, CloseHandle, HeapFree, CreateNamedPipeW, CreateEventW, IsProcessorFeaturePresent
        oleaut32.dllSysStringLen, GetErrorInfo, SysFreeString
        advapi32.dllAdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, SystemFunction036
        bcrypt.dllBCryptGenRandom
        ntdll.dllNtWriteFile, RtlNtStatusToDosError, NtReadFile
        api-ms-win-core-winrt-error-l1-1-0.dllRoOriginateErrorW
        VCRUNTIME140.dllmemmove, memcmp, memset, __C_specific_handler, memcpy, __current_exception_context, __current_exception, __CxxFrameHandler3
        api-ms-win-crt-string-l1-1-0.dllstrlen
        api-ms-win-crt-runtime-l1-1-0.dll_c_exit, __p___argc, terminate, _exit, _cexit, _initterm_e, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _configure_narrow_argv, exit, _set_app_type, _seh_filter_exe, _register_thread_local_exe_atexit_callback, _crt_atexit, _initialize_onexit_table, _register_onexit_function, __p___argv
        api-ms-win-crt-math-l1-1-0.dll__setusermatherr
        api-ms-win-crt-stdio-l1-1-0.dll_set_fmode, __p__commode
        api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
        api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, free
        No network behavior found

        Click to jump to process

        Click to jump to process

        Click to jump to process

        Target ID:0
        Start time:13:35:31
        Start date:01/10/2024
        Path:C:\Users\user\Desktop\AMSilence.exe
        Wow64 process (32bit):false
        Commandline:"C:\Users\user\Desktop\AMSilence.exe"
        Imagebase:0x7ff6b3250000
        File size:380'928 bytes
        MD5 hash:C1DC0BFE65E66A2822986BF30D93C6C5
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.867065735.000001D9E4940000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
        Reputation:low
        Has exited:true

        Target ID:1
        Start time:13:35:31
        Start date:01/10/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff793500000
        File size:875'008 bytes
        MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Reset < >

          Execution Graph

          Execution Coverage:5.3%
          Dynamic/Decrypted Code Coverage:0%
          Signature Coverage:79.8%
          Total number of Nodes:1238
          Total number of Limit Nodes:8
          execution_graph 24676 7ff6b3297960 24677 7ff6b3297979 24676->24677 24678 7ff6b3297981 24677->24678 24679 7ff6b3297ab7 24677->24679 24681 7ff6b3297ac1 24678->24681 24686 7ff6b329799f 24678->24686 25065 7ff6b3297e60 9 API calls 24679->25065 25066 7ff6b3297e60 9 API calls 24681->25066 24683 7ff6b3297acc 24685 7ff6b3297ad4 _exit 24683->24685 24684 7ff6b32979c4 24686->24684 24687 7ff6b3297a4a _get_initial_narrow_environment __p___argv __p___argc 24686->24687 24690 7ff6b3297a42 _register_thread_local_exe_atexit_callback 24686->24690 24696 7ff6b325dd20 24687->24696 24689 7ff6b3297a6c 25064 7ff6b3297fb0 GetModuleHandleW 24689->25064 24690->24687 24692 7ff6b3297a73 24692->24683 24693 7ff6b3297a77 24692->24693 24694 7ff6b3297a81 24693->24694 24695 7ff6b3297a7c _cexit 24693->24695 24694->24684 24695->24694 25067 7ff6b3273100 24696->25067 24699 7ff6b3273100 52 API calls 24752 7ff6b325ddd4 24699->24752 24700 7ff6b325de01 GetCurrentProcess OpenProcessToken 24701 7ff6b325dec0 GetLastError 24700->24701 24700->24752 24702 7ff6b325e129 24701->24702 24704 7ff6b326dc80 51 API calls 24702->24704 24703 7ff6b32620dd 25691 7ff6b326d7b0 50 API calls 24703->25691 24705 7ff6b325e1bb memset 24704->24705 24708 7ff6b325e2aa OutputDebugStringW 24705->24708 24705->24752 24710 7ff6b325e2c2 HeapFree 24708->24710 24708->24752 24709 7ff6b32620ee 25692 7ff6b3299160 24709->25692 24710->24752 24712 7ff6b325de73 memmove 24712->24752 24713 7ff6b325df92 LookupPrivilegeValueA 24715 7ff6b325dfbc AdjustTokenPrivileges 24713->24715 24716 7ff6b325e0f0 GetLastError 24713->24716 24714 7ff6b325e3ad 24717 7ff6b325e3e6 ProcessPrng 24714->24717 24718 7ff6b325e3c9 24714->24718 24715->24716 24720 7ff6b325e001 24715->24720 24716->24702 24722 7ff6b325e117 HeapFree 24716->24722 24721 7ff6b325e432 memset OutputDebugStringW 24717->24721 24718->24721 24719 7ff6b326118c 24728 7ff6b32611e6 memmove 24719->24728 24723 7ff6b325e00a HeapFree 24720->24723 25086 7ff6b326dc80 24720->25086 25097 7ff6b3253250 memset OutputDebugStringW 24721->25097 24722->24702 24723->24720 24727 7ff6b325e081 memset 24732 7ff6b325e37a OutputDebugStringW 24727->24732 24727->24752 24733 7ff6b3292a60 3 API calls 24728->24733 24729 7ff6b325e4fb 24734 7ff6b326dc80 51 API calls 24729->24734 24730 7ff6b325e5d8 memset OutputDebugStringW memset OutputDebugStringW 25373 7ff6b325cbc0 24730->25373 24736 7ff6b325e396 HeapFree 24732->24736 24732->24752 24737 7ff6b326120e 24733->24737 24738 7ff6b325e578 memset 24734->24738 24735 7ff6b325e6f5 24740 7ff6b325e8dd 24735->24740 24741 7ff6b325e716 24735->24741 24736->24752 24742 7ff6b3261217 24737->24742 24743 7ff6b32622b3 24737->24743 24739 7ff6b325e87a OutputDebugStringW 24738->24739 24765 7ff6b325e5b3 24738->24765 24745 7ff6b325e89b HeapFree 24739->24745 24779 7ff6b325e8ad 24739->24779 24747 7ff6b325e8fd memset OutputDebugStringW 24740->24747 24748 7ff6b325e8e7 HeapFree 24740->24748 24746 7ff6b326dc80 51 API calls 24741->24746 25670 7ff6b3262810 50 API calls 24742->25670 24744 7ff6b3299160 50 API calls 24743->24744 24751 7ff6b32622c2 24744->24751 24745->24779 24753 7ff6b325e790 memset 24746->24753 24754 7ff6b325e97d 24747->24754 24748->24747 24750 7ff6b326125a 25671 7ff6b3262900 52 API calls 24750->25671 24757 7ff6b3299160 50 API calls 24751->24757 24752->24700 24752->24703 24752->24708 24752->24709 24752->24712 24752->24713 24752->24714 24752->24719 24752->24732 25080 7ff6b3292a60 24752->25080 24759 7ff6b32600da OutputDebugStringW 24753->24759 24778 7ff6b325e7cb 24753->24778 24770 7ff6b32620fb 24754->24770 25486 7ff6b325c3b0 24754->25486 24755 7ff6b3299160 50 API calls 24755->24770 24761 7ff6b32622cf HeapFree 24757->24761 24758 7ff6b325e8d8 24758->24689 24763 7ff6b32600fb HeapFree 24759->24763 24764 7ff6b326010d 24759->24764 24760 7ff6b32612b7 25672 7ff6b3291c00 391 API calls 24760->25672 24761->24689 24762 7ff6b326040c 24762->24758 24766 7ff6b326041b HeapFree 24762->24766 24763->24764 24768 7ff6b3292a60 3 API calls 24764->24768 24765->24739 24766->24758 24772 7ff6b3260120 24768->24772 24770->24755 24775 7ff6b3299180 50 API calls 24770->24775 24771 7ff6b32612c9 24776 7ff6b32613c9 24771->24776 24777 7ff6b32612e3 24771->24777 24772->24770 24781 7ff6b3292a60 3 API calls 24772->24781 24774 7ff6b32603f7 HeapFree 24774->24779 24775->24770 25675 7ff6b3251620 18 API calls 24776->25675 24784 7ff6b326dc80 51 API calls 24777->24784 24778->24759 24779->24758 24779->24762 24779->24774 24779->24779 24780 7ff6b325e9a6 memset OutputDebugStringW 24782 7ff6b325ea53 24780->24782 24785 7ff6b326015d 24781->24785 24782->24770 25626 7ff6b3252e70 24782->25626 24787 7ff6b3261344 24784->24787 24785->24770 24788 7ff6b3260166 24785->24788 24786 7ff6b326141b 24789 7ff6b3261428 24786->24789 24790 7ff6b3262061 24786->24790 25673 7ff6b32699a0 55 API calls 24787->25673 24797 7ff6b326dc80 51 API calls 24788->24797 24795 7ff6b326da10 53 API calls 24789->24795 25688 7ff6b32515b0 HeapFree HeapFree 24790->25688 24792 7ff6b325ea7a 24800 7ff6b3292a60 3 API calls 24792->24800 24798 7ff6b326143e 24795->24798 24796 7ff6b326206d HeapFree 25689 7ff6b3251e20 8 API calls 24796->25689 24803 7ff6b32601fd memset 24797->24803 24804 7ff6b326dc80 51 API calls 24798->24804 24799 7ff6b32613b8 25674 7ff6b3251620 18 API calls 24799->25674 24898 7ff6b325eb34 24800->24898 24807 7ff6b32602ea OutputDebugStringW 24803->24807 24829 7ff6b3260238 24803->24829 24808 7ff6b326149f 24804->24808 24805 7ff6b326208b 24811 7ff6b32620a9 24805->24811 24817 7ff6b3262096 HeapFree 24805->24817 24806 7ff6b32613c4 24812 7ff6b32614e1 HeapFree 24806->24812 24814 7ff6b326030b HeapFree 24807->24814 24827 7ff6b326031d 24807->24827 25676 7ff6b32699a0 55 API calls 24808->25676 24809 7ff6b32613a6 HeapFree 24809->24799 24810 7ff6b3261351 24810->24799 24810->24809 24815 7ff6b3261394 HeapFree 24810->24815 25690 7ff6b32515b0 HeapFree HeapFree 24811->25690 24816 7ff6b32614fd HeapFree 24812->24816 24832 7ff6b3261513 24812->24832 24814->24827 24815->24809 24816->24832 24817->24811 24819 7ff6b32614ac 24822 7ff6b32614d5 24819->24822 24824 7ff6b32614bf HeapFree 24819->24824 24820 7ff6b3261556 24823 7ff6b3261574 24820->24823 24834 7ff6b3261565 HeapFree 24820->24834 24821 7ff6b3261784 24833 7ff6b326dc80 51 API calls 24821->24833 25677 7ff6b32515b0 HeapFree HeapFree 24822->25677 24830 7ff6b3261594 24823->24830 24831 7ff6b326157e HeapFree 24823->24831 24824->24822 24826 7ff6b326034a HeapFree 24826->24779 24827->24779 24827->24826 24828 7ff6b3261532 24828->24820 25679 7ff6b3266250 7 API calls 24828->25679 24829->24807 24835 7ff6b32615b4 24830->24835 24836 7ff6b326159e HeapFree 24830->24836 24831->24830 24832->24820 24832->24828 25678 7ff6b3269c90 7 API calls 24832->25678 24838 7ff6b32617ef memset 24833->24838 24834->24823 24840 7ff6b326dc80 51 API calls 24835->24840 24836->24835 24841 7ff6b32618c8 OutputDebugStringW 24838->24841 24853 7ff6b326182a 24838->24853 24844 7ff6b3261626 memset 24840->24844 24842 7ff6b32618fb memset OutputDebugStringW memset OutputDebugStringW 24841->24842 24843 7ff6b32618e9 HeapFree 24841->24843 24846 7ff6b3252e70 158 API calls 24842->24846 24843->24842 24847 7ff6b32616ff OutputDebugStringW 24844->24847 24857 7ff6b3261661 24844->24857 24845 7ff6b326dc80 51 API calls 24848 7ff6b325ece1 memset 24845->24848 24851 7ff6b32619e6 memset OutputDebugStringW memset OutputDebugStringW 24846->24851 24849 7ff6b3261732 24847->24849 24850 7ff6b3261720 HeapFree 24847->24850 24852 7ff6b325edca OutputDebugStringW 24848->24852 24848->24898 24855 7ff6b3292a60 3 API calls 24849->24855 24850->24849 25680 7ff6b3253000 158 API calls 24851->25680 24854 7ff6b325ede2 HeapFree 24852->24854 24852->24898 24853->24841 24854->24898 24858 7ff6b3261745 24855->24858 24857->24847 24860 7ff6b326229a 24858->24860 24861 7ff6b326174e 24858->24861 24859 7ff6b3261ace 24862 7ff6b3261d3f 24859->24862 25681 7ff6b3253000 158 API calls 24859->25681 24863 7ff6b3299160 50 API calls 24860->24863 24861->24821 24866 7ff6b326dc80 51 API calls 24862->24866 24865 7ff6b32622a9 24863->24865 24868 7ff6b3299160 50 API calls 24865->24868 24869 7ff6b3261f25 memset 24866->24869 24867 7ff6b3261afd 24867->24862 25682 7ff6b3253000 158 API calls 24867->25682 24868->24743 24870 7ff6b3261ffe OutputDebugStringW 24869->24870 24887 7ff6b3261f60 24869->24887 24874 7ff6b326201f HeapFree 24870->24874 24875 7ff6b3261e8c 24870->24875 24872 7ff6b3261b26 24872->24862 25683 7ff6b3253000 158 API calls 24872->25683 24873 7ff6b326dc80 51 API calls 24877 7ff6b325efba memset 24873->24877 24874->24875 24878 7ff6b326203b HeapFree 24875->24878 24879 7ff6b3262051 24875->24879 24876 7ff6b326dc80 51 API calls 24880 7ff6b325eebf memset 24876->24880 24882 7ff6b325fd20 OutputDebugStringW 24877->24882 24877->24898 24878->24879 25687 7ff6b3262610 HeapFree HeapFree 24879->25687 24884 7ff6b325f0aa OutputDebugStringW 24880->24884 24901 7ff6b325eefd 24880->24901 24885 7ff6b325fd38 HeapFree 24882->24885 24882->24898 24889 7ff6b325f0c2 HeapFree 24884->24889 24890 7ff6b325f0d4 GetCurrentProcess 24884->24890 24885->24898 24886 7ff6b3261b4f 24886->24862 25684 7ff6b3252990 memset 24886->25684 24887->24870 24888 7ff6b326205a 24888->24758 24889->24890 24891 7ff6b326dc80 51 API calls 24890->24891 24893 7ff6b325f16f memset 24891->24893 24892 7ff6b325fd5f HeapFree 24892->24898 24896 7ff6b325f2ea OutputDebugStringW 24893->24896 24908 7ff6b325f1ad 24893->24908 24894 7ff6b325fe11 HeapFree 24899 7ff6b325fe2d HeapFree 24894->24899 24900 7ff6b325fe43 memset OutputDebugStringW memset OutputDebugStringW 24894->24900 24902 7ff6b325f307 HeapFree 24896->24902 24896->24908 24897 7ff6b3261b6c 24907 7ff6b3261d7b 24897->24907 24914 7ff6b3252990 2 API calls 24897->24914 24898->24770 24898->24845 24898->24852 24898->24873 24898->24876 24898->24882 24898->24892 24898->24894 24956 7ff6b325f81a OutputDebugStringW 24898->24956 24980 7ff6b32521e0 69 API calls 24898->24980 24984 7ff6b32588b0 158 API calls 24898->24984 24990 7ff6b325f954 WriteProcessMemory 24898->24990 24994 7ff6b32604a5 24898->24994 24995 7ff6b325f9a5 memset OutputDebugStringW 24898->24995 25018 7ff6b325fb7a OutputDebugStringW 24898->25018 25038 7ff6b326dc80 51 API calls 24898->25038 24899->24900 24903 7ff6b325cbc0 164 API calls 24900->24903 24901->24884 24902->24908 24905 7ff6b325ff4d 24903->24905 24904 7ff6b326dc80 51 API calls 24906 7ff6b325f37e memset 24904->24906 24909 7ff6b325ff64 24905->24909 24910 7ff6b3260591 24905->24910 24912 7ff6b325f46a OutputDebugStringW 24906->24912 24929 7ff6b325f3bc 24906->24929 24918 7ff6b3252990 2 API calls 24907->24918 24908->24896 24908->24904 24911 7ff6b326dc80 51 API calls 24909->24911 24913 7ff6b32605a8 HeapFree 24910->24913 24926 7ff6b32605b7 24910->24926 24917 7ff6b325ffe5 memset 24911->24917 24915 7ff6b325f482 HeapFree 24912->24915 24916 7ff6b325f494 memset OutputDebugStringW 24912->24916 24913->24926 24919 7ff6b3261b96 24914->24919 24915->24916 24920 7ff6b326dc80 51 API calls 24916->24920 24921 7ff6b32608ca OutputDebugStringW 24917->24921 24940 7ff6b3260020 24917->24940 24918->24862 24922 7ff6b326dc80 51 API calls 24919->24922 24923 7ff6b325f582 memset 24920->24923 24924 7ff6b32608eb HeapFree 24921->24924 24925 7ff6b32608fd 24921->24925 24927 7ff6b3261c02 24922->24927 24928 7ff6b325f65a OutputDebugStringW 24923->24928 25001 7ff6b325f5b9 24923->25001 24924->24925 24934 7ff6b326dc80 51 API calls 24925->24934 24926->24770 24930 7ff6b325c3b0 95 API calls 24926->24930 24931 7ff6b3252990 2 API calls 24927->24931 24935 7ff6b325f677 HeapFree 24928->24935 24928->25001 24929->24912 24932 7ff6b32605e9 24930->24932 24933 7ff6b3261c18 24931->24933 24936 7ff6b3260725 24932->24936 25518 7ff6b32521e0 24932->25518 24937 7ff6b3261c22 HeapFree 24933->24937 24938 7ff6b3261c34 24933->24938 24939 7ff6b32609c1 memset 24934->24939 24935->25001 24936->24925 24947 7ff6b3260935 HeapFree 24936->24947 24937->24938 24950 7ff6b3261d92 24938->24950 24951 7ff6b3261c4f 24938->24951 24943 7ff6b3260aaa OutputDebugStringW 24939->24943 24960 7ff6b32609fc 24939->24960 24940->24921 24943->24779 24946 7ff6b3260acb HeapFree 24943->24946 24944 7ff6b325fd7a 24949 7ff6b3292a60 3 API calls 24944->24949 24946->24779 24947->24925 24948 7ff6b326dc80 51 API calls 24952 7ff6b325f72e memset 24948->24952 24953 7ff6b325fd94 24949->24953 24955 7ff6b326dc80 51 API calls 24950->24955 24954 7ff6b326dc80 51 API calls 24951->24954 24952->24898 24952->24956 24953->24770 24957 7ff6b325fd9d 24953->24957 24958 7ff6b3261cbe 24954->24958 24959 7ff6b3261dfe 24955->24959 24956->24898 24966 7ff6b325f837 HeapFree 24956->24966 24961 7ff6b325fdd7 HeapFree 24957->24961 24962 7ff6b325fdc1 HeapFree 24957->24962 25022 7ff6b326083a 24957->25022 24963 7ff6b3252990 2 API calls 24958->24963 24965 7ff6b3252990 2 API calls 24959->24965 24960->24943 24961->24788 24967 7ff6b325fdf6 HeapFree 24961->24967 24962->24961 24968 7ff6b3261cd4 24963->24968 24964 7ff6b326062b 25544 7ff6b32588b0 24964->25544 24969 7ff6b3261e14 24965->24969 24966->24898 24967->24788 24970 7ff6b3261cde HeapFree 24968->24970 24971 7ff6b3261cf0 24968->24971 24969->24862 24972 7ff6b3261e1e HeapFree 24969->24972 24970->24971 24974 7ff6b3252990 2 API calls 24971->24974 24972->24862 24982 7ff6b3261d15 24974->24982 24976 7ff6b326090c 24976->24936 24981 7ff6b326091e HeapFree 24976->24981 24977 7ff6b3260701 24978 7ff6b326071b 24977->24978 24979 7ff6b3260709 HeapFree 24977->24979 24978->24936 24983 7ff6b3260afb memset OutputDebugStringW 24978->24983 24979->24978 24980->24898 24981->24936 24987 7ff6b3252990 2 API calls 24982->24987 24985 7ff6b3260b8a HeapFree 24983->24985 24986 7ff6b3260b9c memset OutputDebugStringW memset OutputDebugStringW 24983->24986 24984->24898 24985->24986 25637 7ff6b3262810 50 API calls 24986->25637 24988 7ff6b3261e50 24987->24988 24991 7ff6b3252990 2 API calls 24988->24991 24990->24898 24993 7ff6b325f984 HeapFree 24990->24993 24996 7ff6b3261e61 24991->24996 24992 7ff6b3260cb8 25638 7ff6b3262900 52 API calls 24992->25638 24993->24898 24999 7ff6b326dc80 51 API calls 24994->24999 24998 7ff6b3252c30 158 API calls 24995->24998 24996->24907 25004 7ff6b3261e6a 24996->25004 24998->25001 25002 7ff6b326052a memset 24999->25002 25000 7ff6b3260d2e 25639 7ff6b3291c00 391 API calls 25000->25639 25001->24928 25001->24944 25001->24948 25007 7ff6b326dc80 51 API calls 25001->25007 25513 7ff6b3252c30 25001->25513 25005 7ff6b32607da OutputDebugStringW 25002->25005 25026 7ff6b326056c 25002->25026 25008 7ff6b3252990 2 API calls 25004->25008 25011 7ff6b32607fb HeapFree 25005->25011 25012 7ff6b326080d 25005->25012 25006 7ff6b3260d40 25009 7ff6b3260e4a 25006->25009 25010 7ff6b3260d5a 25006->25010 25014 7ff6b325fa8d memset 25007->25014 25015 7ff6b3261e7b 25008->25015 25642 7ff6b3251620 18 API calls 25009->25642 25017 7ff6b326dc80 51 API calls 25010->25017 25011->25012 25636 7ff6b326d8b0 52 API calls 25012->25636 25014->24898 25014->25018 25019 7ff6b3252990 2 API calls 25015->25019 25021 7ff6b3260dc7 25017->25021 25018->24898 25027 7ff6b325fb97 HeapFree 25018->25027 25019->24875 25020 7ff6b3260e9a 25023 7ff6b3260ea7 25020->25023 25024 7ff6b3260f4f 25020->25024 25640 7ff6b32699a0 55 API calls 25021->25640 25022->24961 25643 7ff6b326da10 25023->25643 25028 7ff6b326da10 53 API calls 25024->25028 25026->25005 25027->24898 25030 7ff6b3260f62 25028->25030 25666 7ff6b3267680 98 API calls 25030->25666 25031 7ff6b3260ebd 25035 7ff6b326dc80 51 API calls 25031->25035 25032 7ff6b3260e39 25641 7ff6b3251620 18 API calls 25032->25641 25041 7ff6b3260f1b 25035->25041 25036 7ff6b3260e27 HeapFree 25036->25032 25037 7ff6b3260dd4 25037->25032 25037->25036 25043 7ff6b3260e15 HeapFree 25037->25043 25044 7ff6b325fc3c memset 25038->25044 25039 7ff6b3260e45 25039->24835 25040 7ff6b3260f8d 25045 7ff6b3260f9c 25040->25045 25046 7ff6b3261053 25040->25046 25665 7ff6b32699a0 55 API calls 25041->25665 25043->25036 25044->24882 25044->24898 25049 7ff6b326dc80 51 API calls 25045->25049 25668 7ff6b3269840 memcmp 25046->25668 25047 7ff6b3260f28 25047->24823 25047->24834 25051 7ff6b3261013 25049->25051 25050 7ff6b32610b3 25052 7ff6b32610b8 25050->25052 25053 7ff6b32610f5 25050->25053 25667 7ff6b32699a0 55 API calls 25051->25667 25052->24719 25052->24865 25059 7ff6b3292a60 3 API calls 25052->25059 25669 7ff6b3269960 54 API calls 25053->25669 25056 7ff6b3261020 25058 7ff6b3261036 25056->25058 25060 7ff6b3261175 HeapFree 25056->25060 25061 7ff6b3261163 HeapFree 25056->25061 25063 7ff6b3261151 HeapFree 25056->25063 25057 7ff6b326110c 25057->24832 25058->25060 25058->25061 25062 7ff6b32610e0 25059->25062 25060->24820 25061->25060 25062->24728 25062->24751 25063->25061 25064->24692 25065->24681 25066->24683 25068 7ff6b3273138 BCryptGenRandom 25067->25068 25069 7ff6b327315d SystemFunction036 25068->25069 25070 7ff6b3273130 25068->25070 25069->25070 25072 7ff6b327316c 25069->25072 25070->25068 25071 7ff6b325ddc3 25070->25071 25071->24699 25073 7ff6b3292a60 3 API calls 25072->25073 25074 7ff6b327317f 25073->25074 25075 7ff6b32731a4 25074->25075 25076 7ff6b3273184 25074->25076 25723 7ff6b3299310 50 API calls 25075->25723 25710 7ff6b3299180 25076->25710 25081 7ff6b3292a75 HeapAlloc 25080->25081 25082 7ff6b3292a7d GetProcessHeap 25080->25082 25081->25082 25084 7ff6b329a3b9 25082->25084 25085 7ff6b329a39c HeapAlloc 25082->25085 25084->24752 25085->25084 25088 7ff6b326dd6d 25086->25088 25090 7ff6b326dca8 25086->25090 25087 7ff6b326dd9b 25087->24727 25088->25087 25728 7ff6b326d7b0 50 API calls 25088->25728 25090->25088 25092 7ff6b3292a60 3 API calls 25090->25092 25091 7ff6b326dde2 25093 7ff6b326de1b 25091->25093 25094 7ff6b326de08 HeapFree 25091->25094 25095 7ff6b326dd5b 25092->25095 25093->24727 25094->25093 25095->25088 25096 7ff6b3299160 50 API calls 25095->25096 25096->25088 25098 7ff6b3292a60 3 API calls 25097->25098 25099 7ff6b3253336 25098->25099 25100 7ff6b325837a 25099->25100 25101 7ff6b325333f GetModuleFileNameW 25099->25101 25102 7ff6b3299160 50 API calls 25100->25102 25103 7ff6b325335b 25101->25103 25104 7ff6b32533dd HeapFree 25101->25104 25106 7ff6b3258389 25102->25106 25107 7ff6b32583b3 25103->25107 25108 7ff6b3264a60 52 API calls 25103->25108 25105 7ff6b32533b9 25104->25105 25111 7ff6b326dc80 51 API calls 25105->25111 25112 7ff6b3299160 50 API calls 25106->25112 25797 7ff6b3299350 50 API calls 25107->25797 25110 7ff6b325339b HeapFree 25108->25110 25110->25105 25114 7ff6b325348a memset 25111->25114 25112->25107 25113 7ff6b32583c4 25116 7ff6b3299160 50 API calls 25113->25116 25115 7ff6b325357a OutputDebugStringW 25114->25115 25128 7ff6b32534d0 25114->25128 25117 7ff6b3253597 HeapFree 25115->25117 25118 7ff6b32535a9 CreateToolhelp32Snapshot 25115->25118 25119 7ff6b32583ee 25116->25119 25117->25118 25120 7ff6b325360b memset 25118->25120 25121 7ff6b32535c2 GetLastError 25118->25121 25123 7ff6b3253647 25120->25123 25124 7ff6b3253664 ProcessPrng 25120->25124 25122 7ff6b32535e0 25121->25122 25125 7ff6b3258324 25122->25125 25126 7ff6b32535ef HeapFree 25122->25126 25127 7ff6b32536b3 Module32FirstW 25123->25127 25124->25127 25125->24729 25125->24730 25126->25125 25129 7ff6b325373b GetLastError GetLastError 25127->25129 25211 7ff6b3253713 25127->25211 25128->25115 25129->25122 25132 7ff6b325376f 25129->25132 25130 7ff6b325381b 25130->25122 25131 7ff6b325383c HeapFree 25130->25131 25131->25122 25132->25130 25134 7ff6b3253805 HeapFree 25132->25134 25134->25132 25135 7ff6b3253998 memcmp 25135->25211 25136 7ff6b326dc80 51 API calls 25139 7ff6b3253bf1 memset 25136->25139 25137 7ff6b326dc80 51 API calls 25138 7ff6b3253cc7 memset 25137->25138 25140 7ff6b32542b0 OutputDebugStringW 25138->25140 25157 7ff6b3253b5a 25138->25157 25141 7ff6b3253e4a OutputDebugStringW 25139->25141 25149 7ff6b3253c39 25139->25149 25143 7ff6b32542cc HeapFree 25140->25143 25144 7ff6b3255fe0 Module32NextW 25140->25144 25142 7ff6b3253e62 HeapFree 25141->25142 25141->25149 25142->25149 25143->25144 25147 7ff6b325813b GetLastError 25144->25147 25144->25211 25145 7ff6b326dc80 51 API calls 25148 7ff6b3253ef2 memset 25145->25148 25146 7ff6b3253a82 memcmp 25146->25211 25151 7ff6b325814c HeapFree 25147->25151 25152 7ff6b3258163 CloseHandle 25147->25152 25155 7ff6b3253fca OutputDebugStringW 25148->25155 25165 7ff6b3253f25 25148->25165 25149->25141 25149->25145 25150 7ff6b3256008 HeapFree 25150->25211 25151->25152 25153 7ff6b3258176 memset OutputDebugStringW 25152->25153 25154 7ff6b3258170 GetLastError 25152->25154 25158 7ff6b3258302 25153->25158 25166 7ff6b3258233 25153->25166 25154->25153 25160 7ff6b3253fe5 HeapFree 25155->25160 25155->25165 25156 7ff6b326dc80 51 API calls 25159 7ff6b3253b0a memset 25156->25159 25157->25140 25158->25125 25163 7ff6b325830d HeapFree 25158->25163 25159->25140 25159->25157 25160->25165 25161 7ff6b3292a60 3 API calls 25161->25165 25162 7ff6b32582cb 25162->25158 25164 7ff6b32582e8 HeapFree 25162->25164 25163->25125 25164->25158 25165->25100 25165->25155 25165->25161 25167 7ff6b326dc80 51 API calls 25165->25167 25166->25162 25168 7ff6b32582b5 HeapFree 25166->25168 25169 7ff6b3254078 memset 25167->25169 25168->25166 25170 7ff6b325415a OutputDebugStringW 25169->25170 25179 7ff6b32540b9 25169->25179 25171 7ff6b3254172 HeapFree 25170->25171 25170->25179 25171->25179 25172 7ff6b3292a60 3 API calls 25172->25179 25173 7ff6b3254510 GetModuleHandleW 25174 7ff6b3254c54 GetLastError 25173->25174 25175 7ff6b3254541 GetModuleFileNameW 25173->25175 25176 7ff6b3254c84 HeapFree 25174->25176 25177 7ff6b3254c7c 25174->25177 25186 7ff6b325455b 25175->25186 25176->25177 25182 7ff6b3255de8 HeapFree 25177->25182 25183 7ff6b3255df7 HeapFree 25177->25183 25184 7ff6b326dc80 51 API calls 25177->25184 25193 7ff6b326dc80 51 API calls 25177->25193 25240 7ff6b3255dc1 HeapFree 25177->25240 25252 7ff6b32555aa OutputDebugStringW 25177->25252 25259 7ff6b32556be HeapFree 25177->25259 25261 7ff6b3255da2 HeapFree 25177->25261 25269 7ff6b3255c3a OutputDebugStringW 25177->25269 25281 7ff6b3255d78 GetErrorInfo 25177->25281 25297 7ff6b3256704 OutputDebugStringW 25177->25297 25303 7ff6b32521e0 69 API calls 25177->25303 25307 7ff6b3256768 HeapFree 25177->25307 25308 7ff6b325b9f0 82 API calls 25177->25308 25309 7ff6b326dc80 51 API calls 25177->25309 25310 7ff6b325785b 25177->25310 25313 7ff6b32579a1 OutputDebugStringW 25177->25313 25316 7ff6b3256931 HeapFree 25177->25316 25317 7ff6b3257a71 HeapFree 25177->25317 25318 7ff6b3257ae2 NtUnmapViewOfSection 25177->25318 25319 7ff6b326dc80 51 API calls 25177->25319 25320 7ff6b32521a0 CloseHandle GetLastError 25177->25320 25321 7ff6b326da10 53 API calls 25177->25321 25323 7ff6b326dc80 51 API calls 25177->25323 25324 7ff6b3257bd3 HeapFree 25177->25324 25326 7ff6b3252990 memset OutputDebugStringW 25177->25326 25329 7ff6b3257c85 HeapFree 25177->25329 25330 7ff6b3257c9f HeapFree 25177->25330 25333 7ff6b3257cbe HeapFree 25177->25333 25335 7ff6b3257cdd HeapFree 25177->25335 25336 7ff6b3257cf1 HeapFree 25177->25336 25360 7ff6b32577f4 OutputDebugStringW 25177->25360 25367 7ff6b325772b OutputDebugStringW 25177->25367 25368 7ff6b3257842 HeapFree 25177->25368 25370 7ff6b325765c OutputDebugStringW 25177->25370 25792 7ff6b32972d0 53 API calls 25177->25792 25793 7ff6b32972d0 53 API calls 25177->25793 25795 7ff6b3269960 54 API calls 25177->25795 25178 7ff6b3264a60 52 API calls 25178->25186 25179->25106 25179->25170 25179->25172 25179->25173 25788 7ff6b329ac90 51 API calls 25179->25788 25181 7ff6b326dc80 51 API calls 25185 7ff6b3254701 memset 25181->25185 25182->25183 25183->25177 25188 7ff6b3255ea1 memset 25184->25188 25189 7ff6b3254c2a OutputDebugStringW 25185->25189 25201 7ff6b3254734 25185->25201 25186->25178 25186->25181 25187 7ff6b325459b HeapFree 25186->25187 25190 7ff6b326dc80 51 API calls 25186->25190 25187->25186 25192 7ff6b3255f9a OutputDebugStringW 25188->25192 25188->25211 25189->25174 25191 7ff6b3254c45 HeapFree 25189->25191 25195 7ff6b325462c memset 25190->25195 25191->25174 25194 7ff6b3255fb2 HeapFree 25192->25194 25192->25211 25196 7ff6b3257d69 memset 25193->25196 25194->25211 25198 7ff6b32547ea OutputDebugStringW 25195->25198 25203 7ff6b325466d 25195->25203 25197 7ff6b3257e5a OutputDebugStringW 25196->25197 25196->25211 25200 7ff6b3257e72 HeapFree 25197->25200 25197->25211 25199 7ff6b3254802 HeapFree 25198->25199 25198->25203 25199->25203 25200->25211 25201->25189 25202 7ff6b326dc80 51 API calls 25202->25203 25203->25198 25203->25202 25204 7ff6b326dc80 51 API calls 25203->25204 25206 7ff6b3254912 memset 25204->25206 25205 7ff6b3258014 25796 7ff6b32984e0 53 API calls 25205->25796 25208 7ff6b32549fa OutputDebugStringW 25206->25208 25248 7ff6b3254953 25206->25248 25209 7ff6b3254a12 HeapFree 25208->25209 25208->25248 25209->25248 25210 7ff6b3257fa2 memcmp 25210->25211 25211->25135 25211->25136 25211->25137 25211->25144 25211->25146 25211->25150 25211->25156 25211->25192 25211->25197 25211->25205 25211->25210 25213 7ff6b3257fd7 HeapFree 25211->25213 25214 7ff6b32538b4 Module32NextW 25211->25214 25729 7ff6b3264a60 25211->25729 25212 7ff6b32521e0 69 API calls 25212->25248 25213->25214 25214->25211 25215 7ff6b325835e GetLastError CloseHandle 25214->25215 25215->25153 25217 7ff6b3258375 25215->25217 25216 7ff6b3254a61 HeapFree 25216->25248 25217->25154 25219 7ff6b3257900 25220 7ff6b32580b3 OutputDebugStringW 25219->25220 25221 7ff6b32580dd CloseHandle 25220->25221 25222 7ff6b32580ce HeapFree 25220->25222 25229 7ff6b325810a CloseHandle 25221->25229 25230 7ff6b3258104 GetLastError 25221->25230 25222->25221 25223 7ff6b326dc80 51 API calls 25224 7ff6b3254b05 memset 25223->25224 25225 7ff6b3254d4a OutputDebugStringW 25224->25225 25236 7ff6b3254b38 25224->25236 25228 7ff6b3254d65 HeapFree 25225->25228 25225->25236 25228->25236 25232 7ff6b3258118 GetLastError 25229->25232 25233 7ff6b325811e 25229->25233 25230->25229 25232->25233 25233->25147 25234 7ff6b326dc80 51 API calls 25235 7ff6b3255198 memset 25234->25235 25239 7ff6b325527a OutputDebugStringW 25235->25239 25247 7ff6b32551d9 25235->25247 25236->25225 25789 7ff6b32972d0 53 API calls 25236->25789 25237 7ff6b3292a60 3 API calls 25237->25248 25238 7ff6b3254d91 GetErrorInfo 25238->25177 25241 7ff6b3255292 HeapFree 25239->25241 25242 7ff6b32552a1 NtOpenFile 25239->25242 25240->25177 25241->25242 25243 7ff6b32552e2 25242->25243 25244 7ff6b326dc80 51 API calls 25243->25244 25245 7ff6b326dc80 51 API calls 25243->25245 25246 7ff6b32554b9 memset 25244->25246 25249 7ff6b32553e1 memset 25245->25249 25250 7ff6b325576a OutputDebugStringW 25246->25250 25262 7ff6b32554fa 25246->25262 25247->25239 25248->25113 25248->25208 25248->25212 25248->25216 25248->25223 25248->25234 25248->25237 25737 7ff6b325b9f0 25248->25737 25790 7ff6b329ac90 51 API calls 25248->25790 25791 7ff6b3269a50 51 API calls 25248->25791 25249->25177 25249->25252 25254 7ff6b3255782 HeapFree 25250->25254 25250->25262 25252->25177 25253 7ff6b32555c8 HeapFree 25252->25253 25253->25177 25254->25262 25255 7ff6b32521e0 69 API calls 25255->25262 25256 7ff6b32557d6 HeapFree 25256->25262 25258 7ff6b325b9f0 82 API calls 25258->25262 25259->25177 25259->25261 25260 7ff6b3255665 GetErrorInfo 25260->25177 25260->25259 25261->25177 25262->25250 25262->25255 25262->25256 25262->25258 25263 7ff6b32558d6 NtCreateSection 25262->25263 25264 7ff6b326dc80 51 API calls 25262->25264 25265 7ff6b326dc80 51 API calls 25262->25265 25267 7ff6b326dc80 51 API calls 25262->25267 25263->25262 25266 7ff6b325587e memset 25264->25266 25268 7ff6b3255b0a memset 25265->25268 25266->25177 25266->25269 25270 7ff6b3255a32 memset 25267->25270 25273 7ff6b32560aa OutputDebugStringW 25268->25273 25287 7ff6b3255b4b 25268->25287 25269->25177 25271 7ff6b3255c55 HeapFree 25269->25271 25272 7ff6b3255d0a OutputDebugStringW 25270->25272 25283 7ff6b3255a6b 25270->25283 25271->25177 25276 7ff6b3255d37 CloseHandle 25272->25276 25277 7ff6b3255d28 HeapFree 25272->25277 25275 7ff6b32560c2 HeapFree 25273->25275 25273->25287 25275->25287 25279 7ff6b3255d49 GetLastError 25276->25279 25280 7ff6b3255d4f 25276->25280 25277->25276 25278 7ff6b32521e0 69 API calls 25278->25287 25279->25280 25280->25281 25794 7ff6b32972d0 53 API calls 25280->25794 25281->25177 25283->25272 25284 7ff6b325610e HeapFree 25284->25287 25285 7ff6b325b9f0 82 API calls 25285->25287 25286 7ff6b325620e GetCurrentProcess NtMapViewOfSection 25286->25287 25287->25273 25287->25278 25287->25284 25287->25285 25287->25286 25288 7ff6b326dc80 51 API calls 25287->25288 25289 7ff6b326dc80 51 API calls 25287->25289 25290 7ff6b326dc80 51 API calls 25287->25290 25291 7ff6b32561b6 memset 25288->25291 25293 7ff6b32563a3 memset 25289->25293 25294 7ff6b325646a memset 25290->25294 25292 7ff6b325654c OutputDebugStringW 25291->25292 25304 7ff6b32561e9 25291->25304 25295 7ff6b3256567 HeapFree 25292->25295 25292->25304 25296 7ff6b325660f OutputDebugStringW 25293->25296 25293->25304 25294->25177 25294->25297 25295->25304 25299 7ff6b325663c CloseHandle 25296->25299 25300 7ff6b325662d HeapFree 25296->25300 25297->25177 25298 7ff6b325671c HeapFree 25297->25298 25298->25177 25301 7ff6b3256657 CloseHandle 25299->25301 25302 7ff6b3256651 GetLastError 25299->25302 25300->25299 25305 7ff6b325666b 25301->25305 25306 7ff6b3256665 GetLastError 25301->25306 25302->25301 25303->25177 25304->25292 25304->25296 25305->25177 25306->25305 25307->25177 25308->25177 25311 7ff6b3256810 memset 25309->25311 25312 7ff6b326dc80 51 API calls 25310->25312 25311->25177 25311->25313 25314 7ff6b32578cd memset 25312->25314 25313->25177 25315 7ff6b32579bc HeapFree 25313->25315 25314->25219 25314->25220 25315->25177 25316->25177 25317->25177 25318->25177 25319->25177 25320->25177 25321->25177 25325 7ff6b3256a75 memset 25323->25325 25324->25177 25327 7ff6b3256b50 OutputDebugStringW 25325->25327 25331 7ff6b3256ab6 25325->25331 25326->25177 25328 7ff6b3256b68 HeapFree 25327->25328 25327->25331 25328->25331 25329->25177 25330->25177 25331->25327 25332 7ff6b3256bd9 GetCurrentProcess 25331->25332 25776 7ff6b3252a90 25332->25776 25333->25177 25335->25336 25336->25177 25338 7ff6b326dc80 51 API calls 25340 7ff6b3256d68 memset 25338->25340 25339 7ff6b326dc80 51 API calls 25341 7ff6b3256c99 memset 25339->25341 25342 7ff6b3256ecf OutputDebugStringW 25340->25342 25350 7ff6b3256da9 25340->25350 25343 7ff6b3257160 OutputDebugStringW 25341->25343 25369 7ff6b3256cda 25341->25369 25344 7ff6b3256ef6 GetCurrentProcess 25342->25344 25345 7ff6b3256ee7 HeapFree 25342->25345 25346 7ff6b3257187 memmove 25343->25346 25347 7ff6b3257178 HeapFree 25343->25347 25348 7ff6b3252a90 160 API calls 25344->25348 25345->25344 25349 7ff6b326dc80 51 API calls 25346->25349 25347->25346 25351 7ff6b3256f1c 25348->25351 25352 7ff6b3257224 memset 25349->25352 25350->25342 25355 7ff6b326dc80 51 API calls 25351->25355 25356 7ff6b326dc80 51 API calls 25351->25356 25353 7ff6b32572ff OutputDebugStringW 25352->25353 25362 7ff6b3257265 25352->25362 25354 7ff6b3257317 HeapFree 25353->25354 25353->25362 25354->25362 25358 7ff6b3256faf memset 25355->25358 25359 7ff6b325707e memset 25356->25359 25357 7ff6b3252c30 158 API calls 25357->25362 25358->25343 25358->25369 25359->25177 25359->25360 25360->25177 25361 7ff6b325780c HeapFree 25360->25361 25361->25177 25362->25353 25362->25357 25363 7ff6b326dc80 51 API calls 25362->25363 25364 7ff6b326dc80 51 API calls 25362->25364 25365 7ff6b325757a memset 25363->25365 25366 7ff6b3257415 memset 25364->25366 25365->25177 25365->25367 25366->25177 25366->25370 25367->25177 25371 7ff6b3257743 HeapFree 25367->25371 25368->25177 25369->25343 25370->25177 25372 7ff6b3257674 HeapFree 25370->25372 25371->25177 25372->25177 25819 7ff6b3283830 25373->25819 25376 7ff6b325cc97 25377 7ff6b3292a60 3 API calls 25376->25377 25378 7ff6b325ccaa 25377->25378 25381 7ff6b325d98f 25378->25381 25383 7ff6b3292a60 3 API calls 25378->25383 25379 7ff6b325cc22 25380 7ff6b325cc80 HeapFree 25379->25380 25382 7ff6b325cc6e HeapFree 25379->25382 25418 7ff6b325ce80 25379->25418 25380->25418 25384 7ff6b3299160 50 API calls 25381->25384 25382->25380 25386 7ff6b325ccf7 25383->25386 25385 7ff6b325d99e 25384->25385 25387 7ff6b3299160 50 API calls 25385->25387 25386->25385 25827 7ff6b3282670 25386->25827 25388 7ff6b325d9b4 25387->25388 25391 7ff6b325da1f HeapFree FindClose 25388->25391 25391->24735 25393 7ff6b325cd86 25394 7ff6b325cdef 25393->25394 25870 7ff6b3281d30 25393->25870 25396 7ff6b325ce16 HeapFree 25394->25396 25397 7ff6b325ce00 HeapFree 25394->25397 25407 7ff6b325ce32 25396->25407 25396->25418 25397->25396 25398 7ff6b325cdd5 25398->25394 25399 7ff6b325cecf memset FindFirstFileW 25398->25399 25400 7ff6b325cf9b GetLastError 25399->25400 25401 7ff6b325cefc 25399->25401 25404 7ff6b325cfaa 25400->25404 25405 7ff6b325d67e 25400->25405 25403 7ff6b3292a60 3 API calls 25401->25403 25402 7ff6b325ce6e HeapFree 25402->25418 25410 7ff6b325cf12 25403->25410 25411 7ff6b3292a60 3 API calls 25404->25411 25408 7ff6b325d697 25405->25408 25409 7ff6b325d685 HeapFree 25405->25409 25406 7ff6b325ce5c HeapFree 25406->25402 25407->25402 25407->25406 25413 7ff6b325d6bb HeapFree 25408->25413 25414 7ff6b325d6a5 HeapFree 25408->25414 25409->25408 25415 7ff6b325cf1b memmove 25410->25415 25416 7ff6b325d9b6 25410->25416 25412 7ff6b325cfbd 25411->25412 25417 7ff6b325da02 25412->25417 25420 7ff6b325cf7c 25412->25420 25422 7ff6b325cffc HeapFree 25412->25422 25413->25407 25413->25418 25414->25413 25419 7ff6b325cf6a HeapFree 25415->25419 25415->25420 25421 7ff6b3299180 50 API calls 25416->25421 25417->25391 25423 7ff6b3299180 50 API calls 25417->25423 25418->24735 25419->25420 25424 7ff6b325d03b memmove memmove 25420->25424 25425 7ff6b325d902 25420->25425 25427 7ff6b325d02c HeapFree 25420->25427 25421->25388 25422->25420 25423->25391 25912 7ff6b3269d70 25424->25912 25425->25418 25433 7ff6b325d95a HeapFree 25425->25433 25427->25424 25428 7ff6b325d084 25429 7ff6b325d0b8 25428->25429 25430 7ff6b325d08f FindClose 25428->25430 25432 7ff6b3292a60 3 API calls 25429->25432 25430->25418 25431 7ff6b325d0a3 25430->25431 25955 7ff6b3266200 HeapFree HeapFree 25431->25955 25435 7ff6b325d0d2 25432->25435 25433->25381 25433->25418 25436 7ff6b325d0db memmove 25435->25436 25437 7ff6b325d9dc 25435->25437 25445 7ff6b325d150 25436->25445 25438 7ff6b3299160 50 API calls 25437->25438 25439 7ff6b325d9eb 25438->25439 25441 7ff6b3299160 50 API calls 25439->25441 25440 7ff6b3269d70 104 API calls 25440->25445 25442 7ff6b325d9f5 25441->25442 25444 7ff6b3299160 50 API calls 25442->25444 25443 7ff6b325d1bd FindClose 25446 7ff6b325d1d7 25443->25446 25447 7ff6b325d1e3 25443->25447 25444->25417 25445->25440 25445->25443 25956 7ff6b329ac90 51 API calls 25445->25956 25957 7ff6b3266200 HeapFree HeapFree 25446->25957 25450 7ff6b325d20c 25447->25450 25451 7ff6b325d6eb 25447->25451 25465 7ff6b325d23b 25447->25465 25450->25439 25452 7ff6b325d215 25450->25452 25454 7ff6b325d707 25450->25454 25960 7ff6b32650b0 74 API calls 25451->25960 25457 7ff6b325d7a7 25452->25457 25458 7ff6b325d798 HeapFree 25452->25458 25455 7ff6b325d727 memmove 25454->25455 25459 7ff6b3292a60 3 API calls 25454->25459 25455->25452 25460 7ff6b325d74b 25455->25460 25457->25418 25941 7ff6b3262720 25457->25941 25458->25457 25462 7ff6b325d71e 25459->25462 25460->25452 25464 7ff6b325d770 HeapFree 25460->25464 25461 7ff6b32846e0 50 API calls 25461->25465 25462->25442 25462->25455 25464->25460 25465->25450 25465->25461 25467 7ff6b325d2c9 memcmp 25465->25467 25484 7ff6b325d344 25465->25484 25466 7ff6b325d7dd 25468 7ff6b3262720 55 API calls 25466->25468 25467->25465 25469 7ff6b325d7fc 25468->25469 25470 7ff6b3283830 81 API calls 25469->25470 25471 7ff6b325d816 25470->25471 25473 7ff6b3283830 81 API calls 25471->25473 25479 7ff6b325d833 25471->25479 25473->25479 25474 7ff6b325d89f 25475 7ff6b325d8cd HeapFree 25474->25475 25476 7ff6b325d8e0 25474->25476 25475->25476 25476->25425 25477 7ff6b325d8ea HeapFree 25476->25477 25477->25425 25478 7ff6b325d88d HeapFree 25478->25474 25479->25425 25479->25474 25479->25478 25480 7ff6b325d87b HeapFree 25479->25480 25480->25478 25481 7ff6b325d660 25961 7ff6b3299230 25481->25961 25484->25481 25485 7ff6b325d62b memcmp 25484->25485 25958 7ff6b327eaa0 50 API calls 25484->25958 25959 7ff6b32833a0 50 API calls 25484->25959 25485->25481 25485->25484 25487 7ff6b326dc80 51 API calls 25486->25487 25488 7ff6b325c436 memset 25487->25488 25489 7ff6b325c51a OutputDebugStringW 25488->25489 25494 7ff6b325c474 25488->25494 25490 7ff6b325c53d HeapFree 25489->25490 25491 7ff6b325c54f 25489->25491 25490->25491 25492 7ff6b325b9f0 82 API calls 25491->25492 25493 7ff6b325c560 25492->25493 25495 7ff6b325c56a memset 25493->25495 25496 7ff6b325c665 memset OutputDebugStringW 25493->25496 25494->25489 25499 7ff6b325c5a0 25495->25499 25497 7ff6b325cadc 25496->25497 25497->24780 25497->24792 25498 7ff6b325c841 LdrLoadDll 25500 7ff6b325c896 25498->25500 25501 7ff6b325c960 25498->25501 25499->25498 26036 7ff6b32992a0 50 API calls 25499->26036 25503 7ff6b326dc80 51 API calls 25500->25503 25502 7ff6b326dc80 51 API calls 25501->25502 25504 7ff6b325c9bc memset 25502->25504 25505 7ff6b325c903 memset 25503->25505 25507 7ff6b325cb6a OutputDebugStringW 25504->25507 25510 7ff6b325c9f4 25504->25510 25506 7ff6b325caaa OutputDebugStringW 25505->25506 25509 7ff6b325c93b 25505->25509 25506->25497 25512 7ff6b325caca HeapFree 25506->25512 25507->25497 25511 7ff6b325cb8a HeapFree 25507->25511 25509->25506 25510->25507 25511->25497 25512->25497 25514 7ff6b3252c70 25513->25514 25515 7ff6b32521e0 69 API calls 25514->25515 25516 7ff6b3252d1b 25515->25516 25517 7ff6b32588b0 158 API calls 25516->25517 25519 7ff6b32983d6 25518->25519 25520 7ff6b325222c OutputDebugStringW 25519->25520 25521 7ff6b3252278 25520->25521 25525 7ff6b32522a0 25520->25525 25522 7ff6b3252282 25521->25522 25521->25525 26037 7ff6b326b8d0 54 API calls 25522->26037 25524 7ff6b3252292 25527 7ff6b3252328 memmove 25524->25527 25526 7ff6b32522e9 memmove memmove 25525->25526 25526->25524 25528 7ff6b3252946 25527->25528 25529 7ff6b3252357 25527->25529 25531 7ff6b3299160 50 API calls 25528->25531 25530 7ff6b3292a60 3 API calls 25529->25530 25532 7ff6b3252361 25530->25532 25533 7ff6b3252952 25531->25533 25532->25533 25534 7ff6b325236a memmove memmove memmove memset 25532->25534 25535 7ff6b3299160 50 API calls 25533->25535 25543 7ff6b3252455 25534->25543 25536 7ff6b3252961 25535->25536 25537 7ff6b32527ce memset OutputDebugStringW 25539 7ff6b3252922 25537->25539 25538 7ff6b325285f memset OutputDebugStringW 26038 7ff6b3251f50 52 API calls 25538->26038 25539->24770 25539->24964 25541 7ff6b32528ec 25541->25536 25542 7ff6b32528f0 HeapFree 25541->25542 25542->25539 25543->25537 25543->25538 25569 7ff6b3258960 25544->25569 25545 7ff6b326dc80 51 API calls 25546 7ff6b32589ee memset 25545->25546 25547 7ff6b3258ada OutputDebugStringW 25546->25547 25546->25569 25548 7ff6b3258aef HeapFree 25547->25548 25547->25569 25548->25569 25549 7ff6b325c3b0 95 API calls 25549->25569 25550 7ff6b326dc80 51 API calls 25551 7ff6b3258c42 memset 25550->25551 25553 7ff6b3258d2a OutputDebugStringW 25551->25553 25561 7ff6b3258c83 25551->25561 25552 7ff6b3258f0e 25555 7ff6b3258f17 memset OutputDebugStringW 25552->25555 25556 7ff6b3258fc0 memset OutputDebugStringW 25552->25556 25554 7ff6b3258d3f HeapFree 25553->25554 25553->25561 25554->25561 25558 7ff6b3258f98 25555->25558 25564 7ff6b3259068 25555->25564 25599 7ff6b325b341 25556->25599 25557 7ff6b326dc80 51 API calls 25559 7ff6b3258dc3 memset 25557->25559 25560 7ff6b3258fa6 25558->25560 25558->25564 25562 7ff6b3258eaa OutputDebugStringW 25559->25562 25559->25569 26039 7ff6b326b8d0 54 API calls 25560->26039 25561->25553 25561->25557 25566 7ff6b3258ebf HeapFree 25562->25566 25562->25569 25568 7ff6b32590b9 memmove memmove 25564->25568 25565 7ff6b3258fbb 25570 7ff6b32590fd memmove 25565->25570 25566->25569 25567 7ff6b3252e70 119 API calls 25567->25569 25568->25565 25569->25545 25569->25547 25569->25549 25569->25550 25569->25552 25569->25562 25569->25567 25571 7ff6b3259129 25570->25571 25616 7ff6b325af34 25570->25616 25572 7ff6b325912b 25571->25572 25573 7ff6b3259164 memmove 25571->25573 25575 7ff6b3292a60 3 API calls 25572->25575 25603 7ff6b3259162 25573->25603 25574 7ff6b3299160 50 API calls 25576 7ff6b325b9aa 25574->25576 25577 7ff6b325913c 25575->25577 25581 7ff6b3299160 50 API calls 25576->25581 25577->25576 25579 7ff6b3259145 memmove 25577->25579 25578 7ff6b325b099 memset OutputDebugStringW 26040 7ff6b3251f50 52 API calls 25578->26040 25579->25578 25579->25603 25583 7ff6b325b9e8 25581->25583 25582 7ff6b325b139 25582->25576 25584 7ff6b325b141 25582->25584 25585 7ff6b325b176 25584->25585 25586 7ff6b325b164 HeapFree 25584->25586 25587 7ff6b326dc80 51 API calls 25585->25587 25586->25585 25590 7ff6b325b1fd memset 25587->25590 25588 7ff6b325b36d memset OutputDebugStringW 25591 7ff6b325b406 25588->25591 25589 7ff6b32591c3 25589->25578 25589->25588 25592 7ff6b3259231 25589->25592 25593 7ff6b325b2ea OutputDebugStringW 25590->25593 25608 7ff6b325b23b 25590->25608 25596 7ff6b325b4bd 25591->25596 25597 7ff6b325b414 memset OutputDebugStringW 25591->25597 25592->25578 25594 7ff6b325b30d HeapFree 25593->25594 25595 7ff6b325b31f 25593->25595 25594->25595 25598 7ff6b325b32a HeapFree 25595->25598 25595->25599 25601 7ff6b325b586 memset 25596->25601 25602 7ff6b325b4f0 25596->25602 25597->25599 25600 7ff6b325b7a4 HeapFree 25597->25600 25598->25599 25599->24976 25599->24977 25600->25599 25605 7ff6b325b5cd OutputDebugStringW 25601->25605 25604 7ff6b325b7bb 25602->25604 25607 7ff6b325b519 memset 25602->25607 25603->25578 25603->25589 25603->25616 25610 7ff6b32583f0 61 API calls 25604->25610 25606 7ff6b325b5db 25605->25606 25609 7ff6b326dc80 51 API calls 25606->25609 25607->25605 25608->25593 25611 7ff6b325b64a memset 25609->25611 25612 7ff6b325b7ce 25610->25612 25613 7ff6b325b73a OutputDebugStringW 25611->25613 25624 7ff6b325b688 25611->25624 25612->25606 25614 7ff6b325b7d8 25612->25614 25617 7ff6b325b75d HeapFree 25613->25617 25618 7ff6b325b76f 25613->25618 25615 7ff6b326dc80 51 API calls 25614->25615 25619 7ff6b325b84a memset 25615->25619 25616->25574 25617->25618 26041 7ff6b3253000 158 API calls 25618->26041 25621 7ff6b325b926 OutputDebugStringW 25619->25621 25625 7ff6b325b888 25619->25625 25622 7ff6b325b78f 25621->25622 25623 7ff6b325b949 HeapFree 25621->25623 25622->25599 25622->25600 25623->25622 25624->25613 25625->25621 25627 7ff6b3252ea0 25626->25627 25628 7ff6b32521e0 69 API calls 25627->25628 25629 7ff6b3252f4b 25628->25629 25630 7ff6b32588b0 156 API calls 25629->25630 25632 7ff6b3252fa9 25629->25632 25631 7ff6b3252f74 25630->25631 25631->25632 25633 7ff6b3252f79 LoadLibraryA 25631->25633 25634 7ff6b3252f9b 25633->25634 25635 7ff6b3252f83 HeapFree 25633->25635 25634->24792 25635->25634 25636->24957 25637->24992 25638->25000 25639->25006 25640->25037 25641->25039 25642->25020 25644 7ff6b326da4e 25643->25644 25645 7ff6b326da6b 25644->25645 25646 7ff6b326dc10 25644->25646 25662 7ff6b326da90 25644->25662 25647 7ff6b326da8b 25645->25647 25649 7ff6b3292a60 3 API calls 25645->25649 26044 7ff6b326d7b0 50 API calls 25646->26044 25653 7ff6b326dadb memmove 25647->25653 26042 7ff6b32991a0 50 API calls 25647->26042 25651 7ff6b326da82 25649->25651 25650 7ff6b326dc15 25652 7ff6b3299160 50 API calls 25650->25652 25651->25647 25651->25650 25655 7ff6b326dc22 25652->25655 25657 7ff6b326db0a 25653->25657 25658 7ff6b326db1c 25653->25658 25659 7ff6b326dc66 25655->25659 25660 7ff6b326dc53 HeapFree 25655->25660 26043 7ff6b32991a0 50 API calls 25657->26043 25658->25662 25663 7ff6b326dba2 memmove 25658->25663 25664 7ff6b32991a0 50 API calls 25658->25664 25659->25031 25660->25659 25662->25031 25663->25658 25664->25658 25665->25047 25666->25040 25667->25056 25668->25050 25669->25057 25670->24750 25671->24760 25672->24771 25673->24810 25674->24806 25675->24786 25676->24819 25677->24812 25678->24828 25679->24820 25680->24859 25681->24867 25682->24872 25683->24886 25685 7ff6b3252a6a OutputDebugStringW 25684->25685 25686 7ff6b32529ca 25684->25686 25685->24897 25686->25685 25687->24888 25688->24796 25689->24805 25690->24821 25691->24709 25693 7ff6b329916f 25692->25693 25694 7ff6b3299174 25692->25694 26051 7ff6b326d7b0 50 API calls 25693->26051 25696 7ff6b3299180 50 API calls 25694->25696 25697 7ff6b3299179 25696->25697 25698 7ff6b32623b0 50 API calls 25697->25698 25699 7ff6b3299198 25698->25699 25700 7ff6b329921b 25699->25700 25702 7ff6b32991d4 25699->25702 25701 7ff6b3299160 50 API calls 25700->25701 25703 7ff6b3299202 25701->25703 26045 7ff6b326d9a0 25702->26045 25704 7ff6b3299160 50 API calls 25703->25704 25708 7ff6b3299208 25703->25708 25706 7ff6b329922f 25704->25706 26052 7ff6b3299310 50 API calls 25706->26052 25708->24770 25724 7ff6b32623b0 25710->25724 25712 7ff6b3299198 25713 7ff6b329921b 25712->25713 25714 7ff6b32991d4 25712->25714 25715 7ff6b3299160 50 API calls 25713->25715 25718 7ff6b326d9a0 HeapReAlloc HeapAlloc GetProcessHeap HeapAlloc 25714->25718 25716 7ff6b3299202 25715->25716 25717 7ff6b3299160 50 API calls 25716->25717 25721 7ff6b3299208 25716->25721 25719 7ff6b329922f 25717->25719 25718->25716 25720 7ff6b3299310 50 API calls 25719->25720 25722 7ff6b329929e 25720->25722 25721->25071 25727 7ff6b3296870 50 API calls 25724->25727 25728->25091 25730 7ff6b3264aa2 25729->25730 25736 7ff6b3264add 25730->25736 25800 7ff6b329ac90 51 API calls 25730->25800 25732 7ff6b3264cf5 25732->25211 25734 7ff6b3264ca6 memmove 25734->25736 25736->25732 25736->25734 25798 7ff6b32968b0 51 API calls 25736->25798 25799 7ff6b329ac90 51 API calls 25736->25799 25738 7ff6b326dc80 51 API calls 25737->25738 25739 7ff6b325ba75 memset 25738->25739 25740 7ff6b325bb5a OutputDebugStringW 25739->25740 25741 7ff6b325baad 25739->25741 25742 7ff6b325bb7a HeapFree 25740->25742 25743 7ff6b325bb8c GetModuleHandleA 25740->25743 25741->25740 25742->25743 25744 7ff6b325bd59 GetLastError memset 25743->25744 25745 7ff6b325bba2 memset OutputDebugStringW 25743->25745 25746 7ff6b325be11 OutputDebugStringW 25744->25746 25747 7ff6b325bdb2 memset 25745->25747 25748 7ff6b325bc2f 25745->25748 25750 7ff6b325be1f 25746->25750 25747->25746 25749 7ff6b325be39 25748->25749 25751 7ff6b325bc5a 25748->25751 25753 7ff6b326dc80 51 API calls 25749->25753 25750->25248 25752 7ff6b326dc80 51 API calls 25751->25752 25754 7ff6b325bcfc memset 25752->25754 25755 7ff6b325be9b memset 25753->25755 25756 7ff6b325c36a OutputDebugStringW 25754->25756 25764 7ff6b325bd34 25754->25764 25757 7ff6b325bf7a OutputDebugStringW 25755->25757 25763 7ff6b325bed3 25755->25763 25756->25750 25760 7ff6b325c38a HeapFree 25756->25760 25758 7ff6b325bf9d HeapFree 25757->25758 25759 7ff6b325bfaf 25757->25759 25758->25759 25801 7ff6b32583f0 25759->25801 25760->25750 25763->25757 25764->25756 25765 7ff6b325bfd4 25768 7ff6b326dc80 51 API calls 25765->25768 25766 7ff6b325c0ae 25767 7ff6b326dc80 51 API calls 25766->25767 25769 7ff6b325c105 memset 25767->25769 25770 7ff6b325c051 memset 25768->25770 25771 7ff6b325c29a OutputDebugStringW 25769->25771 25774 7ff6b325c13d 25769->25774 25772 7ff6b325c1ea OutputDebugStringW 25770->25772 25775 7ff6b325c089 25770->25775 25771->25750 25773 7ff6b325c2be HeapFree 25771->25773 25772->25750 25772->25773 25773->25750 25774->25771 25775->25772 25777 7ff6b3252ac0 25776->25777 25778 7ff6b32521e0 69 API calls 25777->25778 25779 7ff6b3252b6b 25778->25779 25780 7ff6b3252be6 25779->25780 25781 7ff6b32588b0 158 API calls 25779->25781 25818 7ff6b32996d0 50 API calls 25780->25818 25782 7ff6b3252b94 25781->25782 25782->25780 25783 7ff6b3252b9d VirtualAllocEx 25782->25783 25785 7ff6b3252bd6 25783->25785 25786 7ff6b3252bbe HeapFree 25783->25786 25785->25338 25785->25339 25786->25785 25788->25179 25789->25238 25790->25248 25791->25248 25792->25260 25793->25177 25794->25280 25795->25177 25796->25219 25798->25736 25799->25736 25800->25736 25802 7ff6b326dc80 51 API calls 25801->25802 25803 7ff6b325848e memset 25802->25803 25804 7ff6b325857a OutputDebugStringW 25803->25804 25809 7ff6b32584c6 25803->25809 25805 7ff6b325859a HeapFree 25804->25805 25810 7ff6b32585ac 25804->25810 25805->25810 25806 7ff6b3258747 memset OutputDebugStringW 25807 7ff6b325887c 25806->25807 25807->25765 25807->25766 25808 7ff6b32585f1 strlen 25808->25810 25809->25804 25810->25806 25810->25808 25811 7ff6b3258643 memcmp 25810->25811 25811->25810 25812 7ff6b3258654 25811->25812 25813 7ff6b326dc80 51 API calls 25812->25813 25814 7ff6b32586ea memset 25813->25814 25815 7ff6b325884a OutputDebugStringW 25814->25815 25816 7ff6b3258722 25814->25816 25815->25807 25817 7ff6b325886a HeapFree 25815->25817 25816->25815 25817->25807 25964 7ff6b3283a70 25819->25964 25822 7ff6b3283a70 79 API calls 25824 7ff6b32838a8 25822->25824 25823 7ff6b325cc19 25823->25376 25823->25379 25824->25823 25825 7ff6b3283913 HeapFree 25824->25825 25826 7ff6b3283904 HeapFree 25824->25826 25825->25823 25826->25825 25828 7ff6b32826b8 25827->25828 25829 7ff6b32826de 25827->25829 26005 7ff6b327eaa0 50 API calls 25828->26005 26002 7ff6b327e960 25829->26002 25832 7ff6b32828cd 25833 7ff6b32828d5 25832->25833 25841 7ff6b328295b 25832->25841 25834 7ff6b327eaa0 50 API calls 25833->25834 25835 7ff6b32828ef 25834->25835 25836 7ff6b3282ce7 25837 7ff6b328324a 25836->25837 25838 7ff6b3299230 50 API calls 25836->25838 25839 7ff6b3299230 50 API calls 25837->25839 25838->25837 25842 7ff6b3283264 25839->25842 25840 7ff6b3282cd5 25843 7ff6b327eaa0 50 API calls 25840->25843 25841->25836 25841->25840 25844 7ff6b32813f0 51 API calls 25841->25844 25845 7ff6b3299160 50 API calls 25842->25845 25843->25836 25844->25841 25846 7ff6b3283275 25845->25846 25847 7ff6b32832bc 25846->25847 25848 7ff6b32832a6 HeapFree 25846->25848 25849 7ff6b325cd50 25847->25849 25850 7ff6b32832c3 HeapFree 25847->25850 25848->25847 25851 7ff6b3280550 25849->25851 25850->25849 25852 7ff6b32806d9 25851->25852 25853 7ff6b3280575 25851->25853 26009 7ff6b326d7b0 50 API calls 25852->26009 25853->25852 25855 7ff6b3280593 25853->25855 25857 7ff6b32805c1 25855->25857 25860 7ff6b3292a60 3 API calls 25855->25860 25856 7ff6b32806de 25858 7ff6b32806fc HeapFree 25856->25858 25859 7ff6b328070f 25856->25859 26007 7ff6b3280720 50 API calls 25857->26007 25858->25859 25859->25393 25862 7ff6b32805af 25860->25862 25862->25857 25863 7ff6b3299160 48 API calls 25862->25863 25863->25857 25864 7ff6b32805f7 25865 7ff6b32806a0 25864->25865 25866 7ff6b3280670 25864->25866 25867 7ff6b32806af 25865->25867 26008 7ff6b327fb70 50 API calls 25865->26008 25866->25867 25868 7ff6b328068f HeapFree 25866->25868 25867->25393 25868->25867 25875 7ff6b3281d64 25870->25875 25871 7ff6b3281dad 25871->25398 25872 7ff6b3281f02 SetLastError GetFullPathNameW 25874 7ff6b3281f2d GetLastError 25872->25874 25872->25875 25874->25875 25876 7ff6b3281fd5 GetLastError 25874->25876 25875->25871 25875->25872 25877 7ff6b3281f47 GetLastError 25875->25877 25879 7ff6b3281f7f 25875->25879 26010 7ff6b329a090 50 API calls 25875->26010 25880 7ff6b3282005 25876->25880 25881 7ff6b3281fef HeapFree 25876->25881 25877->25875 25878 7ff6b328237c 25877->25878 26015 7ff6b32993c0 50 API calls 25878->26015 25882 7ff6b3281f88 25879->25882 25883 7ff6b3282396 25879->25883 25880->25871 25885 7ff6b328202e HeapFree 25880->25885 25881->25880 25887 7ff6b3282124 25882->25887 25902 7ff6b3281fac 25882->25902 26016 7ff6b3299350 50 API calls 25883->26016 25885->25871 25905 7ff6b3282131 25887->25905 26014 7ff6b327c6b0 HeapReAlloc HeapAlloc GetProcessHeap HeapAlloc 25887->26014 25888 7ff6b328241c 25890 7ff6b3282429 HeapFree 25888->25890 25891 7ff6b3282443 25888->25891 25889 7ff6b3282406 HeapFree 25889->25888 25890->25891 25891->25398 25893 7ff6b3282230 memmove 25897 7ff6b328225c 25893->25897 25898 7ff6b3282264 25893->25898 25894 7ff6b32820d8 memmove 25894->25893 25894->25905 25895 7ff6b3282143 25895->25893 26013 7ff6b327fb70 50 API calls 25897->26013 25898->25871 25903 7ff6b3282290 HeapFree 25898->25903 25900 7ff6b3282331 25904 7ff6b32823c2 25900->25904 25900->25905 25902->25894 26011 7ff6b327c6b0 HeapReAlloc HeapAlloc GetProcessHeap HeapAlloc 25902->26011 25903->25871 25907 7ff6b3299160 50 API calls 25904->25907 25905->25895 26012 7ff6b329a090 50 API calls 25905->26012 25911 7ff6b3282394 25907->25911 25908 7ff6b32821c4 25908->25894 25909 7ff6b32823ad 25908->25909 25910 7ff6b3299160 50 API calls 25909->25910 25910->25911 25911->25888 25911->25889 25933 7ff6b3269e17 25912->25933 25913 7ff6b3269e70 memset FindNextFileW 25914 7ff6b3269f60 GetLastError 25913->25914 25913->25933 25914->25933 25939 7ff6b326a47f 25914->25939 25915 7ff6b326a50d 25919 7ff6b326a548 HeapFree 25915->25919 25920 7ff6b326a55e 25915->25920 25916 7ff6b326a03a memmove 25917 7ff6b3269fa6 memmove 25916->25917 25918 7ff6b326a0a0 memmove memmove memmove 25916->25918 25917->25933 25918->25933 25919->25920 25920->25428 25921 7ff6b3269ea0 FindNextFileW 25921->25914 25921->25933 25922 7ff6b3269eea memmove 25922->25933 25923 7ff6b326a4db 26032 7ff6b3299350 50 API calls 25923->26032 25924 7ff6b3269e02 HeapFree 25924->25933 25927 7ff6b3269df0 HeapFree 25927->25924 25928 7ff6b326a2c2 25929 7ff6b3299160 50 API calls 25928->25929 25929->25915 25930 7ff6b326a2cd memmove 25932 7ff6b3282670 53 API calls 25930->25932 25931 7ff6b3292a60 3 API calls 25931->25933 25932->25933 25933->25913 25933->25915 25933->25916 25933->25917 25933->25918 25933->25921 25933->25922 25933->25923 25933->25924 25933->25927 25933->25928 25933->25930 25933->25931 25934 7ff6b326a332 HeapFree 25933->25934 25935 7ff6b3283830 81 API calls 25933->25935 25936 7ff6b326a43e HeapFree 25933->25936 25938 7ff6b326a3df HeapFree 25933->25938 25933->25939 25940 7ff6b326a3d0 HeapFree 25933->25940 26017 7ff6b327e5a0 25933->26017 26031 7ff6b3266200 HeapFree HeapFree 25933->26031 25934->25933 25935->25933 25936->25933 25938->25933 25939->25428 25940->25938 25942 7ff6b32627c9 25941->25942 25943 7ff6b3262742 25941->25943 26034 7ff6b326d7b0 50 API calls 25942->26034 25944 7ff6b3262779 25943->25944 25946 7ff6b3292a60 3 API calls 25943->25946 25947 7ff6b326277f memmove 25944->25947 25949 7ff6b3262761 25946->25949 25950 7ff6b3282670 53 API calls 25947->25950 25948 7ff6b32627ce 25951 7ff6b32627ec HeapFree 25948->25951 25952 7ff6b32627ff 25948->25952 25949->25947 25954 7ff6b3299160 50 API calls 25949->25954 25953 7ff6b32627ad 25950->25953 25951->25952 25952->25466 25953->25466 25954->25944 25955->25418 25956->25445 25957->25447 25958->25484 25959->25484 25960->25450 26035 7ff6b3299310 50 API calls 25961->26035 25983 7ff6b32816a0 25964->25983 25967 7ff6b3283b07 25971 7ff6b3283862 25967->25971 25975 7ff6b3280550 50 API calls 25967->25975 25968 7ff6b3283bb3 GetFileInformationByHandle 25969 7ff6b3283c91 GetLastError 25968->25969 25970 7ff6b3283bde 25968->25970 25974 7ff6b3283caa CloseHandle 25969->25974 25972 7ff6b3283beb GetFileInformationByHandleEx 25970->25972 25973 7ff6b3283c15 25970->25973 25971->25822 25971->25823 25972->25969 25972->25973 25973->25974 25974->25971 25976 7ff6b3283b3d 25975->25976 25976->25971 25977 7ff6b3281d30 62 API calls 25976->25977 25978 7ff6b3283b79 25977->25978 25978->25971 25979 7ff6b3283cc6 memset FindFirstFileW 25978->25979 25980 7ff6b3283cec FindClose 25979->25980 25981 7ff6b3283d17 25979->25981 25980->25981 25981->25971 25982 7ff6b3283d7a HeapFree 25981->25982 25982->25971 25984 7ff6b3280550 50 API calls 25983->25984 25985 7ff6b32816c9 25984->25985 25986 7ff6b3281d30 62 API calls 25985->25986 25994 7ff6b32816d9 25985->25994 25989 7ff6b3281703 25986->25989 25987 7ff6b32817ab 25988 7ff6b3281892 HeapFree 25987->25988 25987->25994 25988->25994 25989->25987 25990 7ff6b3281761 CreateFileW 25989->25990 25989->25994 25992 7ff6b32818bf GetLastError 25990->25992 25993 7ff6b328181f 25990->25993 25992->25994 25995 7ff6b3281866 HeapFree 25992->25995 25996 7ff6b328185f 25993->25996 25997 7ff6b328182e GetLastError 25993->25997 25994->25967 25994->25968 25995->25994 25996->25994 25996->25995 25997->25996 25998 7ff6b328183b SetFileInformationByHandle 25997->25998 25998->25996 25999 7ff6b32818db GetLastError CloseHandle 25998->25999 26000 7ff6b328190c 25999->26000 26001 7ff6b32818fa HeapFree 25999->26001 26000->25994 26001->26000 26006 7ff6b327eaa0 50 API calls 26002->26006 26004 7ff6b327e981 26005->25829 26006->26004 26007->25864 26008->25867 26009->25856 26010->25875 26011->25908 26012->25895 26013->25898 26014->25900 26018 7ff6b327e5d4 26017->26018 26019 7ff6b327e8ee 26017->26019 26021 7ff6b3292a60 3 API calls 26018->26021 26029 7ff6b327e606 26018->26029 26033 7ff6b326d7b0 50 API calls 26019->26033 26023 7ff6b327e5f1 26021->26023 26022 7ff6b327e8f3 26024 7ff6b327e942 26022->26024 26025 7ff6b327e92f HeapFree 26022->26025 26027 7ff6b3299160 48 API calls 26023->26027 26023->26029 26024->25933 26025->26024 26026 7ff6b327e8bf 26026->25933 26027->26029 26028 7ff6b327e650 memmove 26028->26029 26029->26026 26029->26028 26030 7ff6b329a090 48 API calls 26029->26030 26030->26029 26031->25933 26033->26022 26034->25948 26037->25524 26038->25541 26039->25565 26040->25582 26041->25622 26042->25653 26043->25658 26044->25650 26046 7ff6b326d9b9 26045->26046 26047 7ff6b326d9d7 26045->26047 26046->26047 26049 7ff6b326d9c0 HeapReAlloc 26046->26049 26048 7ff6b3292a60 3 API calls 26047->26048 26050 7ff6b326d9e8 26048->26050 26049->26050 26050->25703 26051->25694
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FreeHeap$ErrorLastmemset$DebugOutputString$CreateFileFirstModuleModule32NamePrngProcessSnapshotToolhelp32memcmpmemmove
          • String ID: $0$@$@$Failed to resolve NtCreateSectionFailed to resolve NtMapViewOfSection for module: $Failed to resolve NtMapViewOfSectionFailed to resolve NtUnmapViewOfSection for module: $Failed to resolve NtOpenFileFailed to resolve NtCreateSection for module: $Failed to resolve NtUnmapViewOfSectionCurrent executable path: $Invalid DOS signatureNtMapViewOfSection failed for module: with status: $Invalid NT signatureInvalid DOS signature for module: $KO_S$KO_S$KO_S$KO_S$KO_S$KO_S$NtCreateSection failedNtOpenFile failed for $NtCreateSectionNtMapViewOfSectionNtUnmapViewOfSectionNtOpenFileStarting remapping of module: $NtMapViewOfSection failedNtCreateSection failed for module: $`
          • API String ID: 2058080900-3317569693
          • Opcode ID: 2e082a84c7a31cb715ee0b8fc4753af9e37760f65bc9d791b657649b7cf78f27
          • Instruction ID: 7ae74904423b75b2fd7c4d4a4011d5ceb6f699922031f63ed29f0b2a8934ecad
          • Opcode Fuzzy Hash: 2e082a84c7a31cb715ee0b8fc4753af9e37760f65bc9d791b657649b7cf78f27
          • Instruction Fuzzy Hash: 6393C672B19BC181EB218B18E5453EAB3A1FB85784F418235DB8DA7B99EF7CD244C740
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FreeHeap$DebugOutputProcessStringTokenmemset$AdjustCryptCurrentErrorFunction036LastLookupOpenPrivilegePrivilegesRandomSystemValuememmove
          • String ID: #$&$-NoProfile-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProduct$Attempting to stop the service...Failed to stop service or service was not running.Service stopped successfully.Attempting to delete the service...Failed to delete service.Service deleted successfully.Number of names in export directory: $CString::new failedsrc\token.rs$Failed to get Defender module pathsAttempting to patch function at address: $Failed to load MpOAV.dllDllUnregisterServer$Failed to open service.Successfully opened service: $Failed to patch Windows Defender functionsFailed to unregister MpOAV.dll: $Failed to resolve ControlServiceDeleteService$Failed to resolve DeleteServiceOpening Service Control Manager...Failed to open Service Control Manager.Successfully opened Service Control Manager.Opening service: $Failed to resolve OpenSCManagerAOpenServiceA$Failed to resolve OpenServiceAControlService$Failed to unregister MpOAV.dllFailed to query antivirus service name: $Failed to write to process memory.VirtualProtectLoadLibraryA$KO_S$KO_S$MpScanStart$MpThreatAction$MpWDEnable$OpenSCManagerA$Process module remapping failedFailed to patch Windows Defender functions: $Service interaction completed successfully./rustc/100fde5246bf56f22fb5cc85374dd841296fce0e\library\core\src\slice\sort\stable\quicksort.rsmid > len$ServiceName not found in JSON output.Set-MpPreference -DisableRealtimeMonitoring $true } Failed to disable real-time monitoring: $WriteProcessMemory$advapi32.dll$aths$called `Result::unwrap()` on an `Err` value$kernel32.dllVirtualAllocEx$mpclient.dllWDEnable$mpoav.dllFailed to resolve DllUnregisterServer.DllUnregisterServer failed$nown
          • API String ID: 51783063-3113947615
          • Opcode ID: 8030f5f093471952398372fca96803d005588d6cdcd2b6b791d5233ed7e40f49
          • Instruction ID: 69eb90676cb56fe6dddcab7cb4b0ef6a3d8e301ece1f24881d33951c5a12852f
          • Opcode Fuzzy Hash: 8030f5f093471952398372fca96803d005588d6cdcd2b6b791d5233ed7e40f49
          • Instruction Fuzzy Hash: BB835F32B08BC689E7368F29D9463F96364FF49B48F444235DB4DAAB59EF389245C340
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: DebugFreeHeapOutputStringmemset
          • String ID: .$8$Unpad ErrorBorrowMutErroralready borrowed: $a Display implementation returned an error unexpectedly$advapi32.dll$c$d$gdi32.dll$kernel32.dll$l$l$mpclient.dll$mpoav.dll$user32.dll
          • API String ID: 3278678782-3081676239
          • Opcode ID: 0f919f5dd305049b0aec777d161ebbb8f567a9ad1c6fb871c919d15f965d4b26
          • Instruction ID: 27eb18865cde7b5dba7929c90e83781d79010160998c788a07c11e9a7ae394d5
          • Opcode Fuzzy Hash: 0f919f5dd305049b0aec777d161ebbb8f567a9ad1c6fb871c919d15f965d4b26
          • Instruction Fuzzy Hash: B333B162718BD481F6218FA5A9617EBA3A1FB89BC4F04A135DF8D67B19DF3CD2418700
          APIs
          Strings
          • *fatal runtime error: I/O error: operation failed to complete synchronously, xrefs: 00007FF6B325CD37
          • , xrefs: 00007FF6B325D12E
          • , xrefs: 00007FF6B325D194
          • C:\ProgramData\Microsoft\Windows Defender\PlatformNo valid Defender Platform versions found.Failed to read Defender Platform directoryDefender Platform path does not exist.MpClient.dllMpOAV.dllOne or both of the required Defender modules (MpClient.dll, MpOAV.d, xrefs: 00007FF6B325CC00
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FreeHeap$memmove$Find$Close$ErrorFileFirstLastmemset
          • String ID: $ $*fatal runtime error: I/O error: operation failed to complete synchronously$C:\ProgramData\Microsoft\Windows Defender\PlatformNo valid Defender Platform versions found.Failed to read Defender Platform directoryDefender Platform path does not exist.MpClient.dllMpOAV.dllOne or both of the required Defender modules (MpClient.dll, MpOAV.d
          • API String ID: 602248511-964431083
          • Opcode ID: 34c515e589215cb5021155b7f41b4c74f2f3027839a635186590c8004865ca34
          • Instruction ID: 5feb0f58acf3a066896ea5b053b4a96d45cfd62191d6d55c519be411e157447a
          • Opcode Fuzzy Hash: 34c515e589215cb5021155b7f41b4c74f2f3027839a635186590c8004865ca34
          • Instruction Fuzzy Hash: C8628322B09BC585F7209F29DA463E92361FB89B98F054135CF4DAB79ADF39E245C340

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1888 7ff6b325b9f0-7ff6b325baa7 call 7ff6b326dc80 memset 1891 7ff6b325bb5a-7ff6b325bb78 OutputDebugStringW 1888->1891 1892 7ff6b325baad-7ff6b325babf 1888->1892 1895 7ff6b325bb7a-7ff6b325bb86 HeapFree 1891->1895 1896 7ff6b325bb8c-7ff6b325bb9c GetModuleHandleA 1891->1896 1893 7ff6b325bacb-7ff6b325bae8 1892->1893 1894 7ff6b325bac1-7ff6b325bac9 1892->1894 1898 7ff6b325baf0-7ff6b325bb20 1893->1898 1897 7ff6b325bb28-7ff6b325bb39 1894->1897 1895->1896 1899 7ff6b325bd59-7ff6b325bdb0 GetLastError memset 1896->1899 1900 7ff6b325bba2-7ff6b325bc29 memset OutputDebugStringW 1896->1900 1903 7ff6b325bb40-7ff6b325bb47 1897->1903 1898->1898 1901 7ff6b325bb22-7ff6b325bb25 1898->1901 1902 7ff6b325be11-7ff6b325be19 OutputDebugStringW 1899->1902 1904 7ff6b325bdb2-7ff6b325be07 memset 1900->1904 1905 7ff6b325bc2f-7ff6b325bc43 1900->1905 1901->1897 1908 7ff6b325be1f-7ff6b325be38 1902->1908 1903->1891 1909 7ff6b325bb49-7ff6b325bb58 1903->1909 1904->1902 1906 7ff6b325be39 1905->1906 1907 7ff6b325bc49-7ff6b325bc54 1905->1907 1911 7ff6b325be3e-7ff6b325becd call 7ff6b326dc80 memset 1906->1911 1910 7ff6b325bc5a-7ff6b325bd2e call 7ff6b326dc80 memset 1907->1910 1907->1911 1909->1891 1909->1903 1916 7ff6b325c36a-7ff6b325c388 OutputDebugStringW 1910->1916 1917 7ff6b325bd34-7ff6b325bd46 1910->1917 1918 7ff6b325bf7a-7ff6b325bf9b OutputDebugStringW 1911->1918 1919 7ff6b325bed3-7ff6b325bee5 1911->1919 1924 7ff6b325c38a-7ff6b325c396 HeapFree 1916->1924 1925 7ff6b325c39c-7ff6b325c39e 1916->1925 1920 7ff6b325bd4c-7ff6b325bd54 1917->1920 1921 7ff6b325c2d5-7ff6b325c2f2 1917->1921 1922 7ff6b325bf9d-7ff6b325bfa9 HeapFree 1918->1922 1923 7ff6b325bfaf-7ff6b325bfce call 7ff6b32583f0 1918->1923 1926 7ff6b325bee7-7ff6b325beef 1919->1926 1927 7ff6b325bef1-7ff6b325bf0e 1919->1927 1930 7ff6b325c338-7ff6b325c349 1920->1930 1931 7ff6b325c300-7ff6b325c330 1921->1931 1922->1923 1940 7ff6b325bfd4-7ff6b325c083 call 7ff6b326dc80 memset 1923->1940 1941 7ff6b325c0ae-7ff6b325c137 call 7ff6b326dc80 memset 1923->1941 1924->1925 1925->1908 1928 7ff6b325bf48-7ff6b325bf59 1926->1928 1929 7ff6b325bf10-7ff6b325bf40 1927->1929 1934 7ff6b325bf60-7ff6b325bf67 1928->1934 1929->1929 1933 7ff6b325bf42-7ff6b325bf45 1929->1933 1936 7ff6b325c350-7ff6b325c357 1930->1936 1931->1931 1935 7ff6b325c332-7ff6b325c335 1931->1935 1933->1928 1934->1918 1938 7ff6b325bf69-7ff6b325bf78 1934->1938 1935->1930 1936->1916 1939 7ff6b325c359-7ff6b325c368 1936->1939 1938->1918 1938->1934 1939->1916 1939->1936 1948 7ff6b325c1ea-7ff6b325c208 OutputDebugStringW 1940->1948 1949 7ff6b325c089-7ff6b325c09b 1940->1949 1946 7ff6b325c29a-7ff6b325c2b8 OutputDebugStringW 1941->1946 1947 7ff6b325c13d-7ff6b325c14f 1941->1947 1946->1908 1950 7ff6b325c2be-7ff6b325c2d0 HeapFree 1946->1950 1951 7ff6b325c213-7ff6b325c22c 1947->1951 1952 7ff6b325c155-7ff6b325c15d 1947->1952 1948->1950 1953 7ff6b325c20e 1948->1953 1954 7ff6b325c162-7ff6b325c17f 1949->1954 1955 7ff6b325c0a1-7ff6b325c0a9 1949->1955 1950->1908 1959 7ff6b325c230-7ff6b325c260 1951->1959 1957 7ff6b325c268-7ff6b325c279 1952->1957 1953->1908 1958 7ff6b325c180-7ff6b325c1b0 1954->1958 1956 7ff6b325c1b8-7ff6b325c1c9 1955->1956 1962 7ff6b325c1d0-7ff6b325c1d7 1956->1962 1960 7ff6b325c280-7ff6b325c287 1957->1960 1958->1958 1961 7ff6b325c1b2-7ff6b325c1b5 1958->1961 1959->1959 1963 7ff6b325c262-7ff6b325c265 1959->1963 1960->1946 1964 7ff6b325c289-7ff6b325c298 1960->1964 1961->1956 1962->1948 1965 7ff6b325c1d9-7ff6b325c1e8 1962->1965 1963->1957 1964->1946 1964->1960 1965->1948 1965->1962
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: memset$DebugOutputString$FreeHeap$ErrorHandleLastModule
          • String ID: .$ntdll.dll$y
          • API String ID: 823618834-3542015323
          • Opcode ID: c93186c017a53872e5cc2556b513e53ea9fde6ce147ce243dda8cba5de63c6ca
          • Instruction ID: 913b1c9865f85ac122ea6592f6680d381f3c64223287704d6275b5337a9543f5
          • Opcode Fuzzy Hash: c93186c017a53872e5cc2556b513e53ea9fde6ce147ce243dda8cba5de63c6ca
          • Instruction Fuzzy Hash: 4832C422B18BC585EB208F28E5067EAB361FB85784F504235DB8DA3B5AEF7DD244C740

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1966 7ff6b32521e0-7ff6b3252276 call 7ff6b32983d6 OutputDebugStringW 1969 7ff6b3252278-7ff6b3252280 1966->1969 1970 7ff6b32522a0-7ff6b3252313 call 7ff6b326d130 call 7ff6b3251000 memmove * 2 1966->1970 1971 7ff6b3252297-7ff6b325229e call 7ff6b3299110 1969->1971 1972 7ff6b3252282-7ff6b3252292 call 7ff6b326b8d0 1969->1972 1980 7ff6b3252318-7ff6b3252351 call 7ff6b3266760 memmove 1970->1980 1971->1970 1971->1972 1972->1980 1984 7ff6b3252946-7ff6b325294d call 7ff6b3299160 1980->1984 1985 7ff6b3252357-7ff6b3252364 call 7ff6b3292a60 1980->1985 1989 7ff6b3252952-7ff6b325295c call 7ff6b3299160 1984->1989 1985->1989 1990 7ff6b325236a-7ff6b3252453 memmove * 3 memset 1985->1990 1994 7ff6b3252961-7ff6b325298f call 7ff6b32995b0 1989->1994 1992 7ff6b3252469-7ff6b325246d 1990->1992 1993 7ff6b3252455-7ff6b3252467 call 7ff6b326ab00 1990->1993 1997 7ff6b3252473-7ff6b32524a3 1992->1997 1998 7ff6b325252e-7ff6b3252592 1992->1998 1993->1997 2002 7ff6b32524c6-7ff6b325250e call 7ff6b3266760 * 2 1997->2002 2003 7ff6b32524a5-7ff6b32524c1 call 7ff6b326a9a0 1997->2003 1999 7ff6b32525d7-7ff6b32525f2 call 7ff6b3266760 * 2 1998->1999 2019 7ff6b32525f4-7ff6b3252609 1999->2019 2020 7ff6b3252610-7ff6b3252638 1999->2020 2017 7ff6b3252514-7ff6b3252529 2002->2017 2018 7ff6b32526b0-7ff6b32526d8 2002->2018 2012 7ff6b32527a8-7ff6b32527c8 2003->2012 2015 7ff6b32527ce-7ff6b325285a memset OutputDebugStringW 2012->2015 2016 7ff6b325285f-7ff6b32528ee memset OutputDebugStringW call 7ff6b3251f50 2012->2016 2021 7ff6b3252922-7ff6b3252945 2015->2021 2016->1994 2026 7ff6b32528f0-7ff6b325291c HeapFree 2016->2026 2024 7ff6b32526de-7ff6b3252751 call 7ff6b3266760 call 7ff6b326c5a0 2017->2024 2018->2024 2025 7ff6b325263e-7ff6b325267d call 7ff6b3266760 call 7ff6b326c5a0 2019->2025 2020->2025 2037 7ff6b3252767-7ff6b3252789 2024->2037 2038 7ff6b3252753-7ff6b3252765 2024->2038 2035 7ff6b3252683-7ff6b32526ab 2025->2035 2036 7ff6b32525a0-7ff6b32525ac 2025->2036 2026->2021 2039 7ff6b32525b2-7ff6b32525d1 2035->2039 2036->2039 2040 7ff6b325278f-7ff6b32527a3 2037->2040 2038->2040 2039->1997 2039->1999 2040->2012
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: memmove$memset$DebugOutputString$FreeHeap
          • String ID: Padding errorpanic_abort\src\lib.rs$a Display implementation returned an error unexpectedly$d$l
          • API String ID: 3510560538-2343619681
          • Opcode ID: 41839048031a02e994525cb3a55117a3c680d722307805600272efcd588ba607
          • Instruction ID: dedc8e6bd1fcf40f527ab9198a20f658e27e3a676cb3c942515a56f458d9e08c
          • Opcode Fuzzy Hash: 41839048031a02e994525cb3a55117a3c680d722307805600272efcd588ba607
          • Instruction Fuzzy Hash: 1012872261CBC591E6218B18E5423FAA361FFD9794F405231EFCDA2A99EF7CD245C740

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 2041 7ff6b3269d70-7ff6b3269ddf 2042 7ff6b3269e17-7ff6b3269e1f 2041->2042 2043 7ff6b326a498-7ff6b326a4a2 2042->2043 2044 7ff6b3269e25-7ff6b3269e3d 2042->2044 2047 7ff6b326a4a9-7ff6b326a4d5 2043->2047 2045 7ff6b3269e70-7ff6b3269e8b memset FindNextFileW 2044->2045 2046 7ff6b3269e3f-7ff6b3269e4b 2044->2046 2050 7ff6b3269f60-7ff6b3269f69 GetLastError 2045->2050 2051 7ff6b3269e91-7ff6b3269e94 2045->2051 2048 7ff6b326a030-7ff6b326a034 2046->2048 2049 7ff6b3269e51-7ff6b3269e59 2046->2049 2052 7ff6b326a50d-7ff6b326a546 2048->2052 2053 7ff6b326a03a-7ff6b326a09a memmove 2048->2053 2049->2045 2055 7ff6b3269e5b-7ff6b3269e62 2049->2055 2050->2043 2054 7ff6b3269f6f-7ff6b3269f85 2050->2054 2056 7ff6b3269eb1-7ff6b3269eb9 2051->2056 2061 7ff6b326a548-7ff6b326a558 HeapFree 2052->2061 2062 7ff6b326a55e-7ff6b326a57e 2052->2062 2059 7ff6b3269fa6-7ff6b3269fe8 memmove 2053->2059 2060 7ff6b326a0a0-7ff6b326a18d memmove * 3 2053->2060 2063 7ff6b3269f8c-7ff6b3269fa0 2054->2063 2055->2048 2064 7ff6b3269e68 2055->2064 2057 7ff6b3269ebb-7ff6b3269ec5 2056->2057 2058 7ff6b3269ee0-7ff6b3269ee4 2056->2058 2065 7ff6b3269ec7-7ff6b3269ecb 2057->2065 2066 7ff6b3269ea0-7ff6b3269eab FindNextFileW 2057->2066 2058->2052 2068 7ff6b3269eea-7ff6b3269f53 memmove 2058->2068 2059->2042 2069 7ff6b3269fee-7ff6b3269ffd 2059->2069 2067 7ff6b326a190-7ff6b326a194 2060->2067 2061->2062 2063->2059 2063->2060 2064->2045 2065->2058 2070 7ff6b3269ecd-7ff6b3269ed5 2065->2070 2066->2050 2066->2056 2071 7ff6b326a19a-7ff6b326a19f 2067->2071 2072 7ff6b326a261-7ff6b326a270 2067->2072 2068->2063 2073 7ff6b326a004-7ff6b326a009 2069->2073 2074 7ff6b3269fff 2069->2074 2070->2066 2075 7ff6b3269ed7 2070->2075 2076 7ff6b326a239-7ff6b326a23d 2071->2076 2077 7ff6b326a1a5-7ff6b326a1aa 2071->2077 2078 7ff6b326a4db-7ff6b326a4ed call 7ff6b3299350 2072->2078 2079 7ff6b326a276-7ff6b326a293 call 7ff6b327e5a0 2072->2079 2080 7ff6b3269e02-7ff6b3269e11 HeapFree 2073->2080 2081 7ff6b326a00f-7ff6b326a014 2073->2081 2074->2073 2075->2058 2076->2072 2083 7ff6b326a1b0-7ff6b326a1b5 2077->2083 2084 7ff6b326a23f-7ff6b326a243 2077->2084 2088 7ff6b326a4f2-7ff6b326a4fa 2078->2088 2095 7ff6b326a299-7ff6b326a2a7 2079->2095 2096 7ff6b326a4d6-7ff6b326a4d9 2079->2096 2080->2042 2086 7ff6b326a01a-7ff6b326a01e 2081->2086 2087 7ff6b3269df0-7ff6b3269dfc HeapFree 2081->2087 2089 7ff6b326a1bb-7ff6b326a1c0 2083->2089 2090 7ff6b326a245-7ff6b326a249 2083->2090 2084->2072 2086->2087 2087->2080 2092 7ff6b326a501-7ff6b326a508 call 7ff6b3299160 2088->2092 2093 7ff6b326a24b-7ff6b326a24f 2089->2093 2094 7ff6b326a1c6-7ff6b326a1cb 2089->2094 2090->2072 2092->2052 2093->2072 2098 7ff6b326a251-7ff6b326a255 2094->2098 2099 7ff6b326a1d1-7ff6b326a1d6 2094->2099 2100 7ff6b326a2a9-7ff6b326a2c0 call 7ff6b3292a60 2095->2100 2101 7ff6b326a2c7 2095->2101 2096->2092 2098->2072 2103 7ff6b326a1d8-7ff6b326a1dd 2099->2103 2104 7ff6b326a257-7ff6b326a25b 2099->2104 2102 7ff6b326a2cd-7ff6b326a330 memmove call 7ff6b3282670 2100->2102 2110 7ff6b326a2c2 2100->2110 2101->2102 2113 7ff6b326a348-7ff6b326a357 call 7ff6b3283830 2102->2113 2114 7ff6b326a332-7ff6b326a342 HeapFree 2102->2114 2107 7ff6b326a25d 2103->2107 2108 7ff6b326a1df-7ff6b326a1eb 2103->2108 2104->2072 2107->2072 2108->2067 2112 7ff6b326a1ed-7ff6b326a1fc 2108->2112 2110->2088 2112->2072 2115 7ff6b326a1fe-7ff6b326a20d 2112->2115 2118 7ff6b326a35c-7ff6b326a363 2113->2118 2114->2113 2115->2072 2117 7ff6b326a20f-7ff6b326a21e 2115->2117 2117->2072 2119 7ff6b326a220-7ff6b326a235 2117->2119 2121 7ff6b326a369-7ff6b326a378 2118->2121 2122 7ff6b326a3f7-7ff6b326a41c 2118->2122 2119->2079 2120 7ff6b326a237 2119->2120 2120->2072 2123 7ff6b326a439-7ff6b326a43c 2121->2123 2125 7ff6b326a37e-7ff6b326a3a5 2121->2125 2122->2123 2124 7ff6b326a41e-7ff6b326a435 2122->2124 2128 7ff6b326a450-7ff6b326a465 2123->2128 2129 7ff6b326a43e-7ff6b326a44a HeapFree 2123->2129 2126 7ff6b326a467-7ff6b326a46e call 7ff6b3266200 2124->2126 2127 7ff6b326a437 2124->2127 2130 7ff6b326a3a7 2125->2130 2131 7ff6b326a3b0-7ff6b326a3c3 2125->2131 2132 7ff6b326a473-7ff6b326a479 2126->2132 2127->2132 2128->2126 2128->2132 2129->2128 2130->2131 2134 7ff6b326a3c5-7ff6b326a3ca 2131->2134 2135 7ff6b326a3df-7ff6b326a3f5 HeapFree 2131->2135 2132->2042 2136 7ff6b326a47f-7ff6b326a496 2132->2136 2137 7ff6b326a3cc 2134->2137 2138 7ff6b326a3d0-7ff6b326a3d9 HeapFree 2134->2138 2135->2123 2136->2047 2137->2138 2138->2135
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FreeHeapmemmove$FileFindNextmemset
          • String ID:
          • API String ID: 2993505563-0
          • Opcode ID: 73e5ca03f287d926c50cce0658fbfb12d1e76ff9363dfc559147fdd638cf248c
          • Instruction ID: ca7efa84aba0feafc2676b58bb9bbe8a68eb59a81936639350337a3279485d78
          • Opcode Fuzzy Hash: 73e5ca03f287d926c50cce0658fbfb12d1e76ff9363dfc559147fdd638cf248c
          • Instruction Fuzzy Hash: 43229F62B08AC589F7718F29D9463E923A1FF84B48F444232DF4DAB794DF39A695C340

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 2139 7ff6b325c3b0-7ff6b325c46e call 7ff6b326dc80 memset 2142 7ff6b325c51a-7ff6b325c53b OutputDebugStringW 2139->2142 2143 7ff6b325c474-7ff6b325c486 2139->2143 2144 7ff6b325c53d-7ff6b325c549 HeapFree 2142->2144 2145 7ff6b325c54f-7ff6b325c564 call 7ff6b325b9f0 2142->2145 2146 7ff6b325c488-7ff6b325c490 2143->2146 2147 7ff6b325c492-7ff6b325c4af 2143->2147 2144->2145 2155 7ff6b325c56a-7ff6b325c59b memset 2145->2155 2156 7ff6b325c665-7ff6b325c6d6 memset OutputDebugStringW 2145->2156 2148 7ff6b325c4e8-7ff6b325c4f9 2146->2148 2149 7ff6b325c4b0-7ff6b325c4e0 2147->2149 2152 7ff6b325c500-7ff6b325c507 2148->2152 2149->2149 2151 7ff6b325c4e2-7ff6b325c4e5 2149->2151 2151->2148 2152->2142 2154 7ff6b325c509-7ff6b325c518 2152->2154 2154->2142 2154->2152 2158 7ff6b325c5a6-7ff6b325c5aa 2155->2158 2157 7ff6b325cba1-7ff6b325cbb5 2156->2157 2159 7ff6b325c5ac-7ff6b325c5af 2158->2159 2160 7ff6b325c5a0-7ff6b325c5a3 2158->2160 2161 7ff6b325c6db-7ff6b325c6f4 2159->2161 2162 7ff6b325c5b5-7ff6b325c5bc 2159->2162 2160->2158 2165 7ff6b325c6fa-7ff6b325c70b 2161->2165 2166 7ff6b325c841-7ff6b325c890 LdrLoadDll 2161->2166 2163 7ff6b325c5c9-7ff6b325c5cd 2162->2163 2164 7ff6b325c5be-7ff6b325c5c7 2162->2164 2167 7ff6b325c62c-7ff6b325c636 2163->2167 2168 7ff6b325c5cf-7ff6b325c5f4 2163->2168 2164->2158 2169 7ff6b325c738-7ff6b325c73c 2165->2169 2170 7ff6b325c896-7ff6b325c935 call 7ff6b326dc80 memset 2166->2170 2171 7ff6b325c960-7ff6b325c9ee call 7ff6b326dc80 memset 2166->2171 2167->2158 2172 7ff6b325c63b-7ff6b325c64d 2168->2172 2173 7ff6b325c5f6-7ff6b325c61f 2168->2173 2175 7ff6b325c73e-7ff6b325c741 2169->2175 2176 7ff6b325c710-7ff6b325c71a 2169->2176 2187 7ff6b325c93b-7ff6b325c94d 2170->2187 2188 7ff6b325caaa-7ff6b325cac8 OutputDebugStringW 2170->2188 2189 7ff6b325cb6a-7ff6b325cb88 OutputDebugStringW 2171->2189 2190 7ff6b325c9f4-7ff6b325ca06 2171->2190 2178 7ff6b325c64f-7ff6b325c660 2172->2178 2179 7ff6b325c621-7ff6b325c627 2172->2179 2173->2178 2173->2179 2175->2166 2183 7ff6b325c747-7ff6b325c751 2175->2183 2181 7ff6b325c82b-7ff6b325c83c call 7ff6b32992a0 2176->2181 2182 7ff6b325c720-7ff6b325c732 2176->2182 2178->2158 2179->2158 2181->2166 2182->2166 2182->2169 2185 7ff6b325c767-7ff6b325c77b 2183->2185 2186 7ff6b325c753-7ff6b325c760 2183->2186 2195 7ff6b325c77d-7ff6b325c791 2185->2195 2196 7ff6b325c7c2-7ff6b325c7da 2185->2196 2186->2182 2192 7ff6b325c762 2186->2192 2193 7ff6b325ca19-7ff6b325ca36 2187->2193 2194 7ff6b325c953-7ff6b325c95b 2187->2194 2201 7ff6b325caca-7ff6b325cad6 HeapFree 2188->2201 2202 7ff6b325cadc-7ff6b325cade 2188->2202 2199 7ff6b325cb8a-7ff6b325cb96 HeapFree 2189->2199 2200 7ff6b325cb9c 2189->2200 2197 7ff6b325ca0c-7ff6b325ca14 2190->2197 2198 7ff6b325cae3-7ff6b325cafc 2190->2198 2192->2181 2209 7ff6b325ca40-7ff6b325ca70 2193->2209 2204 7ff6b325ca78-7ff6b325ca89 2194->2204 2205 7ff6b325c793-7ff6b325c7ba 2195->2205 2206 7ff6b325c7e2-7ff6b325c7f4 2195->2206 2196->2182 2207 7ff6b325c7e0 2196->2207 2208 7ff6b325cb38-7ff6b325cb49 2197->2208 2203 7ff6b325cb00-7ff6b325cb30 2198->2203 2199->2200 2200->2157 2201->2202 2202->2157 2203->2203 2210 7ff6b325cb32-7ff6b325cb35 2203->2210 2215 7ff6b325ca90-7ff6b325ca97 2204->2215 2205->2176 2212 7ff6b325c7c0 2205->2212 2206->2176 2213 7ff6b325c7fa-7ff6b325c825 2206->2213 2207->2181 2211 7ff6b325cb50-7ff6b325cb57 2208->2211 2209->2209 2214 7ff6b325ca72-7ff6b325ca75 2209->2214 2210->2208 2211->2189 2216 7ff6b325cb59-7ff6b325cb68 2211->2216 2212->2213 2213->2181 2213->2182 2214->2204 2215->2188 2217 7ff6b325ca99-7ff6b325caa8 2215->2217 2216->2189 2216->2211 2217->2188 2217->2215
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: memset$DebugOutputString$FreeHeap
          • String ID: .$LdrLoadDllSuccessfully loaded module:
          • API String ID: 3592316530-2807338173
          • Opcode ID: 054d23b4d0b6147ab1f49bd6791a5ae085e6e3d9f8e5396f416cf7630cfd953c
          • Instruction ID: db7ba3cc10c40bf0a8342906f302398de3e7ba3bf55a936eb9b38b42af0309c5
          • Opcode Fuzzy Hash: 054d23b4d0b6147ab1f49bd6791a5ae085e6e3d9f8e5396f416cf7630cfd953c
          • Instruction Fuzzy Hash: 12123C62B2C7D544FB218B28E6067BAA751FB85784F415231DB8EA2B99FF7CD244C700

          Control-flow Graph

          APIs
          Strings
          • C:\ProgramData\Microsoft\Windows Defender\PlatformNo valid Defender Platform versions found.Failed to read Defender Platform directoryDefender Platform path does not exist.MpClient.dllMpOAV.dllOne or both of the required Defender modules (MpClient.dll, MpOAV.d, xrefs: 00007FF6B3283A79
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FileHandle$CloseFindInformation$ErrorFirstFreeHeapLastmemset
          • String ID: C:\ProgramData\Microsoft\Windows Defender\PlatformNo valid Defender Platform versions found.Failed to read Defender Platform directoryDefender Platform path does not exist.MpClient.dllMpOAV.dllOne or both of the required Defender modules (MpClient.dll, MpOAV.d
          • API String ID: 3630007247-3956315604
          • Opcode ID: 4e8a1b2d10a225d123cbf721959aeb28e9c09cf50922a60d6ddf97f86c70f01f
          • Instruction ID: 77c224e9200c9b84f05009e887b28784dbd6a39b7a561d07daf59d60035d235f
          • Opcode Fuzzy Hash: 4e8a1b2d10a225d123cbf721959aeb28e9c09cf50922a60d6ddf97f86c70f01f
          • Instruction Fuzzy Hash: 83815076B04B818AE730CF69E9853ED73B1FB44798F104225CF996BB94DF78A5858340

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 2296 7ff6b32583f0-7ff6b32584c0 call 7ff6b326dc80 memset 2299 7ff6b325857a-7ff6b3258598 OutputDebugStringW 2296->2299 2300 7ff6b32584c6-7ff6b32584d8 2296->2300 2303 7ff6b325859a-7ff6b32585a6 HeapFree 2299->2303 2304 7ff6b32585ac-7ff6b32585b7 2299->2304 2301 7ff6b32584da-7ff6b32584e2 2300->2301 2302 7ff6b32584e4-7ff6b325850e 2300->2302 2305 7ff6b3258548-7ff6b3258559 2301->2305 2306 7ff6b3258510-7ff6b3258540 2302->2306 2303->2304 2307 7ff6b32585bd-7ff6b32585db 2304->2307 2308 7ff6b3258747-7ff6b32587b9 memset OutputDebugStringW 2304->2308 2310 7ff6b3258560-7ff6b3258567 2305->2310 2306->2306 2309 7ff6b3258542-7ff6b3258545 2306->2309 2312 7ff6b32585f1-7ff6b3258641 strlen call 7ff6b326f4d0 2307->2312 2311 7ff6b325888d-7ff6b32588a3 2308->2311 2309->2305 2310->2299 2313 7ff6b3258569-7ff6b3258578 2310->2313 2316 7ff6b3258643-7ff6b3258652 memcmp 2312->2316 2317 7ff6b32585e0-7ff6b32585eb 2312->2317 2313->2299 2313->2310 2316->2317 2318 7ff6b3258654-7ff6b325871c call 7ff6b326dc80 memset 2316->2318 2317->2308 2317->2312 2321 7ff6b325884a-7ff6b3258868 OutputDebugStringW 2318->2321 2322 7ff6b3258722-7ff6b3258734 2318->2322 2325 7ff6b325886a-7ff6b3258876 HeapFree 2321->2325 2326 7ff6b325887c-7ff6b3258888 2321->2326 2323 7ff6b325873a-7ff6b3258742 2322->2323 2324 7ff6b32587be-7ff6b32587db 2322->2324 2327 7ff6b3258818-7ff6b3258829 2323->2327 2328 7ff6b32587e0-7ff6b3258810 2324->2328 2325->2326 2326->2311 2330 7ff6b3258830-7ff6b3258837 2327->2330 2328->2328 2329 7ff6b3258812-7ff6b3258815 2328->2329 2329->2327 2330->2321 2331 7ff6b3258839-7ff6b3258848 2330->2331 2331->2321 2331->2330
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: memset$DebugFreeHeapOutputStringmemcmpstrlen
          • String ID:
          • API String ID: 4219306441-0
          • Opcode ID: e389823bde405b2553d5e318f7b12db211a2a61345ee09fd1dc239043fa29a77
          • Instruction ID: 141f0b873f17349f37f3092c97d44b84b4465e4d7259ea952b4588d03fd2bfa6
          • Opcode Fuzzy Hash: e389823bde405b2553d5e318f7b12db211a2a61345ee09fd1dc239043fa29a77
          • Instruction Fuzzy Hash: 41C19322B18B8585EB21CF19E5467AAB7A0FB85784F414235DB8D93B5AEF7CE144CB00

          Control-flow Graph

          APIs
          • BCryptGenRandom.BCRYPT(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6B325DDC3), ref: 00007FF6B3273153
          • SystemFunction036.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6B325DDC3), ref: 00007FF6B3273165
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: CryptFunction036RandomSystem
          • String ID:
          • API String ID: 1232939966-0
          • Opcode ID: 9d79e033ac7da55fbe28373dac1f9e455cf96f572624f6d5591a3b0ae4e418ce
          • Instruction ID: bf8ee614e1af583055fef2e964881b6a5d269921039232dd5ff0303207fee6e4
          • Opcode Fuzzy Hash: 9d79e033ac7da55fbe28373dac1f9e455cf96f572624f6d5591a3b0ae4e418ce
          • Instruction Fuzzy Hash: D621A632709B8195EB508B19FA41366A3A4BB44BA4F204335EF6D97BE5DF3CD841C700

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 2218 7ff6b32816a0-7ff6b32816d7 call 7ff6b3280550 2221 7ff6b32816d9-7ff6b32816de 2218->2221 2222 7ff6b32816e3-7ff6b3281716 call 7ff6b3281d30 2218->2222 2223 7ff6b32818af-7ff6b32818be 2221->2223 2226 7ff6b3281718-7ff6b328171b 2222->2226 2227 7ff6b3281720-7ff6b328172a 2222->2227 2226->2223 2228 7ff6b328172c-7ff6b328172e 2227->2228 2229 7ff6b3281732-7ff6b3281734 2227->2229 2230 7ff6b3281736-7ff6b328173a 2228->2230 2231 7ff6b3281730 2228->2231 2229->2230 2232 7ff6b3281791-7ff6b3281795 2229->2232 2233 7ff6b3281746-7ff6b328174f 2230->2233 2234 7ff6b328173c-7ff6b3281740 2230->2234 2231->2233 2235 7ff6b328179b-7ff6b328179f 2232->2235 2236 7ff6b3281883-7ff6b3281890 2232->2236 2239 7ff6b3281766-7ff6b3281769 2233->2239 2240 7ff6b3281751-7ff6b328175a 2233->2240 2234->2233 2234->2236 2235->2236 2237 7ff6b32817a5-7ff6b32817a9 2235->2237 2236->2223 2238 7ff6b3281892-7ff6b32818aa HeapFree 2236->2238 2237->2233 2241 7ff6b32817ab 2237->2241 2238->2223 2243 7ff6b328176b-7ff6b3281774 2239->2243 2244 7ff6b32817b0-7ff6b32817c0 2239->2244 2242 7ff6b328175c-7ff6b328175f 2240->2242 2240->2243 2241->2236 2246 7ff6b3281761-7ff6b3281764 2242->2246 2247 7ff6b3281776-7ff6b328177a 2242->2247 2243->2246 2243->2247 2245 7ff6b32817c2 2244->2245 2244->2246 2245->2247 2248 7ff6b32817e0-7ff6b3281819 CreateFileW 2246->2248 2249 7ff6b328177c-7ff6b328178f 2247->2249 2250 7ff6b32817c4-7ff6b32817c6 2247->2250 2253 7ff6b32818bf-7ff6b32818d7 GetLastError 2248->2253 2254 7ff6b328181f-7ff6b3281826 2248->2254 2249->2248 2251 7ff6b32817c8-7ff6b32817cf 2250->2251 2252 7ff6b32817d3-7ff6b32817d5 2250->2252 2257 7ff6b32817db 2251->2257 2258 7ff6b32817d1 2251->2258 2252->2236 2252->2257 2255 7ff6b32818d9 2253->2255 2256 7ff6b3281866-7ff6b328187b HeapFree 2253->2256 2259 7ff6b3281828-7ff6b328182c 2254->2259 2260 7ff6b328185f-7ff6b3281864 2254->2260 2261 7ff6b328187e-7ff6b3281881 2255->2261 2256->2261 2257->2248 2258->2248 2259->2260 2262 7ff6b328182e-7ff6b3281839 GetLastError 2259->2262 2260->2256 2260->2261 2261->2223 2262->2260 2263 7ff6b328183b-7ff6b328185d SetFileInformationByHandle 2262->2263 2263->2260 2264 7ff6b32818db-7ff6b32818f8 GetLastError CloseHandle 2263->2264 2265 7ff6b328190c-7ff6b3281914 2264->2265 2266 7ff6b32818fa-7ff6b3281906 HeapFree 2264->2266 2265->2223 2266->2265
          APIs
            • Part of subcall function 00007FF6B3280550: HeapFree.KERNEL32(?,?,?,?,?,?,?,?,00007FF6B329929E,?,00007FF6B327FF42), ref: 00007FF6B3280698
          • HeapFree.KERNEL32 ref: 00007FF6B3281875
          • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,C:\ProgramData\Microsoft\Windows Defender\PlatformNo valid Defender Platform versions found.Failed to read Defender Platform directoryDefender Platform path does not exist.MpClient.dllMpOAV.dllOne or both of the required Defender modules (MpClient.dll, MpOAV.d,?), ref: 00007FF6B32818A1
          • GetLastError.KERNEL32 ref: 00007FF6B32818BF
          • GetLastError.KERNEL32 ref: 00007FF6B32818DB
          • CloseHandle.KERNEL32 ref: 00007FF6B32818EF
          • HeapFree.KERNEL32 ref: 00007FF6B3281906
          Strings
          • C:\ProgramData\Microsoft\Windows Defender\PlatformNo valid Defender Platform versions found.Failed to read Defender Platform directoryDefender Platform path does not exist.MpClient.dllMpOAV.dllOne or both of the required Defender modules (MpClient.dll, MpOAV.d, xrefs: 00007FF6B32816A1
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FreeHeap$ErrorLast$CloseHandle
          • String ID: C:\ProgramData\Microsoft\Windows Defender\PlatformNo valid Defender Platform versions found.Failed to read Defender Platform directoryDefender Platform path does not exist.MpClient.dllMpOAV.dllOne or both of the required Defender modules (MpClient.dll, MpOAV.d
          • API String ID: 4241441966-3956315604
          • Opcode ID: cefcb5b5c96e1bfa0a47cf439e9620a7754f982c45f8131112b6e9e0a1cfc760
          • Instruction ID: 4e8c038a8ebddc41fd9d78b76c2a92d5a11156d5d5e2d5705ea1fcf4d704be25
          • Opcode Fuzzy Hash: cefcb5b5c96e1bfa0a47cf439e9620a7754f982c45f8131112b6e9e0a1cfc760
          • Instruction Fuzzy Hash: C971F061F0C25656FB258B6AA7063B926A1BF48B84F044A35DF4DA3BC5DF7CF4A58300

          Control-flow Graph

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: AllocFreeHeapVirtual
          • String ID: @$KO_S$KO_S$KO_S$called `Result::unwrap()` on an `Err` value$kernel32.dllVirtualAllocEx
          • API String ID: 345646332-848511136
          • Opcode ID: 0f4065cc1be6debeb0d7b414320f2bec4ca54b7f44859b1f7bcfcb66e0a15afd
          • Instruction ID: bf10745e1bd967f69190667449b35d27185e383404ae23582f4663cb69bcb403
          • Opcode Fuzzy Hash: 0f4065cc1be6debeb0d7b414320f2bec4ca54b7f44859b1f7bcfcb66e0a15afd
          • Instruction Fuzzy Hash: 6F414A62B1C79641E7258B1AB90297AAB51FB84784F044135EF4E67BE9DE3DD241C700

          Control-flow Graph

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: __p___argc__p___argv_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
          • String ID:
          • API String ID: 1089653751-0
          • Opcode ID: 0215f48e05ad82a86c5b183879bce28ba03f5ccec45f2958d7f0f2f728e13d42
          • Instruction ID: 19992f13bd126c4d4a96d6f4c4c3e29f9dacb0d1c1c9a19ca888cb438b5dc63c
          • Opcode Fuzzy Hash: 0215f48e05ad82a86c5b183879bce28ba03f5ccec45f2958d7f0f2f728e13d42
          • Instruction Fuzzy Hash: AB311829F0824385FA14AF2CD6633B91291AF45B84F886235EB4DF73D7DE3DA9448351

          Control-flow Graph

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FreeHeapLibraryLoad
          • String ID: LoadLibraryA$called `Result::unwrap()` on an `Err` value$kernel32.dllVirtualAllocEx
          • API String ID: 2932443226-1281825251
          • Opcode ID: ccb115fb11406008533b1f937926a8c8607c7383fb1e2873d1ca90bbaa75eac6
          • Instruction ID: 9ef3d6632d75873e80497fe80f8c33d712ba2765859a64e88e24d1d4b0b5514c
          • Opcode Fuzzy Hash: ccb115fb11406008533b1f937926a8c8607c7383fb1e2873d1ca90bbaa75eac6
          • Instruction Fuzzy Hash: 13316B22B1C6A242F6158B1DB506979AB50BF85790F414231EF4EA2BE9DF3DD201C700

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 2429 7ff6b32521a0-7ff6b32521b0 CloseHandle 2430 7ff6b32521b7-7ff6b32521d9 GetLastError 2429->2430 2431 7ff6b32521b2-7ff6b32521b6 2429->2431
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: CloseErrorHandleLast
          • String ID: KO_S
          • API String ID: 918212764-3654716168
          • Opcode ID: eff81f20dafe75383aa25dd4bfaf4f4de9740d88f376226847d92467dbcefce0
          • Instruction ID: 97585b06316fac3881528c075b8a69641cf72377b573aced3e106e20b2cf48c4
          • Opcode Fuzzy Hash: eff81f20dafe75383aa25dd4bfaf4f4de9740d88f376226847d92467dbcefce0
          • Instruction Fuzzy Hash: 27D05E2DF0670383EB0CA73E1DB327A10D02F88A01FC0013EDA0BC1251ED2CC9550614

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 2445 7ff6b3252990-7ff6b32529c4 memset 2446 7ff6b3252a6a-7ff6b3252a86 OutputDebugStringW 2445->2446 2447 7ff6b32529ca-7ff6b32529dc 2445->2447 2448 7ff6b32529e8-7ff6b3252a05 2447->2448 2449 7ff6b32529de-7ff6b32529e6 2447->2449 2451 7ff6b3252a10-7ff6b3252a3a 2448->2451 2450 7ff6b3252a42-7ff6b3252a4d 2449->2450 2453 7ff6b3252a50-7ff6b3252a57 2450->2453 2451->2451 2452 7ff6b3252a3c-7ff6b3252a3f 2451->2452 2452->2450 2453->2446 2454 7ff6b3252a59-7ff6b3252a68 2453->2454 2454->2446 2454->2453
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: DebugOutputStringmemset
          • String ID:
          • API String ID: 1084755268-0
          • Opcode ID: 5fd0b6d7b5296ddcbbe80992f5240d8299e511567c437ad367ea059e068d3b59
          • Instruction ID: 98733ce32bdda27153e182b37718be03e28de5281f36262afdf4171150f79907
          • Opcode Fuzzy Hash: 5fd0b6d7b5296ddcbbe80992f5240d8299e511567c437ad367ea059e068d3b59
          • Instruction Fuzzy Hash: F8210712F1979541EB208728E2157B95221DB96BD0F619331DB4EA2F9AEF2CD3858704

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 2455 7ff6b3283830-7ff6b3283866 call 7ff6b3283a70 2458 7ff6b328386c-7ff6b328388a 2455->2458 2459 7ff6b3283928-7ff6b3283954 2455->2459 2458->2459 2461 7ff6b3283890-7ff6b32838ac call 7ff6b3283a70 2458->2461 2460 7ff6b3283957-7ff6b3283964 2459->2460 2464 7ff6b3283965-7ff6b328397e 2461->2464 2465 7ff6b32838b2-7ff6b32838be 2461->2465 2466 7ff6b328398d-7ff6b32839c0 2464->2466 2467 7ff6b3283980-7ff6b328398b 2464->2467 2465->2467 2468 7ff6b32838c4-7ff6b32838e2 2465->2468 2466->2460 2467->2460 2469 7ff6b32838ea-7ff6b32838f7 2468->2469 2470 7ff6b32838e4 2468->2470 2471 7ff6b32838f9-7ff6b32838fe 2469->2471 2472 7ff6b3283913-7ff6b3283926 HeapFree 2469->2472 2470->2469 2473 7ff6b3283904-7ff6b328390d HeapFree 2471->2473 2474 7ff6b3283900 2471->2474 2472->2467 2473->2472 2474->2473
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FreeHeap$Find$CloseFileFirstmemset
          • String ID:
          • API String ID: 2317575439-0
          • Opcode ID: 38e8540ba571c1abcbeda11fcce5213aae6636239dfca8e7adb032cfaf30fc0b
          • Instruction ID: d0d2c9720017b47b825425bf5031d371ba4f988044bf0b1038679f7930b138d0
          • Opcode Fuzzy Hash: 38e8540ba571c1abcbeda11fcce5213aae6636239dfca8e7adb032cfaf30fc0b
          • Instruction Fuzzy Hash: AE514026E18B818AE720CF39DA413AD6760FB98758F059225DF9D62B55DF38E1C5C300
          APIs
          • HeapFree.KERNEL32(?,00000000,0000000A,-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac,?,00007FF6B328D432,00000001,?,?,00000000,0000000A,-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac,?,00007FF6B3286AA1), ref: 00007FF6B3284E3C
          • HeapFree.KERNEL32(?,00000000,0000000A,-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac,?,00007FF6B328D432,00000001,?,?,00000000,0000000A,-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac,?,00007FF6B3286AA1), ref: 00007FF6B3284F34
          • HeapFree.KERNEL32(?,00000000,0000000A,-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac,?,00007FF6B328D432,00000001,?,?,00000000,0000000A,-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac,?,00007FF6B3286AA1), ref: 00007FF6B3285062
          • HeapFree.KERNEL32(?,00000000,0000000A,-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac,?,00007FF6B328D432,00000001,?,?,00000000,0000000A,-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac,?,00007FF6B3286AA1), ref: 00007FF6B328508F
          • GetEnvironmentStringsW.KERNEL32 ref: 00007FF6B3285157
          Strings
          • -Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac, xrefs: 00007FF6B3284D41, 00007FF6B32850B6, 00007FF6B32850D1
          • .exeprogram not found, xrefs: 00007FF6B3285FDA
          • \?\\, xrefs: 00007FF6B3285E17
          • assertion failed: self.height > 0, xrefs: 00007FF6B32889B1
          • ]?\\, xrefs: 00007FF6B3285E1F
          • -NoProfile-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProduct, xrefs: 00007FF6B32850D7
          • assertion failed: is_code_point_boundary(self, new_len), xrefs: 00007FF6B328685F, 00007FF6B3286967
          • PATHstd\src\sys_common\process.rs, xrefs: 00007FF6B3287CD6
          • -NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe , xrefs: 00007FF6B32850D3
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FreeHeap$EnvironmentStrings
          • String ID: -Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac$-NoProfile-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProduct$-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe $.exeprogram not found$PATHstd\src\sys_common\process.rs$\?\\$]?\\$assertion failed: is_code_point_boundary(self, new_len)$assertion failed: self.height > 0
          • API String ID: 2767186067-543456789
          • Opcode ID: f978a7e04e0595aae90ef8e11fed2de98dd1bdbe66447d85d2403bb8c85de68a
          • Instruction ID: 5e0b0000cbd1b81604053aed705ee1bedaae5ef464b078e5c778c648279d62ee
          • Opcode Fuzzy Hash: f978a7e04e0595aae90ef8e11fed2de98dd1bdbe66447d85d2403bb8c85de68a
          • Instruction Fuzzy Hash: 0A637066B18AD289EB708F29DD463F923A0FF44B99F444136CB5DABB95DF389244C300
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: ErrorFreeHeapLast$AddressCaptureContextCurrentDirectoryEntryFunctionLibraryLoadLookupObjectProcSingleWaitmemset
          • String ID: EnumerateLoadedModulesW64$SymAddrIncludeInlineTrace$SymFromInlineContextW$SymGetLineFromInlineContextW$SymGetOptions$SymGetSearchPathW$SymInitializeW$SymQueryInlineTrace$SymSetOptions$SymSetSearchPathW$assertion failed: len >= 0$dbghelp.dll$note: Some details are omitted, run with `RUST_BACKTRACE=full` for a verbose backtrace.__rust_begin_short_backtrace__rust_end_short_backtraces [... omitted frame ...]$stack backtrace:
          • API String ID: 914564095-3821163066
          • Opcode ID: 5e6e6d3852320d46eb42f78ed0d08fc31ca6206378f1530506b02126da95cfc2
          • Instruction ID: 5f83e0a496a91eb23fb092f06af30f476eb9470ba73ea1839f253b45dd3929cb
          • Opcode Fuzzy Hash: 5e6e6d3852320d46eb42f78ed0d08fc31ca6206378f1530506b02126da95cfc2
          • Instruction Fuzzy Hash: 4D924F35B09BC199EB318F29ED463E923A0FB48B98F040235DB4DAB7A5DF399645C340
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FreeHeapmemcmp
          • String ID: assertion failed: edge.height == self.height - 1$assertion failed: edge.height == self.node.height - 1
          • API String ID: 2929263700-554432098
          • Opcode ID: 62033d92b08aa74efdc786a67b73630a5d9dc7658e6334c9caeeaa658f8ffb0b
          • Instruction ID: 5b901b4681747e84e06e0e9ee06e2cc84618acfdfc77a4caf7a89fff0f10c872
          • Opcode Fuzzy Hash: 62033d92b08aa74efdc786a67b73630a5d9dc7658e6334c9caeeaa658f8ffb0b
          • Instruction Fuzzy Hash: D1A29E22A08BC581EB218F28E5463E9B374FF98758F449325DB9D577A5EF38E295C300
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: ErrorLast$FullNamePath
          • String ID:
          • API String ID: 2482867836-0
          • Opcode ID: 11fb09efb1bbff8c811b7ac656f5dc3cae9260b7df149f493a4e14bb923b95cc
          • Instruction ID: a40e8b6ab5844cea42ed48586daad073cec34f6f057f4a13a8f4008ea8180dfb
          • Opcode Fuzzy Hash: 11fb09efb1bbff8c811b7ac656f5dc3cae9260b7df149f493a4e14bb923b95cc
          • Instruction Fuzzy Hash: 3D42A062B08BC686E7658F29DD463E92364FB44B98F448235DF1CAB796CF7C9285C300
          APIs
          Strings
          • \\?\\\?\UNC\, xrefs: 00007FF6B3282069
          • C:\ProgramData\Microsoft\Windows Defender\PlatformNo valid Defender Platform versions found.Failed to read Defender Platform directoryDefender Platform path does not exist.MpClient.dllMpOAV.dllOne or both of the required Defender modules (MpClient.dll, MpOAV.d, xrefs: 00007FF6B3281D31
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: ErrorLast$FullNamePath
          • String ID: C:\ProgramData\Microsoft\Windows Defender\PlatformNo valid Defender Platform versions found.Failed to read Defender Platform directoryDefender Platform path does not exist.MpClient.dllMpOAV.dllOne or both of the required Defender modules (MpClient.dll, MpOAV.d$\\?\\\?\UNC\
          • API String ID: 2482867836-3069012770
          • Opcode ID: 9cc2b39c59a3f6c2e62481a4753102996afeb163eab45e648855f9e5c6e30f55
          • Instruction ID: 0b2cfb438c188ff7df2c39e60c39191f923f36a5eefb685df3389130cf67e6df
          • Opcode Fuzzy Hash: 9cc2b39c59a3f6c2e62481a4753102996afeb163eab45e648855f9e5c6e30f55
          • Instruction Fuzzy Hash: FD029062B0879685EB708F69DA463B923A4FF14B98F448132DB5DA77D4CF78E681C300
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FreeHeap
          • String ID:
          • API String ID: 3298025750-0
          • Opcode ID: f278e9c2044bb250a14bc00e20e76fe7fe070117f7d29a739d0c28a03c214796
          • Instruction ID: 62230a8ebddb2dabdb27bac2c92a36c77a34aca29125e361005b7d7f588503d6
          • Opcode Fuzzy Hash: f278e9c2044bb250a14bc00e20e76fe7fe070117f7d29a739d0c28a03c214796
          • Instruction Fuzzy Hash: 38028D25B1964682EE558B1EA6663B92750BF49FE4F460232CF1EE73D8DE3CF6418304
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FreeHeap$ErrorLast$EnvironmentVariable
          • String ID:
          • API String ID: 4066227703-0
          • Opcode ID: 944232158f3fe1def3f9f36170dc35c17423085ad34aa9eec328298fe0dfe3c0
          • Instruction ID: ac5f6931d3a40844cc531ed2f68b801d192187019f32449094235c268f2c5eb5
          • Opcode Fuzzy Hash: 944232158f3fe1def3f9f36170dc35c17423085ad34aa9eec328298fe0dfe3c0
          • Instruction Fuzzy Hash: 54B18D66B04BC695E7648F2ADD463E92360FB88B98F008236DF1CA7795CF78D285C304
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: Process$CurrentFreeHeapPrng
          • String ID:
          • API String ID: 2687294623-0
          • Opcode ID: e5eb912e600e3de9f0c4f973737d3a8ee0cbe9e38530d6e7bac4a16da6beb292
          • Instruction ID: 3442dfee18ce9a4f1029868f247c71f67ae71e7d2b9256a5a248793643ff4d24
          • Opcode Fuzzy Hash: e5eb912e600e3de9f0c4f973737d3a8ee0cbe9e38530d6e7bac4a16da6beb292
          • Instruction Fuzzy Hash: 1022BD62B08A8189E7648F2DD9463A937A0FF49BA8F144635EBAE977D5DF38D144C300
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: AddressSingleWake
          • String ID: <unnamed>$Box<dyn Any>aborting due to panic at $RUST_BACKTRACEentity not foundpermission deniedconnection refusedconnection resethost unreachablenetwork unreachableconnection abortednot connectedaddress in useaddress not availablenetwork downbroken pipeentity already existsoperation would blocknot a directo$full$main
          • API String ID: 3114109732-636500360
          • Opcode ID: 7decfb2134953eae2d7044aaa57751ff457841e7ac1c5eb7e7e1c4a3fd8e0b26
          • Instruction ID: b835a70e050293c6714af6c8c310dad1949666d2acf4f7a1d206fc136b3125f2
          • Opcode Fuzzy Hash: 7decfb2134953eae2d7044aaa57751ff457841e7ac1c5eb7e7e1c4a3fd8e0b26
          • Instruction Fuzzy Hash: C8326B22B09A428AFB10CF29D9963B837A0FB44B58F244636DB4DA77A5DF3DE545C340
          APIs
          Strings
          • NTDLL.DLL, xrefs: 00007FF6B327CFDA
          • assertion failed: self.is_char_boundary(new_len)/rustc/100fde5246bf56f22fb5cc85374dd841296fce0e\library\alloc\src\string.rs, xrefs: 00007FF6B327D54E
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FormatHandleMessageModulememset
          • String ID: NTDLL.DLL$assertion failed: self.is_char_boundary(new_len)/rustc/100fde5246bf56f22fb5cc85374dd841296fce0e\library\alloc\src\string.rs
          • API String ID: 2302251862-173729731
          • Opcode ID: 151ac4e671bd1ecfa84e3858da7fc1e35fb7d4d0cc29013ce92d359b2c317ab3
          • Instruction ID: c558126f2e9cce2acd73ceedcc887c8cc817e7a1e0cfd528a9fe8baf541dd5f9
          • Opcode Fuzzy Hash: 151ac4e671bd1ecfa84e3858da7fc1e35fb7d4d0cc29013ce92d359b2c317ab3
          • Instruction Fuzzy Hash: 86F1B136B0A6C2C9E7318F28DA067FD27A1FB44798F444136DB4D9AAC9DF789649D300
          APIs
          Strings
          • }0x, xrefs: 00007FF6B327BE63
          • 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899core\src\fmt\mod.rs, xrefs: 00007FF6B327BBA5
          • Utf8Errorvalid_up_toerror_lenNoneSomeTryFromIntError:, xrefs: 00007FF6B327BDD2
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: ConsoleErrorLastWrite$ByteCharMultiWide
          • String ID: }0x$00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899core\src\fmt\mod.rs$Utf8Errorvalid_up_toerror_lenNoneSomeTryFromIntError:
          • API String ID: 1956605914-143158241
          • Opcode ID: fbb86f203d10412ed67521f3e58d94a261d6486701979abc5f467866046ff1ec
          • Instruction ID: b7b2f4ec1eef818521b0f2bd11f45b680a72f170160c408927342af725ef2c28
          • Opcode Fuzzy Hash: fbb86f203d10412ed67521f3e58d94a261d6486701979abc5f467866046ff1ec
          • Instruction Fuzzy Hash: B6E10076B0869686EB248B29D6063F92761FB54BA4F404231DF5DA7BE8DF3CDA45C300
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: ErrorHandle$CloseConsoleFileLastModeObjectSingleStatusWaitWrite
          • String ID: called `Result::unwrap()` on an `Err` value
          • API String ID: 3090192319-2333694755
          • Opcode ID: f390687a06795bd9b8eb311e96a0844a9eedd5fc2ac20ab72b4c979a9aa3c5d9
          • Instruction ID: 3bf302a625c3fb4845b83633ca117c5325c6b52302ee223d6a36c22f91ee437f
          • Opcode Fuzzy Hash: f390687a06795bd9b8eb311e96a0844a9eedd5fc2ac20ab72b4c979a9aa3c5d9
          • Instruction Fuzzy Hash: 21B1C326B08692D9FB10CF28DA423F92761FB48798F444631EB5DA2AD5EF3CD585C340
          Strings
          • -Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac, xrefs: 00007FF6B3267800
          • -NoProfile-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProduct, xrefs: 00007FF6B3267806
          • -NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe , xrefs: 00007FF6B3267802
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID:
          • String ID: -Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac$-NoProfile-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProduct$-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe
          • API String ID: 0-435359000
          • Opcode ID: abfde995bc0a0cbca60103fab9842ba87dfa1b3407d067a39049b2f1dce5c1e2
          • Instruction ID: 506ed7dac8a23d172d7a59563ccc166aa0bb47abcab090e342e7010d604584b7
          • Opcode Fuzzy Hash: abfde995bc0a0cbca60103fab9842ba87dfa1b3407d067a39049b2f1dce5c1e2
          • Instruction Fuzzy Hash: 5F52B262B0DBC581EA608B19F6523BAA391FF89B90F544135DB8DA7B99DF7CE044C700
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: memcmp
          • String ID:
          • API String ID: 1475443563-3916222277
          • Opcode ID: 7a8c0a00b423a5a0fdf549e168dc550eceb62a484a97628cf3cbc473c359e259
          • Instruction ID: 831cb8232b38519bde74701ab717073588053a70bad9b5dd9e2cb83dab4a3e71
          • Opcode Fuzzy Hash: 7a8c0a00b423a5a0fdf549e168dc550eceb62a484a97628cf3cbc473c359e259
          • Instruction Fuzzy Hash: 8A52D962F08BD582DA118F19A6062BAA760FF99BD4F059231DF9D67796DF3CE184C300
          APIs
          • InitializeProcThreadAttributeList.KERNEL32(?,?,?,?,?,?,?,?,00000006,?,?,?,?,00000400,00007FF6B328849F), ref: 00007FF6B328E01E
          • HeapReAlloc.KERNEL32(?,?,?,?,?,?,?,?,00000006,?,?,?,?,00000400,00007FF6B328849F), ref: 00007FF6B328E08A
          • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF6B328E3BB
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: Heap$AllocAttributeFreeInitializeListProcThread
          • String ID:
          • API String ID: 512342461-0
          • Opcode ID: 69e124b2cfb2ec894d4a1f1dead9b06918bd4f3f43be0820746e83a74dcd2425
          • Instruction ID: 0a3f25e63bb1ce24e69fa797749fc05df0ff372e23535023197e4891d87f3792
          • Opcode Fuzzy Hash: 69e124b2cfb2ec894d4a1f1dead9b06918bd4f3f43be0820746e83a74dcd2425
          • Instruction Fuzzy Hash: 97A1D036B18A5681FA148F2E9A067BA67A0FF49FA4F544631DF2DA73D4DE3CE4458300
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
          • String ID:
          • API String ID: 313767242-0
          • Opcode ID: cecece8a31eaf7c704082b0d9bb7dc46f34a76898306f41ce206f46dabe67732
          • Instruction ID: 0e9932f32a8b624f76d2271293ec26653b6f8c63bdb8638214c227bce0cf6cf7
          • Opcode Fuzzy Hash: cecece8a31eaf7c704082b0d9bb7dc46f34a76898306f41ce206f46dabe67732
          • Instruction Fuzzy Hash: 59315076B09B818AEB608F68E8413ED7360FB88704F44413ADB4DA7B96EF78D548C714
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FreeHeap$memmove
          • String ID: #$*+-./:?@\_cmd.exe /e:ON /v:OFF /d /c "batch file arguments are invalid$\cmd.exemaximum number of ProcThreadAttributes exceeded
          • API String ID: 2650465384-33260680
          • Opcode ID: ddd2f9454c24bf918565808cb94ecca77211bff6f734973e98423ecf072c850c
          • Instruction ID: 1e9d220bf03a036800226d4f731d6154da175b3898c767be97350457965b91be
          • Opcode Fuzzy Hash: ddd2f9454c24bf918565808cb94ecca77211bff6f734973e98423ecf072c850c
          • Instruction Fuzzy Hash: 8942FF62F2867184FB258B68EA127BCABA0BF54798F444532DF1EA2BD5CF7C9541D300
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 430542ddff070ce3d1ae89e2e0a6d3febbb59dc0f454ec07f872afee2fab9290
          • Instruction ID: 896e6957708640fd68ede4446c77aec9c277f8d8355643ae25a6b36e7ccb5cbd
          • Opcode Fuzzy Hash: 430542ddff070ce3d1ae89e2e0a6d3febbb59dc0f454ec07f872afee2fab9290
          • Instruction Fuzzy Hash: 7012C562B18BC582EA60CB19A6163BAA761FF86BD0F144136DF8DA7789DF3CD041C700
          APIs
          • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,00007FFC07365570,?,?,00000000,00000000,?,00000001,?), ref: 00007FF6B3266484
          • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,00007FFC07365570,?,?,00000000,00000000,?,00000001,?), ref: 00007FF6B326663C
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FreeHeap
          • String ID:
          • API String ID: 3298025750-0
          • Opcode ID: eb42a776e8a753bf2aa14174a6b5e9ac373ebc23b56478987f980b95bf9498b7
          • Instruction ID: 6c32681bed3e10a76084849ab581c653d6427f61d4826c352a5f8ea4a1caf94c
          • Opcode Fuzzy Hash: eb42a776e8a753bf2aa14174a6b5e9ac373ebc23b56478987f980b95bf9498b7
          • Instruction Fuzzy Hash: 0FB1C462B09A4592EE64CB1AE7463BA67A0FF86B94F144235CF5D937E4DF3CE0508340
          Strings
          • -Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac, xrefs: 00007FF6B328D411
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID:
          • String ID: -Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac
          • API String ID: 0-2142436962
          • Opcode ID: 855d193695e295014bd20c2e8aff36f7c404687347b1311961285078a9a53d54
          • Instruction ID: 0a1a08cddf3bb1892aa248fc1fb0d8e4a33795f78e04025a2c71b7907594ecb4
          • Opcode Fuzzy Hash: 855d193695e295014bd20c2e8aff36f7c404687347b1311961285078a9a53d54
          • Instruction Fuzzy Hash: 4FE13362B18A5281FB258B29D60237E67A1FF50B98F445632CF5EA77D5CF3CE48D8210
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
          • String ID:
          • API String ID: 2933794660-0
          • Opcode ID: 7000aaa62cbf58ad58c0e4df5132d70c17566eb3fcd23c5d153b70769dc9ce04
          • Instruction ID: 8a64d596e767f43a0d7b22bf851322a7c8fb2432aabd193ebcfe588d3ec5cdfe
          • Opcode Fuzzy Hash: 7000aaa62cbf58ad58c0e4df5132d70c17566eb3fcd23c5d153b70769dc9ce04
          • Instruction Fuzzy Hash: 95113C26B18F058AEB00CF74E9562B933A4FB19B58F440E31DB6DD67A4EF78D1548380
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FreeHeap
          • String ID:
          • API String ID: 3298025750-0
          • Opcode ID: f9e0a78af9e70a4c2346efebde548fe8033f3f41b11d169fe93150105e32ddbd
          • Instruction ID: 090b9691bbe7da84abdd4d0055987cb90865756e3cc9128191ae34c525ad20d5
          • Opcode Fuzzy Hash: f9e0a78af9e70a4c2346efebde548fe8033f3f41b11d169fe93150105e32ddbd
          • Instruction Fuzzy Hash: BE81C226F09B4286FB04CB5A9A023B96761FF54B94F548635DF1DA3795DF3CA582C300
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID:
          • String ID: }0x$ParseIntError
          • API String ID: 0-2419948930
          • Opcode ID: d5fc10647b37f3f7d850e46846ac79e8341bcd3ac072d55a0113995e51f249d8
          • Instruction ID: 1057f716b89a0530baeda335ea715d27299b92edb7b442c6cda6f1258358fe56
          • Opcode Fuzzy Hash: d5fc10647b37f3f7d850e46846ac79e8341bcd3ac072d55a0113995e51f249d8
          • Instruction Fuzzy Hash: F9B1B162B18A95D5E721CF64D5025EC2BA0FB09B94F494536DF9DA3B84CF38D985C380
          APIs
          • memcmp.VCRUNTIME140(?,?,?,?,?,00000000,?,00000000,?,?,?,00000140,00007FF6B3293FD5), ref: 00007FF6B3294119
          • memcmp.VCRUNTIME140(?,?,?,?,?,00000000,?,00000000,?,?,?,00000140,00007FF6B3293FD5), ref: 00007FF6B3294142
          • memcmp.VCRUNTIME140(?,?,?,?,?,00000000,?,00000000,?,?,?,00000140,00007FF6B3293FD5), ref: 00007FF6B3294165
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: memcmp
          • String ID:
          • API String ID: 1475443563-0
          • Opcode ID: 3d7d886d1f401d97bdc11b1f12906cdc75b8c1ffbfa5c8b1ea5242bc07df4c66
          • Instruction ID: b460229df1a3b567ae9687008ac95a032a315a9290a6db1f51f5e0f53daec2f4
          • Opcode Fuzzy Hash: 3d7d886d1f401d97bdc11b1f12906cdc75b8c1ffbfa5c8b1ea5242bc07df4c66
          • Instruction Fuzzy Hash: E812E462F18A9645FB11CF79C502AF82750BB19B98F844736EF8DB6686EF78D185C300
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID:
          • String ID: Authenti$GenuineI$HygonGen
          • API String ID: 0-696657513
          • Opcode ID: 9911b54616b2554508ed1a2d09cc25713aaaf1104d54c7b2a5940d8749d77fb2
          • Instruction ID: 64381411687cd4521c58535ec97fcceb88fd1eef08c31d10d0deca45d3c55504
          • Opcode Fuzzy Hash: 9911b54616b2554508ed1a2d09cc25713aaaf1104d54c7b2a5940d8749d77fb2
          • Instruction Fuzzy Hash: 14B18CA3B35A6003FB198A55AE27BB54992B354BD8F04653DEE1FA7FC5CD7CCA108240
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: memset
          • String ID: punycode{-0
          • API String ID: 2221118986-3751456247
          • Opcode ID: 6265388bace50724817ddf06862ff0d07df914af5ffe4793f524424d66ed0d68
          • Instruction ID: 0433ceb7aa4abdde54b4aafad813a0c0717d02c9a57d86018d9b137142ee3858
          • Opcode Fuzzy Hash: 6265388bace50724817ddf06862ff0d07df914af5ffe4793f524424d66ed0d68
          • Instruction Fuzzy Hash: A7E1E662F596C986EF648B29EA057F93692BB49BD4F008232CF1D57BC4DF3CA9458300
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: memmovememset
          • String ID:
          • API String ID: 1288253900-0
          • Opcode ID: 51cd3c2e82aa8e9578b83a77fdee3a8a4b73f362bb48c0b9b6e204234f816601
          • Instruction ID: 42d2121d95f9419f329bfb1ece15f2b528d732f105aafe953421c3ac201d1bb5
          • Opcode Fuzzy Hash: 51cd3c2e82aa8e9578b83a77fdee3a8a4b73f362bb48c0b9b6e204234f816601
          • Instruction Fuzzy Hash: A24298A6E28FD941F612973964037E79710EFE6788F11E327EEC932F46DF28A1419240
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: memmovememset
          • String ID:
          • API String ID: 1288253900-0
          • Opcode ID: 09591727fbd26f8a1fc8b663805a626c3d195fbbbd5a1c6b1b4139d272884b43
          • Instruction ID: a6f49f8ef83999c3044ca0a12795f76a2a6e954531e3428df56cead81dee153f
          • Opcode Fuzzy Hash: 09591727fbd26f8a1fc8b663805a626c3d195fbbbd5a1c6b1b4139d272884b43
          • Instruction Fuzzy Hash: 03225462B19B8542EF148F2DA5122BA6751BB95BE4F448335DF6EA37D6EF3CE1018300
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FreeHeap
          • String ID:
          • API String ID: 3298025750-0
          • Opcode ID: 4d60d1c4c814bc7bd0d2c582f5c526bad3f19439ee714bac6e312eaa1944efe7
          • Instruction ID: e2665ce6c84bb1085f03d8da131dba2eca19d50ba13bf0b109916851f9f8f579
          • Opcode Fuzzy Hash: 4d60d1c4c814bc7bd0d2c582f5c526bad3f19439ee714bac6e312eaa1944efe7
          • Instruction Fuzzy Hash: 4CF1A062B0CAC581E6208B19F6463BAB7A1FF89B94F144135DB8DA7799DF7CE184C700
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID:
          • String ID: 33333333$UUUUUUUU
          • API String ID: 0-3483174168
          • Opcode ID: cff9d24c3fc3692150ad18937845d9fa878edfc3b39f359c130e8016678a4c49
          • Instruction ID: 3a81f71bb059842e67eaceedc94535e03550869ade922beb697c2acde78d5c9a
          • Opcode Fuzzy Hash: cff9d24c3fc3692150ad18937845d9fa878edfc3b39f359c130e8016678a4c49
          • Instruction Fuzzy Hash: 0591E843B681F003F7624B7D1D66566EFA25545BD370DF152EEE423A86C038CC2AE3A5
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID:
          • String ID: 33333333$UUUUUUUU
          • API String ID: 0-3483174168
          • Opcode ID: 14b31b35ad291ddad897dd1f2a0e82a6c76d055b51b98b879fc08f69398a6c0a
          • Instruction ID: 0f8bec32a5713e29220c994287e2471ec9503f957c585ffdc4d845ef937708d5
          • Opcode Fuzzy Hash: 14b31b35ad291ddad897dd1f2a0e82a6c76d055b51b98b879fc08f69398a6c0a
          • Instruction Fuzzy Hash: 6691DA4375A3D48FAB52CB7E194498A6E90E12AFC835CF069CE8D27322D436D557C392
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FreeHeapmemmove
          • String ID:
          • API String ID: 913535592-0
          • Opcode ID: d10cdee3619787cea15e6549b60dd5013c0eb0e2719da2eea254b61cb837d88e
          • Instruction ID: 3e4d88334d79a224342053d13e2e0407172198a56b9620afdc6bb06c7f7176cd
          • Opcode Fuzzy Hash: d10cdee3619787cea15e6549b60dd5013c0eb0e2719da2eea254b61cb837d88e
          • Instruction Fuzzy Hash: A4912622F08691C9F7118B6D9A063BE2B60BB1479CF044A34DF89A67D5DF7C9585C311
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 3b8297210cba004a8d2e07849ea0a4831168f530548283382b70ef12d88847f7
          • Instruction ID: ebb063bed00cce20c40af09e2b9010b1d048cf8140559a7fc51e2f25f23e5035
          • Opcode Fuzzy Hash: 3b8297210cba004a8d2e07849ea0a4831168f530548283382b70ef12d88847f7
          • Instruction Fuzzy Hash: 2B61DBA3F1C59646F7694E2DA90623D7AD0BB447A0F844335EF6E9A7D7ED3CD4019200
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: memcmp
          • String ID:
          • API String ID: 1475443563-0
          • Opcode ID: 984428218a9c228adbe6d125614df29729a9f10cb7dd52669724f844f0ae759f
          • Instruction ID: b26e0729e030620dd82984a53b289d705b15ba74c4fa2a043607c534850c1424
          • Opcode Fuzzy Hash: 984428218a9c228adbe6d125614df29729a9f10cb7dd52669724f844f0ae759f
          • Instruction Fuzzy Hash: 4BC12B22B2C2A582FA15CF699A16EB96655BF11BD4F408630DF0EA7BC0DF3CF9459300
          Strings
          • 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899core\src\fmt\mod.rs, xrefs: 00007FF6B327BFE9, 00007FF6B327C0F5, 00007FF6B327C190
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID:
          • String ID: 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899core\src\fmt\mod.rs
          • API String ID: 0-2454368799
          • Opcode ID: 63c44dd14bcda3bec7524203da0efde38e74e6a004a4cafd3ec91591d6bf40f9
          • Instruction ID: c998f877c5309f00e52c49fda72d5dc6d0b852f57520fa2d0ded9079b5677e33
          • Opcode Fuzzy Hash: 63c44dd14bcda3bec7524203da0efde38e74e6a004a4cafd3ec91591d6bf40f9
          • Instruction Fuzzy Hash: F1B14872B086A585EB208B2CD1027FC2761FB65BA4F405331DBAEA7BD1DE3D9A45C341
          Strings
          • 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899core\src\fmt\mod.rs, xrefs: 00007FF6B3251176, 00007FF6B32513A7
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID:
          • String ID: 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899core\src\fmt\mod.rs
          • API String ID: 0-2454368799
          • Opcode ID: 832528b178cc8b9a1463c5c0f2400c5a2bc0afedd9c367ce7f76a175325d55d4
          • Instruction ID: b53f5e39c10436e455572f3db66983676d5f5feb80f7cb7d19449947608db45a
          • Opcode Fuzzy Hash: 832528b178cc8b9a1463c5c0f2400c5a2bc0afedd9c367ce7f76a175325d55d4
          • Instruction Fuzzy Hash: E1B15963B0C29141EB648B1DE1127B86751EB54BA4F915331CF9AA7BD4DE3CE641C341
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: memmove
          • String ID:
          • API String ID: 2162964266-0
          • Opcode ID: d5f4ecaaeacfff53c77d01a66d829fd4b36fcb5567296ec8db7c8349dd09f0de
          • Instruction ID: 6b2e047fb97dd182a55f6ab7e36cea367d5cd9d35d1a766320479a3ba0ba99e0
          • Opcode Fuzzy Hash: d5f4ecaaeacfff53c77d01a66d829fd4b36fcb5567296ec8db7c8349dd09f0de
          • Instruction Fuzzy Hash: 8C613722B5C64246FB648E1DE61237A6A90FB45784F044139EFCEA7BC6CE3CD580DB04
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID:
          • String ID: 0123456789abcdef
          • API String ID: 0-1757737011
          • Opcode ID: 63ac6b73bf77b628c566cd22cb09ccbf4fcb7376b0a588039cfcab580993a599
          • Instruction ID: 7f08abdaee4e652faed8f722531d8b05dd2288e36c2edded88391e4d5df31d52
          • Opcode Fuzzy Hash: 63ac6b73bf77b628c566cd22cb09ccbf4fcb7376b0a588039cfcab580993a599
          • Instruction Fuzzy Hash: 08815963B196E1CAE3218B3C9901BAC7F61AB15B88F448174CBC8A7B82CF7DD549D351
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID:
          • String ID: 0123456789abcdef
          • API String ID: 0-1757737011
          • Opcode ID: 18093509db6ec18421d0c5bc2c92049e30c37d757fa59a873f534fb687d85bcf
          • Instruction ID: 3d6e2b04a73f666c75e2370a7fabfac543f7a7092054488af7f01704095c95a9
          • Opcode Fuzzy Hash: 18093509db6ec18421d0c5bc2c92049e30c37d757fa59a873f534fb687d85bcf
          • Instruction Fuzzy Hash: 8A814633B296E19AE3218B3C9A01BAC7F61AB11B44F044175CBC8B7B82CF79D519D391
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: HeapProcess
          • String ID:
          • API String ID: 54951025-0
          • Opcode ID: 6783393797bd38d295cfccef32833937ef381231cefdfdd5a05e3105c17b1f04
          • Instruction ID: 2bc66f155738a8257565b81a35697585ff9c59c3ec06b672994aaaa831244c9b
          • Opcode Fuzzy Hash: 6783393797bd38d295cfccef32833937ef381231cefdfdd5a05e3105c17b1f04
          • Instruction Fuzzy Hash: 12F0BB16F49E0585F6599B5E790117562959F8CFD0F084234CF0CD7361DE3CE4C28244
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: c8e9b248da945285402eb8cbb8b7c7d4b90029005f43c8d0b9d43454199c4fe2
          • Instruction ID: 4d34b09b7cad78c84806303ca6078453c90171825369269f11ebbfd0d55d5466
          • Opcode Fuzzy Hash: c8e9b248da945285402eb8cbb8b7c7d4b90029005f43c8d0b9d43454199c4fe2
          • Instruction Fuzzy Hash: 1E42D762719BD441F6118F6AB8526A7E361FF99BD4F04A121EF8D63B09DF3CD6818700
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: adda371c05508b0a298440d4eae58001dc0e5b5f45b4e3950a7a311b6da92386
          • Instruction ID: 45b7a4ca0f54733c066635bcfa3b185b5d55eb49d93c9203ed07b4437952516c
          • Opcode Fuzzy Hash: adda371c05508b0a298440d4eae58001dc0e5b5f45b4e3950a7a311b6da92386
          • Instruction Fuzzy Hash: 7AC179A2F1D6D2C5F7228A2C96027B96A817712771F549730CB6EB72D0CF7C9D528322
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 9e93a0dc367e60ed858cbde761659c88b7b54c08f28d9b1d60bb46a7ffcba42f
          • Instruction ID: ab9f1f0db8086bb73362c9fa9718da8973b4cb628e277f6b7d17ad5854b39e60
          • Opcode Fuzzy Hash: 9e93a0dc367e60ed858cbde761659c88b7b54c08f28d9b1d60bb46a7ffcba42f
          • Instruction Fuzzy Hash: C2C15D97F39BA641F713433C56036B856005FA77E4A01D322FEA4B2FE5EF34A6429204
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: f69c4f7b8cd5da008c5c796e1d01ab5764fe54582b9148a761b74e01056b8c91
          • Instruction ID: 9a1c10e2fd09d978ad4ccab37cecc0030f973729608885978b805349ef7cd243
          • Opcode Fuzzy Hash: f69c4f7b8cd5da008c5c796e1d01ab5764fe54582b9148a761b74e01056b8c91
          • Instruction Fuzzy Hash: 50B12626F0D692E6FB658B78D7027FC27A1BB01788F544132DF4DA3A95DE7C99928300
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ffb5e16058bb0566f99405c6c335fc1234fd8c3b2d60057ea747a17e7614ceed
          • Instruction ID: f1710208052d25c331607c563afcef5b171a33cd2ef506b1f6a6361fe339a319
          • Opcode Fuzzy Hash: ffb5e16058bb0566f99405c6c335fc1234fd8c3b2d60057ea747a17e7614ceed
          • Instruction Fuzzy Hash: 17C14062D19FC542E723AB3DA4032F6E310FFEA384F00D312EEC47595ADB69E2459644
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: e49d64f606b30b5e613b7687bc14d59ee01eaa8d31e2a8703c4f9323d8549704
          • Instruction ID: d416797be00467981505a8bf5a77a3e2a1a5905893b636c8e13afd6d057c9589
          • Opcode Fuzzy Hash: e49d64f606b30b5e613b7687bc14d59ee01eaa8d31e2a8703c4f9323d8549704
          • Instruction Fuzzy Hash: 176173A3315BA4427A04CFF2BD3199BABA5F649BD8B00F435EE8D57B1CDA3CC4518640
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0532867200631d17e2e3206eb55439b492eb57631902a6d221b66ced3b8aee8b
          • Instruction ID: a24ce58b941a27b90be6f031bf8c4beef10ef8c53fde8b63e9243aa6d8ffac9e
          • Opcode Fuzzy Hash: 0532867200631d17e2e3206eb55439b492eb57631902a6d221b66ced3b8aee8b
          • Instruction Fuzzy Hash: F9414672F5467182FB18CF59E661A782756FB90BD0F519032DE5BA3B80CE38D896C380
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 8916ff02eb36279b0385f62ba8be761ded61a259e6ec6d0021c213f83ad3a4a8
          • Instruction ID: aaa78b613765ecb2d2ae20f289ff26247ff69c9851fde5857ce92530ed9cc6b7
          • Opcode Fuzzy Hash: 8916ff02eb36279b0385f62ba8be761ded61a259e6ec6d0021c213f83ad3a4a8
          • Instruction Fuzzy Hash: A831BBD6F08B8042FE54D7A8746737B9312AB957D0F80E235DE89AAE0FDF2DD2424140
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 61b16f98ace69e0efadd172f747959fdb2bce834d04ca5212cc346081341c674
          • Instruction ID: d4a48160cf04c0681a3bbd100650c142785a6e34adcb2d51ca2d70d54ab32d54
          • Opcode Fuzzy Hash: 61b16f98ace69e0efadd172f747959fdb2bce834d04ca5212cc346081341c674
          • Instruction Fuzzy Hash: 10A00125A08E02D0E6548F18AA521302221AB59714B460272C21DA1072DE7CA540D215
          APIs
          Strings
          • -Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac, xrefs: 00007FF6B3291C01, 00007FF6B32921E6
          • called `Result::unwrap()` on an `Err` value, xrefs: 00007FF6B3291D94, 00007FF6B3292185, 00007FF6B32921B9
          • -NoProfile-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProduct, xrefs: 00007FF6B3291C07, 00007FF6B32921EC
          • -NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe , xrefs: 00007FF6B3291C03, 00007FF6B32921E8
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: CloseHandle$FreeHeap$CodeEnvironmentErrorExitLastObjectProcessSingleStringsWait
          • String ID: -Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac$-NoProfile-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProduct$-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe $called `Result::unwrap()` on an `Err` value
          • API String ID: 1083365245-3402652994
          • Opcode ID: 068e135bdd4ee0b0cc79d674f2ea0cbd06011418e0e1c1ea8a16fe48549bf474
          • Instruction ID: 89edfe459e2ff4873b9c61770b0ae5f5cfa4b54dd770ec2b3ed1b558db0f9ff0
          • Opcode Fuzzy Hash: 068e135bdd4ee0b0cc79d674f2ea0cbd06011418e0e1c1ea8a16fe48549bf474
          • Instruction Fuzzy Hash: 4DF15036B04BC699E7708F29D9423E933A0FB15758F504235DB4DA6A9ADF38E689C340
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: Handle$CloseCurrentDuplicateErrorLastProcess
          • String ID: RUST_MIN_STACK$failed to spawn thread
          • API String ID: 3328748953-917136298
          • Opcode ID: edb176ba9bad7e56d3ac35411854c81880cf8e5b484e33333937882175b55ec9
          • Instruction ID: 9f09375561de1d3c93b907630d828730e460247a69ed050828bc7b8d4388c4a7
          • Opcode Fuzzy Hash: edb176ba9bad7e56d3ac35411854c81880cf8e5b484e33333937882175b55ec9
          • Instruction Fuzzy Hash: 5EE15D22B09B858AFB108F29DA423B927A0FF44B98F144136DF4DA7799DF3DE5498350
          APIs
          • CancelIo.KERNEL32(?,?,?,?,00000001,?,?,-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe ,-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac,?,00007FF6B3292047), ref: 00007FF6B32925B8
          • GetOverlappedResult.KERNEL32(?,?,?,?,00000001,?,?,-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe ,-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac,?,00007FF6B3292047), ref: 00007FF6B32925DD
          • GetLastError.KERNEL32(?,?,?,?,00000001,?,?,-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe ,-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac,?,00007FF6B3292047), ref: 00007FF6B3292605
          • CloseHandle.KERNEL32(?,?,?,?,00000001,?,?,-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe ,-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac,?,00007FF6B3292047), ref: 00007FF6B3292660
          • CloseHandle.KERNEL32(?,?,?,?,00000001,?,?,-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe ,-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac,?,00007FF6B3292047), ref: 00007FF6B3292666
          • GetLastError.KERNEL32(?,?,?,?,00000001,?,?,-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe ,-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac,?,00007FF6B3292047), ref: 00007FF6B3292689
          • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe ,-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac,?,00007FF6B3292047), ref: 00007FF6B32926F9
          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe ,-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac,?,00007FF6B3292047), ref: 00007FF6B3292716
          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe ,-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac,?,00007FF6B3292047), ref: 00007FF6B3292720
          • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe ,-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac,?,00007FF6B3292047), ref: 00007FF6B329272F
          Strings
          • -Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac, xrefs: 00007FF6B3292591, 00007FF6B32926D6
          • -NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe , xrefs: 00007FF6B3292593
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: CloseHandle$ErrorFreeHeapLast$CancelOverlappedResult
          • String ID: -Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac$-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe
          • API String ID: 3987361021-3266012847
          • Opcode ID: 91384812f4015f3388e566694ff4e244ccecc6340b338e133ce58bd3450d2711
          • Instruction ID: c1be8efb451a25973f1795d83a32e2966d7ba03d110a02ff2a42ab1ad10a255d
          • Opcode Fuzzy Hash: 91384812f4015f3388e566694ff4e244ccecc6340b338e133ce58bd3450d2711
          • Instruction Fuzzy Hash: E2415026B04B5596E7048F6ADA453A837B0FB88F98F054632DF0DA77A5DF78D582C340
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: CloseFileFreeHandleHeapSleep$ErrorLastReadWritememset
          • String ID:
          • API String ID: 779401166-0
          • Opcode ID: 78d0085b851b748739d3fac093d34ff165da2bff40ace1830053c82de9885ba3
          • Instruction ID: e4f9aa6c19e898f273c874ab3f89a3c0d4a183929c869b0191fe4b5d90a6e87f
          • Opcode Fuzzy Hash: 78d0085b851b748739d3fac093d34ff165da2bff40ace1830053c82de9885ba3
          • Instruction Fuzzy Hash: 73813F26704AC695EB309F29E9427F96360FF48798F044236DF5D96B98CF7896869300
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: String$Free
          • String ID: Invalid NT signatureInvalid DOS signature for module:
          • API String ID: 1391021980-3480978609
          • Opcode ID: 23e49c5f6e9e951b63aa2959c342144616a048980e9d9883e981200d52027372
          • Instruction ID: 956c8233f8537e5bb0d16efd6d16a1090180cc44647301be7327a20c3285f838
          • Opcode Fuzzy Hash: 23e49c5f6e9e951b63aa2959c342144616a048980e9d9883e981200d52027372
          • Instruction Fuzzy Hash: 8D519F3AB18B4281EB248F1DE65536AA7A0FF84B94F445235EB8E97B95CF7CD044CB00
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: DebugFreeHeapOutputStringmemset
          • String ID: .$GetProcAddress$called `Result::unwrap()` on an `Err` value$kernel32.dllVirtualAllocEx$r
          • API String ID: 3278678782-1998162551
          • Opcode ID: 8ce24b62a18ca421bc3152a767145fb7cfdf1dff43468bc64e3ab93f7cb23723
          • Instruction ID: 72b2129bbc42f9098a9187623ad98c9157e13b091e47fe610fff04c9ceb79f37
          • Opcode Fuzzy Hash: 8ce24b62a18ca421bc3152a767145fb7cfdf1dff43468bc64e3ab93f7cb23723
          • Instruction Fuzzy Hash: A5514822B1C6D581F6218B2DA9037B6A761BF94794F045231DF8DA2769EF3DD286C700
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FreeHeap$CurrentThread
          • String ID: main
          • API String ID: 1184698198-3207122276
          • Opcode ID: 61e017777a7727f5ccb2847e099727255b132e3f38003baaefbe60160bd9367d
          • Instruction ID: 58c8897e9ecddeb73e23405b361a533275cfbd4c56a4a12f01a9330757ab01d3
          • Opcode Fuzzy Hash: 61e017777a7727f5ccb2847e099727255b132e3f38003baaefbe60160bd9367d
          • Instruction Fuzzy Hash: 91C14E26B08B9599E710CF29E5853AD3BA0FB88B98F044136EF4DA77A5CF79D485C340
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: memmove$FreeHeap
          • String ID: assertion failed: new_left_len <= CAPACITY
          • API String ID: 3670176668-3316943531
          • Opcode ID: bd3df8df1d91e6afc355728498be3d5d5a30efa8681b6ab148653e798d5e4dfa
          • Instruction ID: 21c9d65c25e6e4e343078db8dff84afd343f006de8375da6df01150ba0370608
          • Opcode Fuzzy Hash: bd3df8df1d91e6afc355728498be3d5d5a30efa8681b6ab148653e798d5e4dfa
          • Instruction Fuzzy Hash: 4BB19D26A10B8492DB158F19E9413EA77B4FB58B98F499236DF4D53361EF38E261C300
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: memmove
          • String ID: assertion failed: old_left_len >= count$assertion failed: old_right_len + count <= CAPACITY
          • API String ID: 2162964266-1889375005
          • Opcode ID: 9c3b8417148723ba08c746177e8380ec937096b939c1c3b2d4099853ed383284
          • Instruction ID: f2a9d862ef79c2224ef7ca8cb24f2b95e674aadd5ba4587348d95f3c15e31e4e
          • Opcode Fuzzy Hash: 9c3b8417148723ba08c746177e8380ec937096b939c1c3b2d4099853ed383284
          • Instruction Fuzzy Hash: C4A1D722E04BC982E7559F18E9423F96364FF58798F549332DF4D63652EF39A296C300
          APIs
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 00007FF6B327FC54
          • memcmp.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 00007FF6B327FD1D
          Strings
          • called `Result::unwrap()` on an `Err` value, xrefs: 00007FF6B327FDD9
          • ,(><&@, xrefs: 00007FF6B327FEA3
          • TryFromIntError:, xrefs: 00007FF6B327FE3A
          • RUST_BACKTRACEentity not foundpermission deniedconnection refusedconnection resethost unreachablenetwork unreachableconnection abortednot connectedaddress in useaddress not availablenetwork downbroken pipeentity already existsoperation would blocknot a directo, xrefs: 00007FF6B327FC3B, 00007FF6B327FE10
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: lstrlenmemcmp
          • String ID: ,(><&@$RUST_BACKTRACEentity not foundpermission deniedconnection refusedconnection resethost unreachablenetwork unreachableconnection abortednot connectedaddress in useaddress not availablenetwork downbroken pipeentity already existsoperation would blocknot a directo$TryFromIntError:$called `Result::unwrap()` on an `Err` value
          • API String ID: 1799893992-2190381041
          • Opcode ID: f76daf3a126a1a292aaca04d22363d6859162dd34aa7bb72d817fdd1c247bc5b
          • Instruction ID: b499f68181d7a04d737d6fbd1004afb41d790ed9c78064935ad3e9bc7e9dee5b
          • Opcode Fuzzy Hash: f76daf3a126a1a292aaca04d22363d6859162dd34aa7bb72d817fdd1c247bc5b
          • Instruction Fuzzy Hash: BBA1B362B08A46E6EB208F69D5022B92760FB54BA8F544631DF6DA3BD5DF3CE945C300
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: memmove
          • String ID: assertion failed: old_left_len + count <= CAPACITY
          • API String ID: 2162964266-323339215
          • Opcode ID: c06701663169af3e5e93daf976e38ffb9366f7457630b5d59672495e30d54576
          • Instruction ID: 06ad2305b7320aa7d16df96d80c55c338ad662a09cbb1c8220dec8de0a2cfb0d
          • Opcode Fuzzy Hash: c06701663169af3e5e93daf976e38ffb9366f7457630b5d59672495e30d54576
          • Instruction Fuzzy Hash: F4C1C666A14BC482EB459F18E9023F96364FF58B98F555336DF4D63362EF38A295C300
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: ErrorFreeHandleHeapLast$CurrentDuplicateProcess
          • String ID:
          • API String ID: 443199557-0
          • Opcode ID: dfb22cdd308960437ef226678e4a295b727580a6409b6d3ee54e7e7e98ff0c41
          • Instruction ID: 0d2873a4ddfa7ef73feee4c1819b0d00c6ac1e6f399a6338e08c8a71b23db35f
          • Opcode Fuzzy Hash: dfb22cdd308960437ef226678e4a295b727580a6409b6d3ee54e7e7e98ff0c41
          • Instruction Fuzzy Hash: 0C315C35B18B1185FB108F6AD94A3AD22A1FF88BA4F448639CB6DA37D4CF3CD0408340
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: Free$String$Heap$FormatLibraryLoadMessageProcess
          • String ID: KO_S$KO_S$KO_S$KO_S
          • API String ID: 3026262243-1559209064
          • Opcode ID: 3831f844c3f47bd9a821f2afc3863872edeee65b5f153a98f6b503e721a371e8
          • Instruction ID: 825e432cbefce11de0374ab792d9cf54bdfb11095636259b3db7d69cc2211616
          • Opcode Fuzzy Hash: 3831f844c3f47bd9a821f2afc3863872edeee65b5f153a98f6b503e721a371e8
          • Instruction Fuzzy Hash: 26511836718B8196E7618F19F6413AAB3A5FB88750F404236EB8D93B59EF3CE454CB40
          APIs
          Strings
          • -Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac, xrefs: 00007FF6B3284D41, 00007FF6B32850B6, 00007FF6B32850D1
          • -NoProfile-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProduct, xrefs: 00007FF6B32850D7
          • -NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe , xrefs: 00007FF6B32850D3
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: EnvironmentStrings$CloseErrorFreeHandleLast
          • String ID: -Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac$-NoProfile-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProduct$-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe
          • API String ID: 1605123130-435359000
          • Opcode ID: ad6fe99b79b7659689b9f3a77182ff0bb9f4457b07c2bfa26f4552d920c66ed5
          • Instruction ID: de6f95a940163c81f1bfefa9303133350a2a3658e0bb40a416186ea43a28c049
          • Opcode Fuzzy Hash: ad6fe99b79b7659689b9f3a77182ff0bb9f4457b07c2bfa26f4552d920c66ed5
          • Instruction Fuzzy Hash: 25917B32708AC189EB608F29D9563FA37A0FB057A9F544235CB6DAB6C4EF389645C300
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: Heap$FormatFreeLibraryLoadMessageProcess
          • String ID: ntdll.dll
          • API String ID: 2073911336-2227199552
          • Opcode ID: b0d0f27879f1737e1c980c0b7697a5256b6eccc408c3280d812aea5dd712f8a9
          • Instruction ID: 7b6d635d486ae1e23e1d0b8765d3d8dffcf5c05a88dc727e64920ec44e0973b9
          • Opcode Fuzzy Hash: b0d0f27879f1737e1c980c0b7697a5256b6eccc408c3280d812aea5dd712f8a9
          • Instruction Fuzzy Hash: 60418E32B08B4192E7108F19F64536AA3A1FB85794F148234EB8997B99EF7DE4848700
          APIs
          • CreateEventW.KERNEL32(?,?,00000001,?,?,-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe ,?,00007FF6B3291D2C), ref: 00007FF6B32924B0
          • GetLastError.KERNEL32(?,?,00000001,?,?,-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe ,?,00007FF6B3291D2C), ref: 00007FF6B329250A
          • CloseHandle.KERNEL32(?,?,?,?,?,?,00000001,?,?,-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe ,?,00007FF6B3291D2C), ref: 00007FF6B329256E
          • CloseHandle.KERNEL32(?,?,?,?,?,?,00000001,?,?,-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe ,?,00007FF6B3291D2C), ref: 00007FF6B3292574
          Strings
          • -NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe , xrefs: 00007FF6B3292481
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: CloseHandle$CreateErrorEventLast
          • String ID: -NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe
          • API String ID: 3743700123-3796342903
          • Opcode ID: 764e55fccaec367db8600bbafeb820a1a69775069a48feaf912cbaa7e889a1de
          • Instruction ID: cc46495aaff297c838f1b2852a6763433c293ac60508c7e591dbe2a4414584a0
          • Opcode Fuzzy Hash: 764e55fccaec367db8600bbafeb820a1a69775069a48feaf912cbaa7e889a1de
          • Instruction Fuzzy Hash: 7E218B33B04B4186F7258F26B9523A976A4FB887A0F188235DF9D527D1EF78D5D28300
          APIs
          • memmove.VCRUNTIME140(?,0000000100002600,?,?,-NoProfile-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProduct,00000001,00000000,?,00007FF6B3267DA2), ref: 00007FF6B327A720
          Strings
          • -NoProfile-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProduct, xrefs: 00007FF6B327A656
          • """""""", xrefs: 00007FF6B327A675
          • \\\\\\\\, xrefs: 00007FF6B327A7D7
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: memmove
          • String ID: """"""""$-NoProfile-NonInteractive-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProduct$\\\\\\\\
          • API String ID: 2162964266-2527656708
          • Opcode ID: 3ebe378ba1e5b0a0cc530eb8cf79493085359402cdb35856c52efbe778c82ec9
          • Instruction ID: 111e83051ff3f561ba7ba59ffd47fe31ca790849bf6e350cb9a4cf1c56671963
          • Opcode Fuzzy Hash: 3ebe378ba1e5b0a0cc530eb8cf79493085359402cdb35856c52efbe778c82ec9
          • Instruction Fuzzy Hash: 05C1F6A2B18B91C1EB108F1AE60A2BA6351FB45BE4F948632DF5DA7384DF3CE545C300
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: ErrorFreeHeapInfo
          • String ID: KO_S$KO_S
          • API String ID: 2644722224-3643238370
          • Opcode ID: 3779fb2e198122c4eaf8191be486a5b7982e36063e3fcc8c64ae1eac853d81ea
          • Instruction ID: f91416df264ce068b59901da4475e67c5bb4b08e56f14c62e35669b57edc6b07
          • Opcode Fuzzy Hash: 3779fb2e198122c4eaf8191be486a5b7982e36063e3fcc8c64ae1eac853d81ea
          • Instruction Fuzzy Hash: 61016776B0874182EB244F5AE5823BA52D1AF8CBD4F498139DF8DD3761DE7CD491C240
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: AddressHandleModuleProc
          • String ID: SetThreadDescription$kernel32
          • API String ID: 1646373207-1950310818
          • Opcode ID: 1f9ba1cc4ac202086bd21eb3f60e7a1a902e788bb4e1018a4082a40431d33b9d
          • Instruction ID: a1123f30bfeb4e34964b4e40b948a0fd841aaea74d745b453556856b2a914183
          • Opcode Fuzzy Hash: 1f9ba1cc4ac202086bd21eb3f60e7a1a902e788bb4e1018a4082a40431d33b9d
          • Instruction Fuzzy Hash: 45F05E50B0AA56E5FA55CB59AA460F422617F08BC0F844135CF0DA3760DE3CA949C200
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: memcmp
          • String ID:
          • API String ID: 1475443563-0
          • Opcode ID: 7ba9f83aab7f458d2523825f9fdb98b88699e60e971da686df4a1a2ea9e203db
          • Instruction ID: 067a395864ae32b0aa010b701c751f38c614e0b2fc648570fb3ce6f740510f17
          • Opcode Fuzzy Hash: 7ba9f83aab7f458d2523825f9fdb98b88699e60e971da686df4a1a2ea9e203db
          • Instruction Fuzzy Hash: 6271D981B4ABA143FD159E2A9B0217A5690BF58BC4F189535DF8DE77A2FF38F491C200
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: memcmp
          • String ID: $
          • API String ID: 1475443563-227171996
          • Opcode ID: 5d0345d70e85653de63984e50b363f7f5050189172f30f6c7d8ddb26480f7d86
          • Instruction ID: c0842770954dda4b8042c52eba0e2eb484fe1665e35e662001cef7fd4bc7e1bf
          • Opcode Fuzzy Hash: 5d0345d70e85653de63984e50b363f7f5050189172f30f6c7d8ddb26480f7d86
          • Instruction Fuzzy Hash: 4F51B662B09BD582DA118F5AA6051AA6760FF95BE4F054332DFAD53B9ADF38E144C300
          APIs
            • Part of subcall function 00007FF6B32975B0: SysFreeString.OLEAUT32 ref: 00007FF6B3297643
            • Part of subcall function 00007FF6B32975B0: SysStringLen.OLEAUT32 ref: 00007FF6B3297653
            • Part of subcall function 00007FF6B32975B0: SysFreeString.OLEAUT32 ref: 00007FF6B3297667
            • Part of subcall function 00007FF6B32975B0: SysStringLen.OLEAUT32 ref: 00007FF6B32976B5
            • Part of subcall function 00007FF6B32975B0: SysFreeString.OLEAUT32 ref: 00007FF6B32977D6
            • Part of subcall function 00007FF6B32969C0: FormatMessageW.KERNEL32 ref: 00007FF6B3296A2A
            • Part of subcall function 00007FF6B32969C0: GetProcessHeap.KERNEL32 ref: 00007FF6B3296B24
            • Part of subcall function 00007FF6B32969C0: HeapFree.KERNEL32 ref: 00007FF6B3296B32
          • HeapFree.KERNEL32 ref: 00007FF6B3296C8E
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FreeString$Heap$FormatMessageProcess
          • String ID: }0x$Errorcodemessage$KO_S
          • API String ID: 3834163611-2264483571
          • Opcode ID: d9661228685614b2897c510db52353d528e28ee1cea753569626aa0d587d204f
          • Instruction ID: 5190732b7f3a37894a61669fad930bb205cab733f11f5f2905fa23d28f2c8856
          • Opcode Fuzzy Hash: d9661228685614b2897c510db52353d528e28ee1cea753569626aa0d587d204f
          • Instruction Fuzzy Hash: 1741E96670CA4691EB218F19E1813AD77B0FB887A0F445136EB8D93765DF7DD544CB00
          APIs
          • HeapFree.KERNEL32(00000001,?,?,00000000,0000000A,-Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac,?,00007FF6B3286AA1), ref: 00007FF6B328D490
          • HeapFree.KERNEL32 ref: 00007FF6B328D4A8
          • HeapFree.KERNEL32 ref: 00007FF6B328D4C5
          Strings
          • -Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac, xrefs: 00007FF6B328D411
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FreeHeap
          • String ID: -Command $antivirus = Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct if ($antivirus) { $displayName = $antivirus.displayName $exePath = $antivirus.pathToSignedProductExe # Extrac
          • API String ID: 3298025750-2142436962
          • Opcode ID: cb925eaacc5efce4e7f51c13de2083a72cf1247f8748fa935440322030c6eb4b
          • Instruction ID: 2b58d2d6ec9d572cb5383c78959784834054677b234a1e0e8d54e98f71444e45
          • Opcode Fuzzy Hash: cb925eaacc5efce4e7f51c13de2083a72cf1247f8748fa935440322030c6eb4b
          • Instruction Fuzzy Hash: A2116025B04A51D1FA14DB2A9A4ABBA6B75FF48B84F498432DF0CA7795CE3CE049C314
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FreeHeap$memcmpmemmove
          • String ID:
          • API String ID: 2793343567-0
          • Opcode ID: 7e741c51b02e790958833b2b8735b60c45302074638f56a5c8eee82971af6974
          • Instruction ID: ddd856027744f91c78dbb86312e5f79e81821f66f54164ca7eacbac265babf8e
          • Opcode Fuzzy Hash: 7e741c51b02e790958833b2b8735b60c45302074638f56a5c8eee82971af6974
          • Instruction Fuzzy Hash: A6B17F32B08BC589E731CF29DA013E92760FB5875CF445231DB8D6AAA5DF78A6C5C340
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: memmove$FreeHeap
          • String ID:
          • API String ID: 3670176668-0
          • Opcode ID: 81e384df63ca1b51aae44180ddea005126832a58fffc18558bf223db879766b0
          • Instruction ID: 7cb3151d2122e5894fc8cd320e3fe97a0fb8845989215d60cdbcecd4cdbda570
          • Opcode Fuzzy Hash: 81e384df63ca1b51aae44180ddea005126832a58fffc18558bf223db879766b0
          • Instruction Fuzzy Hash: C181E322B05BC586E7018F29E9063E963B4FF587A8F055231EF8C627A5EF38E195C300
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FreeHeapmemmove
          • String ID:
          • API String ID: 913535592-0
          • Opcode ID: 134e16f9ccbe202af5521424db87552a4c6aa1a0fa5113da8756ef511665cc17
          • Instruction ID: 749638755bccdb8e088c70de1cd3cb9681748f58bd9d7f2f23555eeb629aa846
          • Opcode Fuzzy Hash: 134e16f9ccbe202af5521424db87552a4c6aa1a0fa5113da8756ef511665cc17
          • Instruction Fuzzy Hash: 0251E622B05B8496E7118F69ED063EA63B4FB58794F059231DF9D67761EF38E185C300
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FreeHeap
          • String ID:
          • API String ID: 3298025750-0
          • Opcode ID: 584b817c781b292bdae6c9f173051f719874f7e7a874fc31c5244adf45dd7bb3
          • Instruction ID: 64c5c0b14029c1d5353d4f8935ccf3603357941f46fdc0c1fdf2174b5d559db7
          • Opcode Fuzzy Hash: 584b817c781b292bdae6c9f173051f719874f7e7a874fc31c5244adf45dd7bb3
          • Instruction Fuzzy Hash: F751B166F05A4586FE08CB5A9A423BD66B0BF98B98F148536CF1DA7794DF389482C340
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FreeHeap
          • String ID:
          • API String ID: 3298025750-0
          • Opcode ID: 4eabaeb2e6c4272030c28ef9aa8f4f5c48f3e402fb6e30ed2b619c6e7ec1ce14
          • Instruction ID: b7a0f31f7698d56b084e4760d3669c070504502619ef9398dfd142a6e7a9b1d9
          • Opcode Fuzzy Hash: 4eabaeb2e6c4272030c28ef9aa8f4f5c48f3e402fb6e30ed2b619c6e7ec1ce14
          • Instruction Fuzzy Hash: D051A166B09A4586FB05CB5ADA013BD66B0BF94B98F148536CF1DA3794DF3895828340
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: FreeHeap
          • String ID:
          • API String ID: 3298025750-0
          • Opcode ID: 7288b7ead6b84b21427bc5c4ce3f40f32ae6214182979457ff8e2e89a53cb556
          • Instruction ID: 2403405c5f6524c347cbe2b53ad24067c5b90dce40bf699fdc63092fd61b3303
          • Opcode Fuzzy Hash: 7288b7ead6b84b21427bc5c4ce3f40f32ae6214182979457ff8e2e89a53cb556
          • Instruction Fuzzy Hash: 8951A166B09A4586FB05CB5ADA013BD66B0BF94B98F148536CF1DA3794DF3895828340
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.870145468.00007FF6B3251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B3250000, based on PE: true
          • Associated: 00000000.00000002.870073764.00007FF6B3250000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870228180.00007FF6B329B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870270164.00007FF6B32AC000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.870300039.00007FF6B32AD000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b3250000_AMSilence.jbxd
          Similarity
          • API ID: CloseFreeHandleHeap
          • String ID:
          • API String ID: 1642312469-0
          • Opcode ID: 9706d9601bc963db368842f7adf9c599db0aa146ddee7e46d699f184a29084b8
          • Instruction ID: a3a311feb0b775fc7719823eadc4377e068f0bdfe4c15e289edf8032577a87c0
          • Opcode Fuzzy Hash: 9706d9601bc963db368842f7adf9c599db0aa146ddee7e46d699f184a29084b8
          • Instruction Fuzzy Hash: 67018F26B04A95D4E715DF3BED457E92360FB88B58F044132EE0D96665CF38D486C300