Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe

Overview

General Information

Sample name:40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe
Analysis ID:1525119
MD5:07dd73909e1a74b92498058afc918ede
SHA1:2f3f9ab4f17ccd2dfe0c4aada522b00c580c454d
SHA256:40122c3fc307277bbcb516dce390f74f27e2f798cb351a692f820ba7d3ffd735
Tags:exeStealcuser-abuse_ch
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Deletes itself after installation
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
PE file has a writeable .text section
Potentially malicious time measurement code found
Query firmware table information (likely to detect VMs)
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe (PID: 6320 cmdline: "C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe" MD5: 07DD73909E1A74B92498058AFC918EDE)
    • cmd.exe (PID: 6520 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6468 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • explorer.exe (PID: 2536 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://5.188.87.43/29087f1d398f0eec.php", "Botnet": "meowsterioland29"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\bvhkJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
    C:\Users\user\AppData\Local\Temp\bvhkJoeSecurity_StealcYara detected StealcJoe Security
      SourceRuleDescriptionAuthorStrings
      00000003.00000002.1874605322.0000000000611000.00000080.00000001.01000000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000001.00000002.1875254375.0000000005BD0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          Process Memory Space: cmd.exe PID: 6520JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
            Process Memory Space: explorer.exe PID: 2536JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
              SourceRuleDescriptionAuthorStrings
              1.2.cmd.exe.5bd00c8.8.unpackJoeSecurity_StealcYara detected StealcJoe Security
                1.2.cmd.exe.5bd00c8.8.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security

                  System Summary

                  barindex
                  Source: Process startedAuthor: Furkan CALISKAN, @caliskanfurkan_, @oscd_initiative: Data: Command: C:\Windows\SysWOW64\explorer.exe, CommandLine: C:\Windows\SysWOW64\explorer.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\explorer.exe, NewProcessName: C:\Windows\SysWOW64\explorer.exe, OriginalFileName: C:\Windows\SysWOW64\explorer.exe, ParentCommandLine: C:\Windows\SysWOW64\cmd.exe, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6520, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\SysWOW64\explorer.exe, ProcessId: 2536, ProcessName: explorer.exe
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 1.2.cmd.exe.5bd00c8.8.raw.unpackMalware Configuration Extractor: StealC {"C2 url": "http://5.188.87.43/29087f1d398f0eec.php", "Botnet": "meowsterioland29"}
                  Source: C:\Users\user\AppData\Local\Temp\bvhkReversingLabs: Detection: 87%
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeReversingLabs: Detection: 54%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Users\user\AppData\Local\Temp\bvhkJoe Sandbox ML: detected
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0040EF10 CryptAcquireContextA,0_2_0040EF10
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0040E0F0 CryptAcquireContextA,0_2_0040E0F0
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00421430 CryptAcquireContextA,CryptAcquireContextA,0_2_00421430
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0041F900 CryptBinaryToStringA,0_2_0041F900
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: Binary string: C:\FastCopy\src\install\Obj\ReleaseInst\setup.pdb source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe
                  Source: Binary string: wntdll.pdbUGP source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675984078.0000000003A40000.00000004.00000800.00020000.00000000.sdmp, 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675861480.00000000036E7000.00000004.00000020.00020000.00000000.sdmp, 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1676294574.0000000003DF1000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1875062734.0000000005720000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874819246.00000000052B0000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1874906293.0000000004945000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875143310.0000000004DB0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675984078.0000000003A40000.00000004.00000800.00020000.00000000.sdmp, 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675861480.00000000036E7000.00000004.00000020.00020000.00000000.sdmp, 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1676294574.0000000003DF1000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1875062734.0000000005720000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874819246.00000000052B0000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1874906293.0000000004945000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875143310.0000000004DB0000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0044F978 FindFirstFileExA,0_2_0044F978

                  Networking

                  barindex
                  Source: Malware configuration extractorURLs: http://5.188.87.43/29087f1d398f0eec.php
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675663986.0000000003402000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://c0rl.m%L
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675663986.0000000003402000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: http://ocsp.comodoca.com0
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675663986.0000000003402000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.c
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: http://ocsp.digicert.com0A
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: http://ocsp.digicert.com0C
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0L
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: http://ocsp.digicert.com0X
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: http://ocsp.sectigo.com0
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s2.symcb.com0
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crl0a
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crt0
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcd.com0&
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.00000000034CB000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.0000000005613000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.info-zip.org/
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/cps0(
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/rpa00
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.vmware.com/0
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.vmware.com/0/
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/cps0%
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: https://fastcopy.jp
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: https://fastcopy.jp.https://github.com/FastCopyLab/FastCopy/issues
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: https://fastcopy.jp.https://github.com/FastCopyLab/FastCopy/issuesVThis
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: https://fastcopy.jp/help/fastcopy.htm
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: https://fastcopy.jp/help/fastcopy_cn.htm
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: https://fastcopy.jp/pro/
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: https://fastcopy.jpF
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: https://sectigo.com/CPS0
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0

                  System Summary

                  barindex
                  Source: bvhk.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004136B0 NtQuerySystemInformation,0_2_004136B0
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004136B0 NtQuerySystemInformation,0_2_004136B0
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004010000_2_00401000
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0043F0040_2_0043F004
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004330100_2_00433010
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0040D0A00_2_0040D0A0
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004391000_2_00439100
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0045A1000_2_0045A100
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0044E1F90_2_0044E1F9
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004071890_2_00407189
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004183000_2_00418300
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0045A3100_2_0045A310
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004535270_2_00453527
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004296500_2_00429650
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004216600_2_00421660
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004216E00_2_004216E0
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004586900_2_00458690
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0042F7300_2_0042F730
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004388000_2_00438800
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004288C00_2_004288C0
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004588D00_2_004588D0
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0042C8F00_2_0042C8F0
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004599400_2_00459940
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004449520_2_00444952
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004219100_2_00421910
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0044DAE80_2_0044DAE8
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00432A800_2_00432A80
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00428BC00_2_00428BC0
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00444B810_2_00444B81
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0040CC400_2_0040CC40
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00439C700_2_00439C70
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00458CF00_2_00458CF0
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00435D400_2_00435D40
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00444DDE0_2_00444DDE
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0040CE900_2_0040CE90
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00428F400_2_00428F40
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00458F500_2_00458F50
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0040DF700_2_0040DF70
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00424F300_2_00424F30
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00445FF00_2_00445FF0
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0042CFA00_2_0042CFA0
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: String function: 0043D610 appears 36 times
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeStatic PE information: invalid certificate
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675984078.0000000003B6D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1676294574.0000000003F14000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesetup.exe2 vs 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamezip.exe( vs 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeBinary or memory string: OriginalFilenamesetup.exe2 vs 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: classification engineClassification label: mal100.troj.evad.winEXE@6/2@0/0
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0041E410 GetCurrentProcessId,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,CloseHandle,0_2_0041E410
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6468:120:WilError_03
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeFile created: C:\Users\user\AppData\Local\Temp\16f361f8Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeReversingLabs: Detection: 54%
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeString found in binary or memory: FastCopy.exeInstallFastCopy.exeopenFastCopy.lnk\%sSoftware\Microsoft\Windows\CurrentVersion\UninstallFastCopy.exeFastCopyDisplayIconFastCopyFastCopyDisplayNamesetup.exe /rUninstallStringDisplayIconDisplayVersionH.Shirouzu & FastCopy Lab, LLC.PublisherEstimatedSizeHelpLinkURLUpdateInfoURLInfoAboutpub-setup@fastcopy.jpCommentsHSToolsFastCopyPathReRegisterSparsePackageFastEx11.dll"%s\%s",%srundll32.exe/UPDATEDopen/INSTALLopenFastCopy.iniFastCopy.iniFastCopy.inito_OldDir(VirtualStore).lnk%s.obsolete%s.obsoleteto_ExeDir.lnk^(%s|%s\..+)$*...setup.exeLogmsixDocFastCopySetup path not found
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeFile read: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe "C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe"
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeSection loaded: pla.dllJump to behavior
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeSection loaded: pdh.dllJump to behavior
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeSection loaded: tdh.dllJump to behavior
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeSection loaded: wevtapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeSection loaded: shdocvw.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: shdocvw.dllJump to behavior
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeStatic file information: File size 5883824 > 1048576
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: C:\FastCopy\src\install\Obj\ReleaseInst\setup.pdb source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe
                  Source: Binary string: wntdll.pdbUGP source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675984078.0000000003A40000.00000004.00000800.00020000.00000000.sdmp, 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675861480.00000000036E7000.00000004.00000020.00020000.00000000.sdmp, 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1676294574.0000000003DF1000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1875062734.0000000005720000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874819246.00000000052B0000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1874906293.0000000004945000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875143310.0000000004DB0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675984078.0000000003A40000.00000004.00000800.00020000.00000000.sdmp, 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675861480.00000000036E7000.00000004.00000020.00020000.00000000.sdmp, 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1676294574.0000000003DF1000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1875062734.0000000005720000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874819246.00000000052B0000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1874906293.0000000004945000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875143310.0000000004DB0000.00000004.00001000.00020000.00000000.sdmp
                  Source: bvhk.1.drStatic PE information: section name: xnyuv
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00416075 push edi; retf 0_2_00416076
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00416079 push edi; retf 0_2_0041607A
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0041607D push edi; retf 0_2_0041607E
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00416089 push edi; retf 0_2_0041608A
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0041608D push edi; retf 0_2_0041608E
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00416091 push edi; retf 0_2_00416092
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0043D2C9 push ecx; ret 0_2_0043D2DC
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0043D656 push ecx; ret 0_2_0043D669
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004158CD push cs; iretd 0_2_004158E0
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00415EF5 push edi; retf 0_2_00415EF6
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00415EF9 push edi; retf 0_2_00415EFA
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00415EFD push edi; retf 0_2_00415EFE
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00415F01 push edi; retf 0_2_00415F02
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00415F05 push edi; retf 0_2_00415F06
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00415F09 push edi; retf 0_2_00415F0A
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00415F0D push edi; retf 0_2_00415F0E
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00415F11 push edi; retf 0_2_00415F12
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeStatic PE information: section name: .text entropy: 6.809024001288572
                  Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\bvhkJump to dropped file
                  Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\bvhkJump to dropped file

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\SysWOW64\cmd.exeFile deleted: c:\users\user\desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\BVHK

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeSystem information queried: FirmwareTableInformationJump to behavior
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeAPI/Special instruction interceptor: Address: 6CF17C44
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeAPI/Special instruction interceptor: Address: 6CF17945
                  Source: C:\Windows\SysWOW64\cmd.exeAPI/Special instruction interceptor: Address: 6CF13B54
                  Source: C:\Windows\SysWOW64\explorer.exeAPI/Special instruction interceptor: Address: BDA317
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004018C0 rdtsc 0_2_004018C0
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0041E410 GetCurrentProcessId,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,CloseHandle,0_2_0041E410
                  Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\bvhkJump to dropped file
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-25172
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe TID: 6248Thread sleep time: -45000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0044F978 FindFirstFileExA,0_2_0044F978
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0043AFAB VirtualQuery,GetSystemInfo,0_2_0043AFAB
                  Source: explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noreply@vmware.com0
                  Source: explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: http://www.vmware.com/0
                  Source: explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.1!0
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675663986.0000000003402000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware,
                  Source: explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: http://www.vmware.com/0/
                  Source: explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.1
                  Source: explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.0
                  Source: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeBinary or memory string: NGDELLVMwareVirtualUsbNcmMicrosoftParallelsOracle
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeAPI call chain: ExitProcess graph end nodegraph_0-25830
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeAPI call chain: ExitProcess graph end nodegraph_0-25283
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00401A900_2_00401A90
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00401B000_2_00401B00
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004018C0 rdtsc 0_2_004018C0
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004432E4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004432E4
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0041E410 GetCurrentProcessId,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,CloseHandle,0_2_0041E410
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004532D3 mov eax, dword ptr fs:[00000030h]0_2_004532D3
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00447AC0 mov eax, dword ptr fs:[00000030h]0_2_00447AC0
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_00413D80 mov eax, dword ptr fs:[00000030h]0_2_00413D80
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004533B6 ExitProcess,GetProcessHeap,RtlAllocateHeap,VirtualProtect,VirtualProtect,0_2_004533B6
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004432E4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004432E4
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0043D428 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0043D428
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0043CB59 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0043CB59

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 6520, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 2536, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\bvhk, type: DROPPED
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeNtSetInformationThread: Direct from: 0x414A21Jump to behavior
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeNtProtectVirtualMemory: Direct from: 0x6CED4389Jump to behavior
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeNtQuerySystemInformation: Direct from: 0x4534DDJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 2536 base: BD79C0 value: 55Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 2536 base: 610000 value: 00Jump to behavior
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: BD79C0Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 610000Jump to behavior
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_004016C0 cpuid 0_2_004016C0
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: EnumSystemLocalesW,0_2_0044C265
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_004522AA
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: EnumSystemLocalesW,0_2_0045256D
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: EnumSystemLocalesW,0_2_00452522
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: EnumSystemLocalesW,0_2_00452608
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: GetLocaleInfoW,0_2_0044C60A
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00452695
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: GetLocaleInfoW,0_2_004528E5
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00452A0E
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: GetLocaleInfoW,0_2_00452B15
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00452BE2
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeCode function: 0_2_0040F620 GetLocalTime,0_2_0040F620
                  Source: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 1.2.cmd.exe.5bd00c8.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.cmd.exe.5bd00c8.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.1874605322.0000000000611000.00000080.00000001.01000000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1875254375.0000000005BD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\bvhk, type: DROPPED

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 1.2.cmd.exe.5bd00c8.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.cmd.exe.5bd00c8.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.1874605322.0000000000611000.00000080.00000001.01000000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1875254375.0000000005BD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\bvhk, type: DROPPED
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                  Command and Scripting Interpreter
                  11
                  DLL Side-Loading
                  311
                  Process Injection
                  1
                  Masquerading
                  OS Credential Dumping1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  2
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Native API
                  Boot or Logon Initialization Scripts1
                  Abuse Elevation Control Mechanism
                  11
                  Virtualization/Sandbox Evasion
                  LSASS Memory341
                  Security Software Discovery
                  Remote Desktop ProtocolData from Removable Media1
                  Application Layer Protocol
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
                  DLL Side-Loading
                  311
                  Process Injection
                  Security Account Manager11
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                  Deobfuscate/Decode Files or Information
                  NTDS2
                  Process Discovery
                  Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Abuse Elevation Control Mechanism
                  LSA Secrets1
                  File and Directory Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                  Obfuscated Files or Information
                  Cached Domain Credentials124
                  System Information Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Software Packing
                  DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                  DLL Side-Loading
                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                  File Deletion
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe54%ReversingLabsWin32.Spyware.Vidar
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Temp\bvhk100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\bvhk88%ReversingLabsWin32.Trojan.Stealc
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://sectigo.com/CPS00%URL Reputationsafe
                  http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%URL Reputationsafe
                  http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
                  http://ocsp.sectigo.com00%URL Reputationsafe
                  http://www.symauth.com/rpa000%URL Reputationsafe
                  http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#0%URL Reputationsafe
                  http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
                  http://www.symauth.com/cps0(0%URL Reputationsafe
                  No contacted domains info
                  NameMaliciousAntivirus DetectionReputation
                  http://5.188.87.43/29087f1d398f0eec.phptrue
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://sectigo.com/CPS040122c3fc307277bbcb516dce390f74f27e2f798cb351.exefalse
                    • URL Reputation: safe
                    unknown
                    http://www.vmware.com/040122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpfalse
                      unknown
                      https://fastcopy.jp/help/fastcopy_cn.htm40122c3fc307277bbcb516dce390f74f27e2f798cb351.exefalse
                        unknown
                        http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y40122c3fc307277bbcb516dce390f74f27e2f798cb351.exefalse
                        • URL Reputation: safe
                        unknown
                        http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl040122c3fc307277bbcb516dce390f74f27e2f798cb351.exefalse
                        • URL Reputation: safe
                        unknown
                        http://ocsp.sectigo.com040122c3fc307277bbcb516dce390f74f27e2f798cb351.exefalse
                        • URL Reputation: safe
                        unknown
                        http://www.symauth.com/rpa0040122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://fastcopy.jpF40122c3fc307277bbcb516dce390f74f27e2f798cb351.exefalse
                          unknown
                          https://fastcopy.jp.https://github.com/FastCopyLab/FastCopy/issues40122c3fc307277bbcb516dce390f74f27e2f798cb351.exefalse
                            unknown
                            http://www.info-zip.org/40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.00000000034CB000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.0000000005613000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CAD000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              https://fastcopy.jp.https://github.com/FastCopyLab/FastCopy/issuesVThis40122c3fc307277bbcb516dce390f74f27e2f798cb351.exefalse
                                unknown
                                https://fastcopy.jp/pro/40122c3fc307277bbcb516dce390f74f27e2f798cb351.exefalse
                                  unknown
                                  http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#40122c3fc307277bbcb516dce390f74f27e2f798cb351.exefalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.vmware.com/0/40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpfalse
                                    unknown
                                    https://fastcopy.jp40122c3fc307277bbcb516dce390f74f27e2f798cb351.exefalse
                                      unknown
                                      https://fastcopy.jp/help/fastcopy.htm40122c3fc307277bbcb516dce390f74f27e2f798cb351.exefalse
                                        unknown
                                        http://ocsp.digicert.c40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675663986.0000000003402000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#40122c3fc307277bbcb516dce390f74f27e2f798cb351.exefalse
                                          • URL Reputation: safe
                                          unknown
                                          http://c0rl.m%L40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675663986.0000000003402000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            http://www.symauth.com/cps0(40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675738637.0000000003521000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1874968146.000000000565B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1875049674.0000000004CF5000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://crl3.digicert.40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe, 00000000.00000002.1675663986.0000000003402000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              No contacted IP infos
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1525119
                                              Start date and time:2024-10-03 17:56:06 +02:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 4m 12s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:7
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe
                                              Detection:MAL
                                              Classification:mal100.troj.evad.winEXE@6/2@0/0
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HCA Information:
                                              • Successful, ratio: 93%
                                              • Number of executed functions: 32
                                              • Number of non-executed functions: 125
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Stop behavior analysis, all processes terminated
                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                              • Not all processes where analyzed, report is missing behavior information
                                              • VT rate limit hit for: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe
                                              TimeTypeDescription
                                              11:56:57API Interceptor1x Sleep call for process: 40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe modified
                                              11:57:17API Interceptor1x Sleep call for process: cmd.exe modified
                                              No context
                                              No context
                                              No context
                                              No context
                                              No context
                                              Process:C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):1051621
                                              Entropy (8bit):7.558029440197468
                                              Encrypted:false
                                              SSDEEP:24576:sHoc64zc8Uku9hjo8r8sthbuc5h9aCHBt2fOEFP:sHB64zgBtFZP9aCHgd
                                              MD5:CB229F62E3491C104232D68C7F9865D8
                                              SHA1:923B90E0CAA7BF56CBA81E1F508572080635815F
                                              SHA-256:F650639502221E183DA4402A67407A1B9503ECDAEE33BF9629507D7D9C22C417
                                              SHA-512:C36F384A853E2B07130215FE70BF9374B177F804386EA839D0257C9F0FA5A8A7B6C548EA4F78385C06F450E0B68D4253425B1ED4AAA3D71DC479D671813C2E4A
                                              Malicious:false
                                              Reputation:low
                                              Preview:............................................................................................................................................................................................................................................................................................................................................................................................................................B...F..._...}...f...|...a...s..._...N...u...a...s...b...................................[...{...h.....................................................................Q...f...a...q..................................................................[...@..{...a...<...N.......`....................................................<..."..................................
                                              Process:C:\Windows\SysWOW64\cmd.exe
                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):320512
                                              Entropy (8bit):6.309192877646325
                                              Encrypted:false
                                              SSDEEP:6144:KlPi8WYtUokCulxMfpb7fefYxyFacU77+Uw3N/RQv8Yt9v:GHtUoH3BfQbFfI7x8/Ret9v
                                              MD5:B6CCE3D9BE9717453FCE377484AAE9F6
                                              SHA1:E0DBFB09652B692E7938149FEA2B5A59BD7F6EFB
                                              SHA-256:22A18B4EEA7AFD85AA75C382FB2D5115633F8726EBF3EC8AA6C4628654FCC3A1
                                              SHA-512:7D9215B6851298445A729B359351B65EA485E1AEA6F6529ACE0969F979CDCD062567CFB2E4E0246B587FC3A580A8E84B60E25FAED166141371092BED607A751B
                                              Malicious:true
                                              Yara Hits:
                                              • Rule: JoeSecurity_PowershellDownloadAndExecute, Description: Yara detected Powershell download and execute, Source: C:\Users\user\AppData\Local\Temp\bvhk, Author: Joe Security
                                              • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: C:\Users\user\AppData\Local\Temp\bvhk, Author: Joe Security
                                              Antivirus:
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              • Antivirus: ReversingLabs, Detection: 88%
                                              Reputation:low
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........C..............X......m.......Y.......p.....y.........`...............\......n.....Rich............PE..L....b<O......................$......i............@..........................0&...........@.................................8...<.............................%..$...................................................................................text............................... ....rdata..............................@..@.data.....#.........................@....reloc...E....%..F..................@..Bxnyuv.... ....&.....................@...................................................................................................................................................................................................................................................................................................................................
                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Entropy (8bit):7.96603032667569
                                              TrID:
                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                              • DOS Executable Generic (2002/1) 0.02%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe
                                              File size:5'883'824 bytes
                                              MD5:07dd73909e1a74b92498058afc918ede
                                              SHA1:2f3f9ab4f17ccd2dfe0c4aada522b00c580c454d
                                              SHA256:40122c3fc307277bbcb516dce390f74f27e2f798cb351a692f820ba7d3ffd735
                                              SHA512:97f66cd575203cfbd0d584475c6696b160071e95466e5dde8b71d66138108f0b4d544af24706720960509fd7fd21bef07e443995457de3805168672844901853
                                              SSDEEP:98304:XUd9wETbKHs4+b4EmeICxgHxC6qz1loJoYFqQ5dn6uqhAoCVtxnz+oEIWoJd:MwgbKM44YCxwxmzLOFfdrq+P/xnCoEIh
                                              TLSH:36563310BAF39172E46785316DBEDAF7763CB9204B3189EB71C44A2A5D700C12736B7A
                                              File Content Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$.........A.../.../.../.Sj..../.Sj..G./.Sj..../.yV..../...,.../...+.../...*.../......./......./......./.....i./.../.../.&.+.../.L.&.../
                                              Icon Hash:53170f85a7c14639
                                              Entrypoint:0x43d24b
                                              Entrypoint Section:.text
                                              Digitally signed:true
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                              DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x66B96AE1 [Mon Aug 12 01:52:33 2024 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:5
                                              OS Version Minor:1
                                              File Version Major:5
                                              File Version Minor:1
                                              Subsystem Version Major:5
                                              Subsystem Version Minor:1
                                              Import Hash:c3e91fbd563a72c79722e447bd1614b5
                                              Signature Valid:false
                                              Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
                                              Signature Validation Error:The digital signature of the object did not verify
                                              Error Number:-2146869232
                                              Not Before, Not After
                                              • 22/09/2021 01:00:00 28/09/2024 00:59:59
                                              Subject Chain
                                              • CN="FastCopy Lab, LLC.", O="FastCopy Lab, LLC.", S=Kanagawa, C=JP
                                              Version:3
                                              Thumbprint MD5:4884797B3C472467754D6AD8388EE5DC
                                              Thumbprint SHA-1:A58CC15DF883AA8BC4FF4C379080672AEA3B87D7
                                              Thumbprint SHA-256:793062CC3862DAE80CC98B2D7F6B53998DD4D73CDE549B891DD65DA7FE96EF19
                                              Serial:5621CB0BB7527F9B05D2EE5399515980
                                              Instruction
                                              call 00007F6F20C97119h
                                              jmp 00007F6F20C9692Fh
                                              push 00000010h
                                              push 0047DF78h
                                              call 00007F6F20C96E64h
                                              xor ebx, ebx
                                              mov dword ptr [ebp-20h], ebx
                                              mov byte ptr [ebp-19h], bl
                                              mov dword ptr [ebp-04h], ebx
                                              cmp ebx, dword ptr [ebp+10h]
                                              je 00007F6F20C96ACDh
                                              mov ecx, dword ptr [ebp+14h]
                                              call dword ptr [0045D1F8h]
                                              mov ecx, dword ptr [ebp+08h]
                                              call dword ptr [ebp+14h]
                                              mov eax, dword ptr [ebp+0Ch]
                                              add dword ptr [ebp+08h], eax
                                              inc ebx
                                              mov dword ptr [ebp-20h], ebx
                                              jmp 00007F6F20C96A92h
                                              mov al, 01h
                                              mov byte ptr [ebp-19h], al
                                              mov dword ptr [ebp-04h], FFFFFFFEh
                                              call 00007F6F20C96ACDh
                                              mov ecx, dword ptr [ebp-10h]
                                              mov dword ptr fs:[00000000h], ecx
                                              pop ecx
                                              pop edi
                                              pop esi
                                              pop ebx
                                              leave
                                              retn 0014h
                                              mov ebx, dword ptr [ebp-20h]
                                              mov al, byte ptr [ebp-19h]
                                              test al, al
                                              jne 00007F6F20C96AC1h
                                              push dword ptr [ebp+18h]
                                              push ebx
                                              push dword ptr [ebp+0Ch]
                                              push dword ptr [ebp+08h]
                                              call 00007F6F20C96297h
                                              ret
                                              mov ecx, dword ptr [ebp-0Ch]
                                              mov dword ptr fs:[00000000h], ecx
                                              pop ecx
                                              pop edi
                                              pop edi
                                              pop esi
                                              pop ebx
                                              mov esp, ebp
                                              pop ebp
                                              push ecx
                                              ret
                                              push eax
                                              push dword ptr fs:[00000000h]
                                              lea eax, dword ptr [esp+0Ch]
                                              sub esp, dword ptr [esp+0Ch]
                                              push ebx
                                              push esi
                                              push edi
                                              mov dword ptr [eax], ebp
                                              mov ebp, eax
                                              mov eax, dword ptr [0048106Ch]
                                              xor eax, ebp
                                              push eax
                                              push dword ptr [ebp-04h]
                                              mov dword ptr [ebp-04h], FFFFFFFFh
                                              lea eax, dword ptr [ebp-0Ch]
                                              mov dword ptr fs:[00000000h], eax
                                              ret
                                              Programming Language:
                                              • [C++] VS2008 SP1 build 30729
                                              • [ C ] VS2008 SP1 build 30729
                                              • [IMP] VS2008 SP1 build 30729
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x7f6140x28.rdata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x9a0000xc61e2.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x599ab00x2d00
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x7b6c00x54.rdata
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x7b7140x18.rdata
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x5fee00x40.rdata
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x5d0000x1f8.rdata
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x7e6280x120.rdata
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x5b6f90x5b8009b06ac7fca11092ab7147c7fa76b1265False0.483459806181694data6.809024001288572IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rdata0x5d0000x231320x23200a11b9fff7d5d31ece0cf62fe5ba97298False0.5682829181494662data6.431648301840321IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .data0x810000x18dc40x420051ed9959914ab0debd7a2e60f5f9a40cFalse0.6928267045454546DOS executable (block device driver by P.J)6.882464661105504IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0x9a0000xc61e20xc62001d8a88994b58be4d149db6277f5f8616False0.9410094637223975data7.89691058058585IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              HJKC0x9a4cc0xc00faPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedJapaneseJapan0.9613058389539865
                                              RT_ICON0x15a5c80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0JapaneseJapan0.18953068592057762
                                              RT_DIALOG0x15ae700x32adataEnglishUnited States0.4962962962962963
                                              RT_DIALOG0x15b19c0x276dataJapaneseJapan0.6158730158730159
                                              RT_DIALOG0x15b4140x242dataChineseChina0.6522491349480969
                                              RT_DIALOG0x15b6580x128dataEnglishUnited States0.6283783783783784
                                              RT_DIALOG0x15b7800x108dataJapaneseJapan0.6477272727272727
                                              RT_DIALOG0x15b8880x118dataChineseChina0.65
                                              RT_DIALOG0x15b9a00xd8dBase III DBT, next free block index 4294901761EnglishUnited States0.6481481481481481
                                              RT_DIALOG0x15ba780xb4dataJapaneseJapan0.7
                                              RT_DIALOG0x15bb2c0xb4dataChineseChina0.7
                                              RT_DIALOG0x15bbe00xccdataEnglishUnited States0.6617647058823529
                                              RT_DIALOG0x15bcac0xb8dBase III DBT, next free block index 4294901761JapaneseJapan0.7065217391304348
                                              RT_DIALOG0x15bd640xb4dBase III DBT, next free block index 4294901761ChineseChina0.7166666666666667
                                              RT_DIALOG0x15be180x272dataEnglishUnited States0.4792332268370607
                                              RT_DIALOG0x15c08c0x1dedataJapaneseJapan0.6213389121338913
                                              RT_DIALOG0x15c26c0x19edataChineseChina0.6690821256038647
                                              RT_DIALOG0x15c40c0x156dataEnglishUnited States0.6374269005847953
                                              RT_DIALOG0x15c5640x11cdataJapaneseJapan0.7323943661971831
                                              RT_DIALOG0x15c6800x120dataChineseChina0.7152777777777778
                                              RT_STRING0x15c7a00x8b2dataEnglishUnited States0.2663971248876909
                                              RT_STRING0x15d0540x5ccdataJapaneseJapan0.43194070080862534
                                              RT_STRING0x15d6200x418dataChineseChina0.5811068702290076
                                              RT_STRING0x15da380x9b2dataEnglishUnited States0.3178887993553586
                                              RT_STRING0x15e3ec0x5eedataJapaneseJapan0.4762845849802372
                                              RT_STRING0x15e9dc0x502dataChineseChina0.516380655226209
                                              RT_GROUP_ICON0x15eee00x14dataJapaneseJapan1.15
                                              RT_VERSION0x15eef40x3a8dataJapaneseJapan0.44551282051282054
                                              RT_MANIFEST0x15f29c0x8cbXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (2191), with CRLF line terminatorsEnglishUnited States0.31941359395824076
                                              RT_MANIFEST0x15fb680x67aXML 1.0 document, ASCII text, with CRLF line terminatorsJapaneseJapan0.3968636911942099
                                              DLLImport
                                              KERNEL32.dllReadFile, FindFirstFileW, FindNextFileW, WriteFile, FindClose, WaitForSingleObject, CreateFileW, DeleteFileW, CloseHandle, GetLocalTime, GetFileSize, GetSystemTimeAsFileTime, CreateDirectoryW, GetCommandLineW, GetFullPathNameW, RemoveDirectoryW, GetModuleFileNameW, GetFileAttributesW, GetCurrentDirectoryW, SetCurrentDirectoryW, GetProcAddress, CreateProcessW, FreeLibrary, CopyFileW, SetDllDirectoryW, MoveFileW, GetEnvironmentVariableW, VirtualProtect, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, GetTempPathW, Sleep, GetLastError, SetEvent, GetVersionExA, DeleteCriticalSection, GetModuleHandleW, GetEnvironmentStringsW, GetStdHandle, WriteConsoleA, OutputDebugStringA, GetCurrentThreadId, AttachConsole, OutputDebugStringW, WriteConsoleW, GetFileType, InterlockedIncrement, GetTickCount, SetThreadLocale, SetLastError, GetCurrentProcess, GetSystemDirectoryW, OpenProcess, CreateToolhelp32Snapshot, Process32NextW, GetUserDefaultLCID, Process32FirstW, LoadLibraryW, GetCurrentProcessId, MultiByteToWideChar, MoveFileExW, WideCharToMultiByte, ExitProcess, SetFileTime, UnmapViewOfFile, GetFileAttributesExW, CreateFileMappingA, MapViewOfFile, GetFileTime, GetModuleFileNameA, SetEndOfFile, RaiseException, CreateThread, SetUnhandledExceptionFilter, GetSystemInfo, VirtualQuery, LoadLibraryExA, GetStringTypeW, EncodePointer, DecodePointer, GetCPInfo, CompareStringW, LCMapStringW, GetLocaleInfoW, InitializeCriticalSectionAndSpinCount, CreateEventW, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, ResetEvent, WaitForSingleObjectEx, UnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, InitializeSListHead, RtlUnwind, LoadLibraryExW, ExitThread, FreeLibraryAndExitThread, GetModuleHandleExW, GetACP, HeapFree, HeapAlloc, HeapReAlloc, IsValidLocale, EnumSystemLocalesW, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCommandLineA, FreeEnvironmentStringsW, GetProcessHeap, SetStdHandle, FlushFileBuffers, GetConsoleCP, GetConsoleMode, HeapSize, SetFilePointerEx, ReadConsoleW
                                              Language of compilation systemCountry where language is spokenMap
                                              JapaneseJapan
                                              EnglishUnited States
                                              ChineseChina
                                              No network behavior found

                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:11:56:57
                                              Start date:03/10/2024
                                              Path:C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe"
                                              Imagebase:0x400000
                                              File size:5'883'824 bytes
                                              MD5 hash:07DD73909E1A74B92498058AFC918EDE
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:low
                                              Has exited:true

                                              Target ID:1
                                              Start time:11:56:57
                                              Start date:03/10/2024
                                              Path:C:\Windows\SysWOW64\cmd.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\SysWOW64\cmd.exe
                                              Imagebase:0x240000
                                              File size:236'544 bytes
                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000001.00000002.1875254375.0000000005BD0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:high
                                              Has exited:true

                                              Target ID:2
                                              Start time:11:56:57
                                              Start date:03/10/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff7699e0000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:3
                                              Start time:11:57:09
                                              Start date:03/10/2024
                                              Path:C:\Windows\SysWOW64\explorer.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\SysWOW64\explorer.exe
                                              Imagebase:0xaf0000
                                              File size:4'514'184 bytes
                                              MD5 hash:DD6597597673F72E10C9DE7901FBA0A8
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000003.00000002.1874605322.0000000000611000.00000080.00000001.01000000.00000000.sdmp, Author: Joe Security
                                              Reputation:moderate
                                              Has exited:true

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:5.1%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:3.3%
                                                Total number of Nodes:960
                                                Total number of Limit Nodes:23
                                                execution_graph 26213 40f740 26 API calls error_info_injector 26148 43d542 GetStartupInfoW ___scrt_fastfail 26183 43be40 39 API calls 4 library calls 25871 447c40 25872 447c4f 25871->25872 25873 447c6b 25871->25873 25872->25873 25875 447c55 25872->25875 25895 450158 25873->25895 25899 446b44 20 API calls _free 25875->25899 25878 447c5a 25900 4434ae 26 API calls __cftof 25878->25900 25879 447c96 25901 447d64 38 API calls 25879->25901 25881 447c64 25883 447cb3 25902 447ed9 20 API calls 2 library calls 25883->25902 25885 447cc0 25886 447cd5 25885->25886 25887 447cc9 25885->25887 25904 447d64 38 API calls 25886->25904 25903 446b44 20 API calls _free 25887->25903 25891 447ceb 25894 447cce 25891->25894 25905 44a4f1 20 API calls _free 25891->25905 25892 447d5a 25892->25881 25906 44a4f1 20 API calls _free 25894->25906 25896 450161 25895->25896 25897 447c72 GetModuleFileNameA 25895->25897 25907 450057 25896->25907 25897->25879 25899->25878 25900->25881 25901->25883 25902->25885 25903->25894 25904->25891 25905->25894 25906->25892 25908 44a348 __Getcvt 38 API calls 25907->25908 25909 450064 25908->25909 25927 450176 25909->25927 25911 45006c 25936 44fdeb 25911->25936 25914 450083 25914->25897 25917 4500c6 25961 44a4f1 20 API calls _free 25917->25961 25921 4500c1 25960 446b44 20 API calls _free 25921->25960 25923 45010a 25923->25917 25963 44fcc1 26 API calls 25923->25963 25924 4500de 25924->25923 25962 44a4f1 20 API calls _free 25924->25962 25928 450182 BuildCatchObjectHelperInternal 25927->25928 25929 44a348 __Getcvt 38 API calls 25928->25929 25934 45018c 25929->25934 25931 450210 std::_Locinfo::_Locinfo_ctor 25931->25911 25934->25931 25964 447659 38 API calls _abort 25934->25964 25965 446fd4 EnterCriticalSection 25934->25965 25966 44a4f1 20 API calls _free 25934->25966 25967 450207 LeaveCriticalSection std::_Lockit::~_Lockit 25934->25967 25937 442eff __cftof 38 API calls 25936->25937 25938 44fdfd 25937->25938 25939 44fe0c GetOEMCP 25938->25939 25940 44fe1e 25938->25940 25941 44fe35 25939->25941 25940->25941 25942 44fe23 GetACP 25940->25942 25941->25914 25943 44a52b 25941->25943 25942->25941 25944 44a569 25943->25944 25948 44a539 std::_Locinfo::_Locinfo_ctor 25943->25948 25969 446b44 20 API calls _free 25944->25969 25945 44a554 RtlAllocateHeap 25947 44a567 25945->25947 25945->25948 25947->25917 25950 450218 25947->25950 25948->25944 25948->25945 25968 44776c 7 API calls 2 library calls 25948->25968 25951 44fdeb 40 API calls 25950->25951 25953 450237 25951->25953 25952 45023e 25955 43c755 CatchGuardHandler 5 API calls 25952->25955 25953->25952 25954 4502ad ___scrt_fastfail 25953->25954 25956 450288 IsValidCodePage 25953->25956 25970 44fec3 GetCPInfo 25954->25970 25957 4500b9 25955->25957 25956->25952 25958 45029a GetCPInfo 25956->25958 25957->25921 25957->25924 25958->25952 25958->25954 25960->25917 25961->25914 25962->25923 25963->25917 25965->25934 25966->25934 25967->25934 25968->25948 25969->25947 25971 44fefd 25970->25971 25979 44ffa7 25970->25979 25980 44d0fc 25971->25980 25974 43c755 CatchGuardHandler 5 API calls 25976 450053 25974->25976 25976->25952 25978 44cd25 44 API calls 25978->25979 25979->25974 25981 442eff __cftof 38 API calls 25980->25981 25982 44d11c MultiByteToWideChar 25981->25982 25984 44d15a 25982->25984 25990 44d1ec __freea 25982->25990 25986 44a52b std::_Locinfo::_Locinfo_ctor 21 API calls 25984->25986 25988 44d17b std::_Locinfo::_Locinfo_ctor ___scrt_fastfail 25984->25988 25985 43c755 CatchGuardHandler 5 API calls 25987 44d215 25985->25987 25986->25988 25992 44cd25 25987->25992 25989 44d1c0 MultiByteToWideChar 25988->25989 25988->25990 25989->25990 25991 44d1dc GetStringTypeW 25989->25991 25990->25985 25991->25990 25993 442eff __cftof 38 API calls 25992->25993 25994 44cd38 25993->25994 25997 44cb08 25994->25997 25998 44cb23 25997->25998 25999 44cb49 MultiByteToWideChar 25998->25999 26000 44cb73 25999->26000 26017 44cc49 __freea 25999->26017 26003 44cb94 std::_Locinfo::_Locinfo_ctor 26000->26003 26004 44a52b std::_Locinfo::_Locinfo_ctor 21 API calls 26000->26004 26001 43c755 CatchGuardHandler 5 API calls 26002 44cd10 26001->26002 26002->25978 26005 44cbdd MultiByteToWideChar 26003->26005 26003->26017 26004->26003 26006 44cbf6 26005->26006 26005->26017 26018 44c80a 26006->26018 26009 44cc20 26011 44c80a 12 API calls 26009->26011 26009->26017 26010 44cc58 26012 44a52b std::_Locinfo::_Locinfo_ctor 21 API calls 26010->26012 26013 44cc79 std::_Locinfo::_Locinfo_ctor 26010->26013 26011->26017 26012->26013 26014 44c80a 12 API calls 26013->26014 26013->26017 26015 44cccd 26014->26015 26016 44ccdc WideCharToMultiByte 26015->26016 26015->26017 26016->26017 26017->26001 26029 44c32b 26018->26029 26021 44c861 26036 44c892 10 API calls 3 library calls 26021->26036 26022 44c83a LCMapStringEx 26026 44c881 26022->26026 26025 44c87a LCMapStringW 26025->26026 26027 43c755 CatchGuardHandler 5 API calls 26026->26027 26028 44c88c 26027->26028 26028->26009 26028->26010 26028->26017 26030 44c35b 26029->26030 26033 44c357 26029->26033 26030->26021 26030->26022 26031 44c37b 26031->26030 26034 44c387 GetProcAddress 26031->26034 26033->26030 26033->26031 26037 44c3c7 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 26033->26037 26035 44c397 __crt_fast_encode_pointer 26034->26035 26035->26030 26036->26025 26037->26033 26184 43d24b GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 26099 418850 27 API calls 3 library calls 26100 41b850 9 API calls 3 library calls 26185 411a50 84 API calls error_info_injector 26152 427d50 85 API calls 26102 43e450 6 API calls 3 library calls 26215 441b50 RtlUnwind 26103 43dc56 51 API calls 2 library calls 26153 451d5e 39 API calls 4 library calls 26154 41e160 15 API calls CatchGuardHandler 26155 410960 21 API calls 2 library calls 25799 424560 25822 4244c0 83 API calls 25799->25822 25801 42458c 25802 4246f0 25801->25802 25803 4245df 25801->25803 25805 424748 25802->25805 25808 42463b 25802->25808 25823 4533b6 25803->25823 25836 41d060 83 API calls 25805->25836 25809 4247cb 25808->25809 25813 4247aa 25808->25813 25810 43c755 CatchGuardHandler 5 API calls 25809->25810 25811 4247db 25810->25811 25815 43c755 CatchGuardHandler 5 API calls 25813->25815 25817 4247c5 25815->25817 25821 424639 25821->25808 25822->25801 25837 4532d3 GetPEB 25823->25837 25825 4533cd 25826 4532d3 GetPEB 25825->25826 25827 4533db 25826->25827 25828 453418 GetProcessHeap RtlAllocateHeap 25827->25828 25830 4533fd ExitProcess 25827->25830 25829 45343c 25828->25829 25829->25829 25829->25830 25831 453466 VirtualProtect 25829->25831 25832 453496 25831->25832 25833 4534ad VirtualProtect 25831->25833 25832->25832 25832->25833 25835 414a30 9 API calls 25833->25835 25834 4534dd 25834->25830 25835->25834 25836->25821 25838 4532e5 25837->25838 26105 426060 5 API calls CatchGuardHandler 26106 422060 79 API calls 26187 427e60 6 API calls 26038 43b165 26064 43aec6 26038->26064 26041 43b1d2 26071 43b103 6 API calls 2 library calls 26041->26071 26043 43b1dd RaiseException 26044 43b3cb 26043->26044 26045 43b26e LoadLibraryExA 26046 43b281 GetLastError 26045->26046 26047 43b2cf 26045->26047 26050 43b294 26046->26050 26051 43b2aa 26046->26051 26049 43b2da FreeLibrary 26047->26049 26052 43b2e1 26047->26052 26048 43b1f6 26048->26045 26048->26047 26048->26052 26059 43b39d 26048->26059 26049->26052 26050->26047 26050->26051 26072 43b103 6 API calls 2 library calls 26051->26072 26053 43b33f GetProcAddress 26052->26053 26052->26059 26055 43b34f GetLastError 26053->26055 26053->26059 26057 43b362 26055->26057 26056 43b2b5 RaiseException 26056->26044 26057->26059 26073 43b103 6 API calls 2 library calls 26057->26073 26074 43b103 6 API calls 2 library calls 26059->26074 26061 43b383 RaiseException 26062 43aec6 ___delayLoadHelper2@8 6 API calls 26061->26062 26063 43b39a 26062->26063 26063->26059 26065 43aed2 26064->26065 26066 43aef3 26064->26066 26075 43af6c GetModuleHandleW GetProcAddress GetProcAddress DloadGetSRWLockFunctionPointers 26065->26075 26066->26041 26066->26048 26068 43aed7 26068->26066 26069 43aee7 26068->26069 26076 43b095 VirtualQuery GetSystemInfo VirtualProtect DloadObtainSection DloadMakePermanentImageCommit 26069->26076 26071->26043 26072->26056 26073->26061 26074->26044 26075->26068 26076->26066 26217 4146b6 LoadLibraryW GlobalAlloc VirtualProtect VirtualProtect 26219 411b70 32 API calls 3 library calls 26108 450877 21 API calls _free 26157 427570 46 API calls 2 library calls 26109 419800 10 API calls std::_Facet_Register 26158 44c505 11 API calls 2 library calls 26110 438800 6 API calls 2 library calls 26159 44f100 21 API calls __startOneArgErrorHandling 26114 447802 20 API calls 2 library calls 26115 43b808 39 API calls 4 library calls 26116 44c008 88 API calls __wsopen_s 26160 427110 7 API calls 2 library calls 26223 426f10 7 API calls CatchGuardHandler 26162 450d29 42 API calls 3 library calls 26120 447c2a 28 API calls _abort 26163 40f930 CloseHandle 26192 43ce33 4 API calls 3 library calls 26122 43c8c3 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 24915 410dc0 SetDllDirectoryW 24931 41e340 24915->24931 24920 410e48 24951 410e80 24920->24951 24925 410e60 24926 410dff _wcsstr 24926->24920 24927 410e3c 24926->24927 24964 41c610 108 API calls 3 library calls 24927->24964 24929 410e41 24932 41e380 24931->24932 24933 41e39e 24931->24933 24965 43c755 24932->24965 24972 43c931 EnterCriticalSection 24933->24972 24936 41e3a8 24936->24932 24938 41e3b4 GetModuleFileNameW 24936->24938 24937 410dd7 SetCurrentDirectoryW 24943 41dfb0 24937->24943 24977 426f80 GetFullPathNameW ___scrt_fastfail 24938->24977 24940 41e3e1 24978 43c8e7 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 24940->24978 24942 41e405 24942->24932 24944 410de3 24943->24944 24945 41dfd9 24943->24945 24944->24920 24958 41e020 24944->24958 24946 43c931 5 API calls 24945->24946 24947 41dfe3 24946->24947 24947->24944 24948 41dfef GetModuleHandleW GetProcAddress 24947->24948 24981 43c8e7 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 24948->24981 24950 41e015 24950->24944 24982 424120 24951->24982 24954 4242e0 24955 4242ed 24954->24955 25041 410ef0 24955->25041 24959 41e070 24958->24959 24961 41e07f 24959->24961 25767 41e730 24959->25767 24962 43c755 CatchGuardHandler 5 API calls 24961->24962 24963 410dec GetCommandLineW 24962->24963 24963->24926 24964->24929 24966 43c760 IsProcessorFeaturePresent 24965->24966 24967 43c75e 24965->24967 24969 43cb95 24966->24969 24967->24937 24979 43cb59 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 24969->24979 24971 43cc78 24971->24937 24974 43c945 24972->24974 24973 43c94a LeaveCriticalSection 24973->24936 24974->24973 24980 43c9c5 LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 24974->24980 24977->24940 24978->24942 24979->24971 24980->24974 24981->24950 24993 424050 24982->24993 24986 4241e4 25004 421fc0 24986->25004 24988 424200 25010 43cd54 24988->25010 24990 424210 24991 43c755 CatchGuardHandler 5 API calls 24990->24991 24992 410e59 24991->24992 24992->24954 24994 424096 24993->24994 24995 424087 GetCurrentProcessId 24993->24995 24996 43c931 5 API calls 24994->24996 25001 41fb80 24995->25001 24997 4240a0 24996->24997 24997->24995 25017 4240d0 24997->25017 25027 41fba0 25001->25027 25003 41fb96 25003->24986 25037 421da0 WideCharToMultiByte WideCharToMultiByte ___scrt_fastfail 25004->25037 25006 421ff4 25006->24988 25007 421fce 25007->25006 25038 421da0 WideCharToMultiByte WideCharToMultiByte ___scrt_fastfail 25007->25038 25009 421feb 25009->24988 25011 43cd59 ___std_exception_copy 25010->25011 25012 43cd73 25011->25012 25014 43cd75 std::_Facet_Register 25011->25014 25039 44776c 7 API calls 2 library calls 25011->25039 25012->24990 25040 43ea17 RaiseException 25014->25040 25016 43d6bf 25018 41dfb0 11 API calls 25017->25018 25019 4240de 25018->25019 25020 4240e7 25019->25020 25021 41e020 99 API calls 25019->25021 25026 41d940 GetUserDefaultLCID 25020->25026 25021->25020 25023 4240ec CoInitialize 25024 4240b8 25023->25024 25025 43c8e7 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 25024->25025 25025->24995 25028 41fbc0 25027->25028 25029 41fbad 25027->25029 25030 41fbc4 25028->25030 25036 4100f0 74 API calls 25028->25036 25035 4100f0 74 API calls 25029->25035 25030->25003 25033 41fbb9 25033->25003 25034 41fbd6 25034->25003 25035->25033 25036->25034 25037->25007 25038->25009 25039->25011 25040->25016 25061 41e860 25041->25061 25044 410f67 25046 43cd54 std::_Facet_Register 8 API calls 25044->25046 25045 410f27 25168 41d5f0 8 API calls 2 library calls 25045->25168 25048 410f71 25046->25048 25064 4110f0 25048->25064 25049 410f31 GetModuleFileNameW 25169 41de50 81 API calls CatchGuardHandler 25049->25169 25055 410f60 25170 424370 ExitProcess 25055->25170 25056 410f9a 25058 43c755 CatchGuardHandler 5 API calls 25056->25058 25060 410fb0 25058->25060 25060->24925 25171 41e7a0 GetCurrentProcess OpenProcessToken 25061->25171 25065 411138 ___scrt_fastfail std::bad_exception::bad_exception 25064->25065 25179 422740 25065->25179 25069 411226 25193 427680 25069->25193 25072 41162f 25210 410fc0 25072->25210 25074 41163a 25076 41e340 16 API calls 25074->25076 25078 411683 25074->25078 25075 411278 25075->25072 25083 449cd6 38 API calls std::_Locinfo::_Locinfo_ctor 25075->25083 25084 449b1d 38 API calls 25075->25084 25085 4116b3 25075->25085 25090 4115f7 25075->25090 25076->25078 25082 411a06 25078->25082 25234 40e960 25078->25234 25079 43c755 CatchGuardHandler 5 API calls 25080 410f85 25079->25080 25159 427c70 25080->25159 25268 411dd0 25082->25268 25083->25075 25084->25075 25086 411994 25085->25086 25284 445eec 38 API calls __Getcvt 25085->25284 25316 41d210 81 API calls 25086->25316 25089 4119a8 25317 424370 ExitProcess 25089->25317 25282 41fea0 74 API calls 2 library calls 25090->25282 25283 424370 ExitProcess 25090->25283 25091 4116c9 25091->25086 25285 44312a 39 API calls std::_Locinfo::_Locinfo_ctor 25091->25285 25097 4116de 25286 445eec 38 API calls __Getcvt 25097->25286 25099 4116f2 25099->25086 25287 4430fe 39 API calls std::_Locinfo::_Locinfo_ctor 25099->25287 25101 411707 25288 445eec 38 API calls __Getcvt 25101->25288 25103 41171b 25103->25086 25289 4430fe 39 API calls std::_Locinfo::_Locinfo_ctor 25103->25289 25105 411730 25290 445eec 38 API calls __Getcvt 25105->25290 25107 411744 25107->25086 25291 4430fe 39 API calls std::_Locinfo::_Locinfo_ctor 25107->25291 25109 411759 25292 445eec 38 API calls __Getcvt 25109->25292 25111 41176d 25111->25086 25293 4430fe 39 API calls std::_Locinfo::_Locinfo_ctor 25111->25293 25113 411782 25294 445eec 38 API calls __Getcvt 25113->25294 25115 411796 25115->25086 25295 445eec 38 API calls __Getcvt 25115->25295 25117 4117b5 25117->25086 25296 445eec 38 API calls __Getcvt 25117->25296 25119 4117d4 25119->25086 25297 445eec 38 API calls __Getcvt 25119->25297 25121 4117f3 25121->25086 25298 445eec 38 API calls __Getcvt 25121->25298 25123 411812 25123->25086 25299 445eec 38 API calls __Getcvt 25123->25299 25125 411831 25125->25086 25300 445eec 38 API calls __Getcvt 25125->25300 25127 411850 25127->25086 25301 4430fe 39 API calls std::_Locinfo::_Locinfo_ctor 25127->25301 25129 411865 25302 445eec 38 API calls __Getcvt 25129->25302 25131 411879 25131->25086 25303 4430fe 39 API calls std::_Locinfo::_Locinfo_ctor 25131->25303 25133 41188e 25304 445eec 38 API calls __Getcvt 25133->25304 25135 4118a2 25135->25086 25305 4430fe 39 API calls std::_Locinfo::_Locinfo_ctor 25135->25305 25137 4118b7 25306 445eec 38 API calls __Getcvt 25137->25306 25139 4118cb 25139->25086 25307 4430fe 39 API calls std::_Locinfo::_Locinfo_ctor 25139->25307 25141 4118e0 25308 445eec 38 API calls __Getcvt 25141->25308 25143 4118f4 25143->25086 25309 4430fe 39 API calls std::_Locinfo::_Locinfo_ctor 25143->25309 25145 411909 25310 445eec 38 API calls __Getcvt 25145->25310 25147 41191d 25147->25086 25311 4430fe 39 API calls std::_Locinfo::_Locinfo_ctor 25147->25311 25149 41192e 25312 445eec 38 API calls __Getcvt 25149->25312 25151 411942 25151->25086 25313 4430fe 39 API calls std::_Locinfo::_Locinfo_ctor 25151->25313 25153 411953 25314 445eec 38 API calls __Getcvt 25153->25314 25155 411967 25155->25086 25156 41196e 25155->25156 25315 4430fe 39 API calls std::_Locinfo::_Locinfo_ctor 25156->25315 25158 411978 25158->25079 25160 427c7c 25159->25160 25164 427c90 25159->25164 25766 41d060 83 API calls 25160->25766 25162 427c86 25162->25056 25163 427cc5 CreateDialogParamW 25165 427d26 25163->25165 25167 427ce1 25163->25167 25164->25163 25165->25056 25166 427d10 CreateDialogParamW 25166->25165 25167->25165 25167->25166 25168->25049 25169->25055 25172 41e7c9 GetTokenInformation 25171->25172 25177 41e80a 25171->25177 25173 41e7ec 25172->25173 25172->25177 25175 41e7f4 GetTokenInformation 25173->25175 25174 410f23 25174->25044 25174->25045 25175->25177 25178 41e80e GetSidSubAuthorityCount GetSidSubAuthority 25175->25178 25176 41e84c CloseHandle 25176->25174 25177->25174 25177->25176 25178->25177 25318 40fd30 25179->25318 25184 41cf70 25185 41cfc0 25184->25185 25186 41cf7a GetStdHandle AttachConsole 25184->25186 25185->25069 25187 41cf95 25186->25187 25188 41cf97 25186->25188 25187->25069 25356 41cfd0 GetStdHandle GetFileType 25188->25356 25190 41cf9e 25191 41cfa2 GetStdHandle 25190->25191 25192 41cfab GetStdHandle 25190->25192 25191->25192 25192->25185 25357 43ffb0 25193->25357 25196 427715 CreateFileMappingA 25197 42784e 25196->25197 25198 42773a 25196->25198 25201 42770e 25197->25201 25204 427862 CloseHandle 25197->25204 25198->25197 25200 427743 MapViewOfFile 25198->25200 25199 43c755 CatchGuardHandler 5 API calls 25202 411265 GetCommandLineW 25199->25202 25203 427766 ___scrt_fastfail 25200->25203 25209 427841 25200->25209 25201->25199 25202->25075 25206 42777c GetFileSize 25203->25206 25203->25209 25204->25201 25205 427847 UnmapViewOfFile 25205->25197 25207 4277b4 25206->25207 25206->25209 25207->25209 25359 423340 25207->25359 25209->25197 25209->25205 25211 410fe3 25210->25211 25212 4110d9 25210->25212 25463 41e220 16 API calls 2 library calls 25211->25463 25213 43c755 CatchGuardHandler 5 API calls 25212->25213 25215 4110e6 25213->25215 25215->25074 25216 410fef 25464 449b1d 38 API calls 2 library calls 25216->25464 25218 410ff5 ___scrt_fastfail 25218->25212 25465 41e4d0 12 API calls 25218->25465 25220 411020 ___scrt_fastfail 25220->25212 25221 41103b GetFullPathNameW 25220->25221 25221->25212 25222 411072 25221->25222 25466 449cd6 38 API calls 3 library calls 25222->25466 25224 41107d 25224->25212 25467 449cd6 38 API calls 3 library calls 25224->25467 25226 411094 25226->25212 25468 449b1d 38 API calls 2 library calls 25226->25468 25228 4110ad 25228->25212 25229 4110b4 25228->25229 25469 4472ca 26 API calls 2 library calls 25229->25469 25231 4110bf 25232 43c755 CatchGuardHandler 5 API calls 25231->25232 25233 4110d5 25232->25233 25233->25074 25235 40e9bb ___scrt_fastfail 25234->25235 25236 40e9c7 25235->25236 25237 40e9db 25235->25237 25470 40e5c0 25235->25470 25238 43c755 CatchGuardHandler 5 API calls 25236->25238 25237->25236 25239 422740 27 API calls 25237->25239 25241 40ed0d 25238->25241 25242 40e9f7 25239->25242 25241->25082 25501 40f320 25242->25501 25245 40ea09 25252 40ec9c 25245->25252 25518 420b80 17 API calls 25245->25518 25247 40eb62 25519 40dc30 75 API calls 25247->25519 25249 40eb96 25249->25252 25520 40e860 36 API calls CatchGuardHandler 25249->25520 25251 40ebed 25253 40ec8b 25251->25253 25521 420a60 62 API calls CatchGuardHandler 25251->25521 25528 4227b0 27 API calls error_info_injector 25252->25528 25253->25252 25254 40ecae 25253->25254 25527 40f620 6 API calls CatchGuardHandler 25254->25527 25256 40ec28 25522 40e0f0 51 API calls 2 library calls 25256->25522 25259 40ecb5 25259->25252 25260 40ec45 25260->25253 25523 420820 65 API calls CatchGuardHandler 25260->25523 25262 40ec51 25524 40e0f0 51 API calls 2 library calls 25262->25524 25264 40ec68 25264->25253 25525 420940 65 API calls CatchGuardHandler 25264->25525 25266 40ec74 25526 40e0f0 51 API calls 2 library calls 25266->25526 25269 43ffb0 ___scrt_fastfail 25268->25269 25270 411e11 SHGetSpecialFolderPathW 25269->25270 25271 411e47 25270->25271 25273 411e2b 25270->25273 25272 4221c0 4 API calls 25271->25272 25274 411e71 25272->25274 25275 43c755 CatchGuardHandler 5 API calls 25273->25275 25276 411eb6 25274->25276 25763 422510 MultiByteToWideChar MultiByteToWideChar RegQueryValueExW 25274->25763 25277 411ed7 25275->25277 25765 422040 RegCloseKey 25276->25765 25277->25158 25280 411e8d 25764 4222e0 RegCloseKey 25280->25764 25282->25090 25284->25091 25285->25097 25286->25099 25287->25101 25288->25103 25289->25105 25290->25107 25291->25109 25292->25111 25293->25113 25294->25115 25295->25117 25296->25119 25297->25121 25298->25123 25299->25125 25300->25127 25301->25129 25302->25131 25303->25133 25304->25135 25305->25137 25306->25139 25307->25141 25308->25143 25309->25145 25310->25147 25311->25149 25312->25151 25313->25153 25314->25155 25315->25158 25316->25089 25319 43cd54 std::_Facet_Register 8 API calls 25318->25319 25320 40fd3a 25319->25320 25321 40f840 25320->25321 25328 40ff80 25321->25328 25325 40f8c1 25341 40fa80 25325->25341 25327 40f8d4 25327->25184 25329 43cd54 std::_Facet_Register 8 API calls 25328->25329 25330 40f88f 25329->25330 25331 40fc20 25330->25331 25332 40fc52 25331->25332 25333 40fc4d 25331->25333 25332->25333 25334 40fc81 25332->25334 25335 43cd54 std::_Facet_Register 8 API calls 25333->25335 25336 43cd54 std::_Facet_Register 8 API calls 25334->25336 25338 40fc6b 25334->25338 25335->25338 25336->25338 25339 40fcf9 error_info_injector 25338->25339 25353 4434be 26 API calls 2 library calls 25338->25353 25339->25325 25345 40faa9 error_info_injector 25341->25345 25350 40fb4f 25341->25350 25342 40fbec 25355 40fc10 27 API calls 25342->25355 25345->25342 25346 40fb42 25345->25346 25347 40fb31 25345->25347 25348 40fb5a 25345->25348 25345->25350 25346->25350 25354 4434be 26 API calls 2 library calls 25346->25354 25351 43cd54 std::_Facet_Register 8 API calls 25347->25351 25348->25350 25352 43cd54 std::_Facet_Register 8 API calls 25348->25352 25350->25327 25351->25346 25352->25350 25356->25190 25358 4276c7 GetModuleFileNameW CreateFileW 25357->25358 25358->25196 25358->25201 25366 4227e0 25359->25366 25361 4233cd 25361->25209 25362 423351 25362->25361 25372 44307a 25362->25372 25364 42339e 25364->25361 25376 423280 25364->25376 25367 422817 25366->25367 25368 42282f 25367->25368 25369 40fc20 27 API calls 25367->25369 25370 40fa80 27 API calls 25368->25370 25369->25368 25371 422843 25370->25371 25371->25362 25373 443095 std::_Locinfo::_Locinfo_ctor 25372->25373 25381 441ffd 25373->25381 25377 42329e 25376->25377 25380 42331f 25376->25380 25378 44307a 42 API calls 25377->25378 25377->25380 25457 4233f0 25377->25457 25378->25377 25380->25361 25399 442fd6 25381->25399 25383 44204a 25408 442eff 25383->25408 25385 442024 25406 446b44 20 API calls _free 25385->25406 25386 44200f 25386->25383 25386->25385 25398 442034 25386->25398 25387 442056 25392 442085 25387->25392 25416 44301b 42 API calls 25387->25416 25389 442029 25407 4434ae 26 API calls __cftof 25389->25407 25395 4420f1 25392->25395 25417 442f82 26 API calls 2 library calls 25392->25417 25418 442f82 26 API calls 2 library calls 25395->25418 25396 4421b8 std::_Locinfo::_Locinfo_ctor 25396->25398 25419 446b44 20 API calls _free 25396->25419 25398->25364 25400 442fee 25399->25400 25401 442fdb 25399->25401 25400->25386 25420 446b44 20 API calls _free 25401->25420 25403 442fe0 25421 4434ae 26 API calls __cftof 25403->25421 25405 442feb 25405->25386 25406->25389 25407->25398 25409 442f12 25408->25409 25410 442f1c 25408->25410 25409->25387 25410->25409 25422 44a348 GetLastError 25410->25422 25412 442f3d 25442 44a497 38 API calls __Getcvt 25412->25442 25414 442f56 25443 44a4c4 38 API calls __cftof 25414->25443 25416->25387 25417->25395 25418->25396 25419->25398 25420->25403 25421->25405 25423 44a35e 25422->25423 25424 44a364 25422->25424 25444 44c55b 11 API calls 2 library calls 25423->25444 25428 44a3b3 SetLastError 25424->25428 25445 44c1c2 25424->25445 25428->25412 25429 44a37e 25452 44a4f1 20 API calls _free 25429->25452 25431 44a393 25431->25429 25433 44a39a 25431->25433 25454 44a1ba 20 API calls __Getcvt 25433->25454 25434 44a384 25435 44a3bf SetLastError 25434->25435 25456 447659 38 API calls _abort 25435->25456 25437 44a3a5 25455 44a4f1 20 API calls _free 25437->25455 25441 44a3ac 25441->25428 25441->25435 25442->25414 25443->25409 25444->25424 25450 44c1cf std::_Locinfo::_Locinfo_ctor 25445->25450 25446 44c20f 25449 446b44 _free 19 API calls 25446->25449 25447 44c1fa RtlAllocateHeap 25448 44a376 25447->25448 25447->25450 25448->25429 25453 44c5b1 11 API calls 2 library calls 25448->25453 25449->25448 25450->25446 25450->25447 25451 44776c std::_Facet_Register 7 API calls 25450->25451 25451->25450 25452->25434 25453->25431 25454->25437 25455->25441 25458 43cd54 std::_Facet_Register 8 API calls 25457->25458 25459 423400 _Yarn 25458->25459 25462 423460 27 API calls 2 library calls 25459->25462 25461 423450 25461->25377 25462->25461 25463->25216 25464->25218 25465->25220 25466->25224 25467->25226 25468->25228 25469->25231 25471 40e5f7 ___scrt_fastfail 25470->25471 25529 40de90 25471->25529 25473 40e60d 25474 43c755 CatchGuardHandler 5 API calls 25473->25474 25475 40e625 25474->25475 25475->25237 25476 40e606 ___scrt_fastfail 25476->25473 25545 41f9d0 47 API calls 25476->25545 25478 40e6b1 25479 40e722 25478->25479 25480 40e6bb ___scrt_fastfail 25478->25480 25479->25473 25550 40e440 17 API calls CatchGuardHandler 25479->25550 25546 41fb00 25480->25546 25482 40e739 25482->25473 25551 44304e 42 API calls std::_Locinfo::_Locinfo_ctor 25482->25551 25487 40e704 25487->25482 25489 40e70b 25487->25489 25488 40e74e 25488->25473 25490 40e763 25488->25490 25491 43c755 CatchGuardHandler 5 API calls 25489->25491 25552 40f620 6 API calls CatchGuardHandler 25490->25552 25492 40e71e 25491->25492 25492->25237 25494 40e79c 25495 40e7a0 25494->25495 25496 40e7d4 25494->25496 25499 43c755 CatchGuardHandler 5 API calls 25495->25499 25497 43c755 CatchGuardHandler 5 API calls 25496->25497 25498 40e7f1 25497->25498 25498->25237 25500 40e7d0 25499->25500 25500->25237 25502 4227e0 27 API calls 25501->25502 25503 40f371 25502->25503 25611 40f1f0 25503->25611 25505 40f3d0 25508 40f48a 25505->25508 25627 40f2c0 62 API calls 25505->25627 25507 40f40a 25628 40d610 105 API calls ___scrt_fastfail 25507->25628 25510 43c755 CatchGuardHandler 5 API calls 25508->25510 25511 40f4dd 25510->25511 25511->25245 25512 40f41b 25629 40d8d0 83 API calls CatchGuardHandler 25512->25629 25514 40f477 25515 423340 43 API calls 25514->25515 25516 40f486 25515->25516 25516->25508 25630 40dc70 27 API calls 25516->25630 25518->25247 25519->25249 25520->25251 25521->25256 25522->25260 25523->25262 25524->25264 25525->25266 25526->25253 25527->25259 25528->25236 25530 40decd 25529->25530 25553 41da10 25530->25553 25533 40dee2 25563 4221c0 25533->25563 25535 41da10 12 API calls 25535->25533 25536 40df09 25537 4221c0 4 API calls 25536->25537 25544 40df4d 25536->25544 25538 40df1e 25537->25538 25541 4221c0 4 API calls 25538->25541 25538->25544 25540 40df5e 25540->25476 25542 40df33 25541->25542 25542->25544 25572 422390 25542->25572 25586 422040 RegCloseKey 25544->25586 25545->25478 25601 41fb20 25546->25601 25548 40e6eb 25549 40e0f0 51 API calls 2 library calls 25548->25549 25549->25487 25550->25482 25551->25488 25552->25494 25554 40ded9 25553->25554 25555 41da5e 25553->25555 25554->25533 25554->25535 25556 43c931 5 API calls 25555->25556 25557 41da68 25556->25557 25557->25554 25558 41da74 GetModuleHandleW GetProcAddress 25557->25558 25559 41da9f GetCurrentProcess 25558->25559 25560 41daac 25558->25560 25559->25560 25587 43c8e7 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 25560->25587 25562 41dac0 25562->25554 25564 4221ce 25563->25564 25570 4221d9 25563->25570 25565 4221e7 25564->25565 25566 4221d4 25564->25566 25594 421f70 MultiByteToWideChar 25565->25594 25593 421e60 MultiByteToWideChar 25566->25593 25588 422220 25570->25588 25571 422208 25571->25536 25573 4223ce 25572->25573 25578 4223d9 25572->25578 25574 4223d4 25573->25574 25575 4223dd 25573->25575 25597 421e60 MultiByteToWideChar 25574->25597 25598 421f70 MultiByteToWideChar 25575->25598 25595 4224b0 RegQueryValueExW 25578->25595 25581 422461 25599 421bb0 WideCharToMultiByte WideCharToMultiByte ___scrt_fastfail 25581->25599 25582 422468 25600 421da0 WideCharToMultiByte WideCharToMultiByte ___scrt_fastfail 25582->25600 25585 422446 25585->25544 25586->25540 25587->25562 25589 42222e 25588->25589 25590 422276 RegOpenKeyExW 25589->25590 25591 42224e 25589->25591 25590->25591 25592 422296 RegOpenKeyExW 25590->25592 25591->25571 25592->25591 25593->25570 25594->25570 25596 422442 25595->25596 25596->25581 25596->25582 25596->25585 25597->25578 25598->25578 25599->25585 25600->25585 25602 41fb2d 25601->25602 25603 41fb3f 25601->25603 25609 41f650 75 API calls 25602->25609 25605 41fb43 25603->25605 25610 41f650 75 API calls 25603->25610 25605->25548 25606 41fb38 25606->25548 25608 41fb54 25608->25548 25609->25606 25610->25608 25612 40f220 25611->25612 25615 40f2a4 25612->25615 25616 40f265 25612->25616 25631 40f0c0 25612->25631 25636 40f160 25612->25636 25654 420370 64 API calls CatchGuardHandler 25612->25654 25617 43c755 CatchGuardHandler 5 API calls 25615->25617 25646 40ef10 25616->25646 25620 40f2b7 25617->25620 25620->25505 25622 40f283 25623 40f160 68 API calls 25622->25623 25624 40f28f 25623->25624 25625 43c755 CatchGuardHandler 5 API calls 25624->25625 25626 40f2a0 25625->25626 25626->25505 25627->25507 25628->25512 25629->25514 25630->25508 25632 40ef10 103 API calls 25631->25632 25633 40f0df BuildCatchObjectHelperInternal 25632->25633 25634 40ef10 103 API calls 25633->25634 25635 40f146 25633->25635 25634->25633 25635->25612 25655 40ed60 SHGetSpecialFolderPathW 25636->25655 25639 40f1c0 25642 40f1d2 25639->25642 25643 40f1cb CloseHandle 25639->25643 25640 40f1aa 25640->25639 25641 40f1af ReadFile 25640->25641 25641->25639 25644 43c755 CatchGuardHandler 5 API calls 25642->25644 25643->25642 25645 40f1e1 25644->25645 25645->25612 25647 40ef53 ___scrt_fastfail 25646->25647 25721 40eea0 25647->25721 25649 40ef86 25650 40efb2 CryptAcquireContextA 25649->25650 25653 40efd3 _Yarn 25650->25653 25651 43c755 CatchGuardHandler 5 API calls 25652 40f092 25651->25652 25652->25615 25652->25622 25653->25651 25654->25612 25656 40ed96 25655->25656 25657 40edcc 25656->25657 25659 40edba 25656->25659 25660 40edad 25656->25660 25680 420440 25657->25680 25659->25657 25662 40edbf 25659->25662 25667 4200d0 25660->25667 25679 4202a0 64 API calls 25662->25679 25664 40edb8 ___scrt_fastfail 25665 43c755 CatchGuardHandler 5 API calls 25664->25665 25666 40ee94 CreateFileW 25665->25666 25666->25639 25666->25640 25668 420123 25667->25668 25669 420160 25667->25669 25671 420131 25668->25671 25673 420440 61 API calls 25668->25673 25670 43c931 5 API calls 25669->25670 25672 42016a 25670->25672 25671->25664 25672->25668 25705 41e890 25672->25705 25673->25671 25676 4201b1 25677 41e890 12 API calls 25676->25677 25678 4201e6 25676->25678 25677->25678 25715 43c8e7 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 25678->25715 25679->25664 25681 4204cd 25680->25681 25700 4204a3 25680->25700 25683 43c931 5 API calls 25681->25683 25682 43c755 CatchGuardHandler 5 API calls 25684 4204c6 25682->25684 25685 4204d7 25683->25685 25684->25664 25686 41da10 12 API calls 25685->25686 25685->25700 25687 42050f 25686->25687 25688 420518 25687->25688 25689 41da10 12 API calls 25687->25689 25690 4221c0 4 API calls 25688->25690 25689->25688 25691 42053c 25690->25691 25692 420560 25691->25692 25693 422390 7 API calls 25691->25693 25716 422040 RegCloseKey 25692->25716 25695 42055c 25693->25695 25695->25692 25697 420571 25695->25697 25696 42056d 25720 43c8e7 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 25696->25720 25717 446aa2 39 API calls __Getcvt 25697->25717 25700->25682 25701 4205d3 25719 422040 RegCloseKey 25701->25719 25703 420587 25703->25701 25718 446aa2 39 API calls __Getcvt 25703->25718 25706 41e8c6 25705->25706 25707 41e8a8 25705->25707 25708 43c931 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 25706->25708 25709 41e8b1 GetSystemFirmwareTable 25707->25709 25710 41e8c2 25707->25710 25711 41e8d0 25708->25711 25709->25676 25710->25676 25711->25707 25712 41e8dc GetModuleHandleW GetProcAddress 25711->25712 25713 43c8e7 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 25712->25713 25714 41e902 25713->25714 25714->25707 25715->25668 25716->25696 25717->25703 25718->25703 25719->25696 25720->25700 25722 40eee2 25721->25722 25723 40eeaf 25721->25723 25726 40ef02 25722->25726 25727 40eefb 25722->25727 25733 420770 25723->25733 25725 40eeb9 25728 41fb00 75 API calls 25725->25728 25726->25723 25730 40ef07 25726->25730 25745 420610 25727->25745 25731 40eedb 25728->25731 25757 4206c0 65 API calls CatchGuardHandler 25730->25757 25731->25649 25734 4207cb 25733->25734 25744 4207ad 25733->25744 25736 43c931 5 API calls 25734->25736 25735 43c755 CatchGuardHandler 5 API calls 25737 4207c7 25735->25737 25738 4207d5 25736->25738 25737->25725 25739 420440 61 API calls 25738->25739 25738->25744 25740 4207f0 25739->25740 25758 41f960 25740->25758 25744->25735 25746 42066b 25745->25746 25756 42064d 25745->25756 25748 43c931 5 API calls 25746->25748 25747 43c755 CatchGuardHandler 5 API calls 25749 420667 25747->25749 25750 420675 25748->25750 25749->25725 25751 4200d0 64 API calls 25750->25751 25750->25756 25752 420690 25751->25752 25753 41f960 CryptBinaryToStringA 25752->25753 25754 42069d 25753->25754 25762 43c8e7 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 25754->25762 25756->25747 25757->25725 25759 41f900 CryptBinaryToStringA 25758->25759 25760 41f96f 25759->25760 25761 43c8e7 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 25760->25761 25761->25744 25762->25756 25763->25280 25764->25276 25765->25273 25766->25162 25778 41e090 15 API calls 2 library calls 25767->25778 25769 41e74b 25770 41e781 25769->25770 25772 41e755 25769->25772 25771 43c755 CatchGuardHandler 5 API calls 25770->25771 25773 41e78e 25771->25773 25779 41d9d0 LoadLibraryW 25772->25779 25773->24959 25776 43c755 CatchGuardHandler 5 API calls 25777 41e77d 25776->25777 25777->24959 25778->25769 25780 41d9f2 25779->25780 25781 41d9de GetLastError 25779->25781 25783 41da00 25780->25783 25786 41d950 25780->25786 25796 41d060 83 API calls 25781->25796 25783->25776 25784 41d9ef 25784->25780 25787 41d970 25786->25787 25788 41d988 25786->25788 25790 41d979 SetThreadUILanguage 25787->25790 25791 41d97c SetThreadLocale 25787->25791 25789 43c931 5 API calls 25788->25789 25792 41d992 25789->25792 25790->25791 25791->25783 25792->25787 25793 41d99e GetModuleHandleW GetProcAddress 25792->25793 25797 43c8e7 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 25793->25797 25795 41d9c4 25795->25787 25796->25784 25797->25795 26123 41c8c0 103 API calls 3 library calls 26224 4103c0 75 API calls 5 library calls 26124 4278c0 103 API calls 26195 43baca 8 API calls std::_Facet_Register 26125 4504ca 25 API calls 2 library calls 26126 4194d0 28 API calls __Towlower 26167 4549d4 63 API calls 2 library calls 26168 41cdd0 93 API calls CatchGuardHandler 25839 44b5d6 GetStartupInfoW 25840 44b5f3 25839->25840 25841 44b685 25839->25841 25840->25841 25845 4508ac 25840->25845 25843 44b61c 25843->25841 25844 44b64a GetFileType 25843->25844 25844->25843 25846 4508b8 BuildCatchObjectHelperInternal 25845->25846 25847 4508c5 25846->25847 25848 4508dc 25846->25848 25866 446b44 20 API calls _free 25847->25866 25858 446fd4 EnterCriticalSection 25848->25858 25851 4508ca 25867 4434ae 26 API calls __cftof 25851->25867 25853 450914 25868 45093b LeaveCriticalSection std::_Lockit::~_Lockit 25853->25868 25854 4508d4 std::_Locinfo::_Locinfo_ctor 25854->25843 25855 4508e8 25855->25853 25859 4507fd 25855->25859 25858->25855 25860 44c1c2 __Getcvt 20 API calls 25859->25860 25861 45080f 25860->25861 25865 45081c 25861->25865 25869 44c6db 11 API calls 2 library calls 25861->25869 25863 45086e 25863->25855 25870 44a4f1 20 API calls _free 25865->25870 25866->25851 25867->25854 25868->25854 25869->25861 25870->25863 26129 4528e5 40 API calls 3 library calls 25798 411ee0 89 API calls 26198 412ae0 CreateFileW ReadFile CloseHandle GlobalAlloc 26199 425ae0 74 API calls CatchGuardHandler 26169 44e1e0 21 API calls 26133 44c8ee 10 API calls 2 library calls 26230 44f7e8 27 API calls 4 library calls 26231 40cbee 30 API calls std::_Init_locks::_Init_locks 26232 446bf5 51 API calls 4 library calls 26170 425df0 11 API calls 26136 43c0fb DecodePointer 26077 43cdfa 26078 43ce03 26077->26078 26088 43d6c0 IsProcessorFeaturePresent 26078->26088 26080 43ce0f 26089 440734 10 API calls 3 library calls 26080->26089 26082 43ce14 26087 43ce18 26082->26087 26090 44861c 26082->26090 26085 43ce2f 26088->26080 26089->26082 26094 4505e0 26090->26094 26093 44075d 8 API calls 3 library calls 26093->26087 26097 4505f9 26094->26097 26095 43c755 CatchGuardHandler 5 API calls 26096 43ce21 26095->26096 26096->26085 26096->26093 26097->26095 26137 410880 22 API calls 26200 41be80 29 API calls 26234 41d780 10 API calls 2 library calls 26171 422580 MultiByteToWideChar MultiByteToWideChar 26172 425980 39 API calls 2 library calls 26174 424d80 84 API calls 26235 427380 109 API calls 26236 40cb87 30 API calls 26139 43bc8b 40 API calls _Atexit 26237 43cf89 13 API calls 2 library calls 26203 452695 42 API calls 3 library calls 26240 446f93 12 API calls __wsopen_s 26205 44ca99 FreeLibrary 26206 4106a0 GetStringTypeW __Getwctype 26207 410aa0 83 API calls error_info_injector 26241 4107a0 LCMapStringW __Towlower 26143 4264a0 WideCharToMultiByte WideCharToMultiByte 26144 44c4af 11 API calls 2 library calls 26208 43baa8 4 API calls 2 library calls 26178 4571a8 12 API calls ___crtCompareStringW 24914 410db1 211 API calls _wcsstr 26243 40cbb0 29 API calls 26209 41deb0 25 API calls 26145 4248b0 86 API calls 26146 424cb0 MultiByteToWideChar 26181 426db0 6 API calls CatchGuardHandler 26182 43bdb7 38 API calls 3 library calls 26211 43debb 48 API calls __InternalCxxFrameHandler 26147 43c0ba DeleteCriticalSection 26245 43c7b8 13 API calls 2 library calls

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 301 4533b6-4533e8 call 4532d3 * 2 306 453418-45343a GetProcessHeap RtlAllocateHeap 301->306 307 4533ea-4533f6 call 453337 301->307 308 453457-453464 call 453274 306->308 309 45343c-453455 306->309 313 453404-453411 call 45336b 307->313 314 4533f8-4533fb 307->314 316 4533fd-4533fe ExitProcess 308->316 318 453466-453494 VirtualProtect 308->318 309->308 309->309 313->306 322 453413-453416 313->322 314->313 314->316 320 453496-4534ab 318->320 321 4534ad-4534db VirtualProtect call 414a30 318->321 320->320 320->321 323 4534dd-4534de 321->323 322->306 322->316 323->316
                                                APIs
                                                • ExitProcess.KERNEL32 ref: 004533FE
                                                • GetProcessHeap.KERNEL32(00000000,004245E4), ref: 00453423
                                                • RtlAllocateHeap.NTDLL(00000000), ref: 0045342A
                                                • VirtualProtect.KERNELBASE(0041200C,0044ABC5,0044ABC5,00000000,?,?,-00486124,?,?,?,?,-00486124,-00000065), ref: 0045347E
                                                • VirtualProtect.KERNELBASE(0041200C,?,?,?,?,-00486124,?,?,?,?,-00486124,-00000065), ref: 004534C5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: HeapProcessProtectVirtual$AllocateExit
                                                • String ID: EB
                                                • API String ID: 2060938327-4058845024
                                                • Opcode ID: 81deea08a29ebeaec60e5c8dc44c4c48db2581d802409458ab8179689ba58cf5
                                                • Instruction ID: e0feb5c308cb3caa25c02f5ea7b49341d9319a30fb5a36ef35bdf6d2f62580cc
                                                • Opcode Fuzzy Hash: 81deea08a29ebeaec60e5c8dc44c4c48db2581d802409458ab8179689ba58cf5
                                                • Instruction Fuzzy Hash: F7317A31504605AFC715EF18EC8692ABBE9FB46386714482FF84583232DB34A94ACB58
                                                APIs
                                                  • Part of subcall function 00413650: GlobalAlloc.KERNELBASE(00000000,00000000,00000000), ref: 00413680
                                                • NtQuerySystemInformation.NTDLL(00000005,00000000,00040000,00040000), ref: 00413714
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: AllocGlobalInformationQuerySystem
                                                • String ID:
                                                • API String ID: 3737350999-0
                                                • Opcode ID: af0b5cb85ebff21ad004f17c148dcb155806cd6198d72419ed993a28eb2c6b99
                                                • Instruction ID: 334d9e1f443da80caadcf0951bc2f94e041f7f8f2c1830a0082dfa06546c3c02
                                                • Opcode Fuzzy Hash: af0b5cb85ebff21ad004f17c148dcb155806cd6198d72419ed993a28eb2c6b99
                                                • Instruction Fuzzy Hash: F9511EB5D00209EFCB04DF94D880AEEB7B5BF48305F10859AE915A7341D739AF81CBA5
                                                APIs
                                                • CryptAcquireContextA.ADVAPI32(00000000,?,00000000,00000000,00000020), ref: 0040EFC9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: AcquireContextCrypt
                                                • String ID:
                                                • API String ID: 3951991833-0
                                                • Opcode ID: a4df5b6f4ede578420179da03cefb9d23027186d0e7b98bbade146ea44e7fdde
                                                • Instruction ID: 52c321606cd04c9d9ae63dbcaf6a6a9cd6da9e296a542db86cf50ebfba805cdb
                                                • Opcode Fuzzy Hash: a4df5b6f4ede578420179da03cefb9d23027186d0e7b98bbade146ea44e7fdde
                                                • Instruction Fuzzy Hash: 4C412F719006199BDB309B65DC44BEFB7B8AF09705F0040FAE549E6291EB74AE88CF58

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 0 4110f0-4112fd call 427bd0 call 426cb0 * 3 call 43ffb0 * 2 call 422740 call 41cf70 call 41d580 * 2 call 427680 GetCommandLineW call 41fd30 25 41131c-411327 0->25 26 4112ff-411306 call 41dad0 0->26 28 41132d-41137e 25->28 33 411318-41131a 26->33 34 411308-41130f 26->34 30 411384-411389 28->30 31 41162f-411641 call 410fc0 28->31 35 411390-411397 30->35 40 411643-41167c 31->40 41 411689-411690 31->41 33->28 34->33 37 411311-411316 34->37 35->31 38 41139d-4113ad call 449cd6 35->38 37->28 46 4113af-4113b9 38->46 47 4113be-4113ce call 449cd6 38->47 40->41 43 41167e-411683 call 41e340 40->43 44 4119d1-4119d8 41->44 45 411696-41169e 41->45 43->41 51 411a20-411a22 call 411dd0 44->51 52 4119da-4119e1 44->52 49 4119b2-4119b5 45->49 50 4116a4-4116ae 45->50 53 411617-411629 46->53 64 4113d0-4113f6 47->64 65 4113fb-41140b call 449cd6 47->65 49->44 57 4119b7-4119be 49->57 50->44 59 411a27-411a44 call 43c755 51->59 52->51 58 4119e3-411a01 call 40f690 call 40e960 52->58 53->31 53->35 57->44 61 4119c0-4119cc call 412780 57->61 72 411a06-411a0b 58->72 61->44 64->53 74 41140d-411417 65->74 75 41141c-41142c call 449cd6 65->75 72->51 73 411a0d-411a14 72->73 73->51 76 411a16 73->76 74->53 79 41143d-41144d call 449cd6 75->79 80 41142e-411438 75->80 76->51 83 41144f-411459 79->83 84 41145e-41146e call 449cd6 79->84 80->53 83->53 87 411470-41147a 84->87 88 41147f-41148f call 449cd6 84->88 87->53 91 411491-4114a1 88->91 92 4114a6-4114b6 call 449cd6 88->92 91->53 95 4114d1-4114e1 call 449cd6 92->95 96 4114b8-4114cc 92->96 99 4114e3-4114e9 95->99 100 4114ee-4114fe call 449cd6 95->100 96->53 99->53 103 411500-411506 100->103 104 41150b-41151b call 449cd6 100->104 103->53 107 411528-411538 call 449cd6 104->107 108 41151d-411523 104->108 111 411545-411555 call 449cd6 107->111 112 41153a-411540 107->112 108->53 115 411570-411582 call 449b1d 111->115 116 411557-41156b 111->116 112->53 119 411592-4115a4 call 449b1d 115->119 120 411584-41158d 115->120 116->53 123 4115b1-4115c3 call 449b1d 119->123 124 4115a6-4115af 119->124 120->53 127 4115d3-4115e3 call 449cd6 123->127 128 4115c5-4115cd 123->128 124->53 127->53 133 4115e5-4115f5 call 449cd6 127->133 128->127 132 4116b3-4116b6 128->132 135 411994-4119b0 call 41d210 call 424370 132->135 136 4116bc-4116ce call 445eec 132->136 141 411605-411612 call 412780 call 424370 133->141 142 4115f7-411602 call 41fea0 133->142 135->59 136->135 147 4116d4-4116f7 call 44312a call 445eec 136->147 141->53 142->141 147->135 156 4116fd-411720 call 4430fe call 445eec 147->156 156->135 161 411726-411749 call 4430fe call 445eec 156->161 161->135 166 41174f-411772 call 4430fe call 445eec 161->166 166->135 171 411778-41179b call 4430fe call 445eec 166->171 171->135 176 4117a1-4117ba call 445eec 171->176 176->135 179 4117c0-4117d9 call 445eec 176->179 179->135 182 4117df-4117f8 call 445eec 179->182 182->135 185 4117fe-411817 call 445eec 182->185 185->135 188 41181d-411836 call 445eec 185->188 188->135 191 41183c-411855 call 445eec 188->191 191->135 194 41185b-41187e call 4430fe call 445eec 191->194 194->135 199 411884-4118a7 call 4430fe call 445eec 194->199 199->135 204 4118ad-4118d0 call 4430fe call 445eec 199->204 204->135 209 4118d6-4118f9 call 4430fe call 445eec 204->209 209->135 214 4118ff-411922 call 4430fe call 445eec 209->214 214->135 219 411924-411947 call 4430fe call 445eec 214->219 219->135 224 411949-41196c call 4430fe call 445eec 219->224 224->135 229 41196e-41198f call 4430fe 224->229 229->59
                                                APIs
                                                • std::bad_exception::bad_exception.LIBCMT ref: 00411149
                                                • std::bad_exception::bad_exception.LIBCMT ref: 00411155
                                                • std::bad_exception::bad_exception.LIBCMT ref: 00411161
                                                  • Part of subcall function 0041CF70: GetStdHandle.KERNEL32(000000F5,?,00411226), ref: 0041CF82
                                                  • Part of subcall function 0041CF70: AttachConsole.KERNELBASE(000000FF,?,00411226), ref: 0041CF8B
                                                  • Part of subcall function 00427680: GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000), ref: 004276D8
                                                  • Part of subcall function 00427680: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 004276F4
                                                • GetCommandLineW.KERNEL32(?,?,?,?,7FC866D6), ref: 00411265
                                                  • Part of subcall function 0041D210: WriteConsoleW.KERNEL32(00000000,00000000,0045BC00,00000000,?,?,?,00000001), ref: 0041D2D8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: std::bad_exception::bad_exception$ConsoleFile$AttachCommandCreateHandleLineModuleNameWrite
                                                • String ID: USAGE: /SILENT ... silent install/uninstall /DIR=<dir> ... setup/target dir /NOPROG ... no create program menu /$/AGREE_LICENSE$/DIR=$/DIR= can't be specified$/EXTRACT$/EXTRACT32$/EXTRACT64$/NOAPP$/NODESK$/NOPROG$/NOSUBDIR$/SELFDEL$/SELFDELDIR$/SELFNAME=$/SILENT$/TEMPDIR$/UPDATE$/runas=$FastCopy$L2G$RUNAS format error$Unrecognized option: %s
                                                • API String ID: 1789046948-1587821655
                                                • Opcode ID: 4dc22c19c53dbdfc0d5d3c4913ed5a9b3fd340c5b8850e5b76b64ca44964e9af
                                                • Instruction ID: fc136143c7aa9bc36d5aafab948ea022e67ec151db0c769cb514499d1d4d463a
                                                • Opcode Fuzzy Hash: 4dc22c19c53dbdfc0d5d3c4913ed5a9b3fd340c5b8850e5b76b64ca44964e9af
                                                • Instruction Fuzzy Hash: 6722B5B0B407027BF7149F328D06BD6B694BF11709F14021BE91C662D2EBBEA554CADE

                                                Control-flow Graph

                                                APIs
                                                • SetDllDirectoryW.KERNEL32(00473178), ref: 00410DCC
                                                • SetCurrentDirectoryW.KERNEL32(00000000), ref: 00410DD8
                                                • GetCommandLineW.KERNEL32 ref: 00410DEC
                                                • _wcsstr.LIBVCRUNTIME ref: 00410DFA
                                                • _wcsstr.LIBVCRUNTIME ref: 00410E0C
                                                • _wcsstr.LIBVCRUNTIME ref: 00410E1E
                                                • _wcsstr.LIBVCRUNTIME ref: 00410E30
                                                  • Part of subcall function 0041C610: GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?,00000000), ref: 0041C652
                                                  • Part of subcall function 0041C610: _wcsrchr.LIBVCRUNTIME ref: 0041C699
                                                  • Part of subcall function 0041C610: CopyFileW.KERNEL32(?,?,00000001,?,?,?,?,?,?,?,?,?,00000000), ref: 0041C6CD
                                                  • Part of subcall function 0041C610: GetCommandLineW.KERNEL32(00000000), ref: 0041C723
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: _wcsstr$CommandDirectoryFileLine$CopyCurrentModuleName_wcsrchr
                                                • String ID: /TEMPDIR$/UPDATE$/runas=
                                                • API String ID: 777160178-2186619886
                                                • Opcode ID: a565ea5aa08682e429d3d99ddacc49cc1bbc8efe8a742dc42e0b0f05d376c862
                                                • Instruction ID: 1312d0936fbb3aa7217a0c4e00ff3c464cf7d0e78675756b8126823e94a81325
                                                • Opcode Fuzzy Hash: a565ea5aa08682e429d3d99ddacc49cc1bbc8efe8a742dc42e0b0f05d376c862
                                                • Instruction Fuzzy Hash: 5F01E532A42319178B107B779D06ADF37589E5434BF00842BFC09D2242FB9D9991C2EE

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 262 427680-42770c call 43ffb0 GetModuleFileNameW CreateFileW 265 427715-427734 CreateFileMappingA 262->265 266 42770e-427710 262->266 268 4278b7-4278b9 265->268 269 42773a-42773d 265->269 267 427873-42788e call 43c755 266->267 272 427854-42785b 268->272 269->268 271 427743-427760 MapViewOfFile 269->271 276 427841 271->276 277 427766-427769 271->277 273 42786a-42786c 272->273 274 42785d-427860 272->274 279 427871 273->279 280 42786e 273->280 274->273 278 427862-427865 CloseHandle 274->278 281 427843-427845 276->281 277->276 282 42776f-4277ae call 43ffb0 GetFileSize 277->282 278->273 279->267 280->279 284 427847-427848 UnmapViewOfFile 281->284 285 42784e 281->285 282->276 287 4277b4-4277cb 282->287 284->285 285->272 288 427821-427824 287->288 289 4277cd-4277d2 287->289 292 427829-42782e 288->292 290 427817-42781f 289->290 291 4277d4-4277de 289->291 290->292 293 4277e0-4277e4 291->293 294 427831-42783b 292->294 295 4277e6-4277ef 293->295 296 427804-427815 293->296 294->276 294->287 295->293 297 4277f1-4277fe 295->297 296->294 297->296 298 42788f-4278aa call 423340 297->298 300 4278af-4278b5 298->300 300->281
                                                APIs
                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000), ref: 004276D8
                                                • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 004276F4
                                                • CreateFileMappingA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000000), ref: 00427720
                                                • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000000), ref: 0042774C
                                                • GetFileSize.KERNEL32(?,00000000), ref: 0042778F
                                                • UnmapViewOfFile.KERNEL32(00000000), ref: 00427848
                                                • CloseHandle.KERNELBASE(00000000), ref: 00427863
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: File$CreateView$CloseHandleMappingModuleNameSizeUnmap
                                                • String ID: IP2:
                                                • API String ID: 3748947118-2157472728
                                                • Opcode ID: 2a7e75b40f896a988d7817a46ed4256e8edbaae0c3b269946c3104a64653f880
                                                • Instruction ID: 49b8d75be2bc5bdf15849a1b6d06825087893c506f5fd0dc6444bad7fcb4b5d6
                                                • Opcode Fuzzy Hash: 2a7e75b40f896a988d7817a46ed4256e8edbaae0c3b269946c3104a64653f880
                                                • Instruction Fuzzy Hash: 7051F671F483249BEB20DF64DC89BAEB7B4AB05714F5002BAE609A73C0D7785E44CB49

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 325 41e7a0-41e7c7 GetCurrentProcess OpenProcessToken 326 41e7c9-41e7ea GetTokenInformation 325->326 327 41e83e 325->327 326->327 329 41e7ec-41e808 call 41f130 GetTokenInformation 326->329 328 41e840-41e845 327->328 331 41e853-41e85b 328->331 332 41e847-41e84a 328->332 335 41e80a-41e80c 329->335 336 41e80e-41e82d GetSidSubAuthorityCount GetSidSubAuthority 329->336 332->331 334 41e84c-41e84d CloseHandle 332->334 334->331 337 41e82f-41e831 335->337 336->337 337->328 338 41e833-41e83c call 4432ae 337->338 338->328
                                                APIs
                                                • GetCurrentProcess.KERNEL32(00000008,7FC866D6,?,?,?,00410F23), ref: 0041E7B8
                                                • OpenProcessToken.ADVAPI32(00000000,?,?,?,00410F23), ref: 0041E7BF
                                                • GetTokenInformation.KERNELBASE(00000000,00000019(TokenIntegrityLevel),00000000,00000000,00001000,?,?,?,00410F23), ref: 0041E7E3
                                                • GetTokenInformation.KERNELBASE(00000000,00000019(TokenIntegrityLevel),00410F23,00000000,00000000,?,?,?,00410F23), ref: 0041E804
                                                • GetSidSubAuthorityCount.ADVAPI32(00410F23,?,?,?,00410F23), ref: 0041E810
                                                • GetSidSubAuthority.ADVAPI32(00410F23,?,?,?,?,00410F23), ref: 0041E820
                                                • CloseHandle.KERNELBASE(00000000,?,?,?,00410F23), ref: 0041E84D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: Token$AuthorityInformationProcess$CloseCountCurrentHandleOpen
                                                • String ID:
                                                • API String ID: 3218994068-0
                                                • Opcode ID: f53529b3792091d4b465834e043f0b354b7e9122bf615d9356d2e83c22f7d879
                                                • Instruction ID: f95b51f6ea6b9aa0ae02d55705415acf64bfd0c73e3be738233d33bbd9a1a08f
                                                • Opcode Fuzzy Hash: f53529b3792091d4b465834e043f0b354b7e9122bf615d9356d2e83c22f7d879
                                                • Instruction Fuzzy Hash: 3E219639A00209BBEB20AF56DC44BEF7B79FF44715F14006AFD01A3290D7759E469B58

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 341 41d950-41d96e 342 41d970-41d977 341->342 343 41d988-41d99c call 43c931 341->343 345 41d979-41d97a SetThreadUILanguage 342->345 346 41d97c-41d987 SetThreadLocale 342->346 343->342 348 41d99e-41d9c7 GetModuleHandleW GetProcAddress call 43c8e7 343->348 345->346 348->342
                                                APIs
                                                • SetThreadUILanguage.KERNELBASE(?,0041DA00,?,?), ref: 0041D97A
                                                • SetThreadLocale.KERNEL32(?,0041DA00,?,?), ref: 0041D97D
                                                • GetModuleHandleW.KERNEL32(kernel32,SetThreadUILanguage,0041DA00,?,?), ref: 0041D9A8
                                                • GetProcAddress.KERNEL32(00000000), ref: 0041D9AF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: Thread$AddressHandleLanguageLocaleModuleProc
                                                • String ID: SetThreadUILanguage$kernel32
                                                • API String ID: 1264603166-3100891507
                                                • Opcode ID: 36509777f364e2029dfe97ca6fae5fd78e3771a1fa086f2a688fb69971d4c42d
                                                • Instruction ID: 8226adeb1bb0b7e5bb304b3aed404e840e1121e419c85bdefcb58014e5e125fd
                                                • Opcode Fuzzy Hash: 36509777f364e2029dfe97ca6fae5fd78e3771a1fa086f2a688fb69971d4c42d
                                                • Instruction Fuzzy Hash: 71F0C2F19112049BD710ABBCBC45A9B3768AB1A715B15003BF60D972A1DB3AAC418B9E

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 351 44cb08-44cb21 352 44cb37-44cb3c 351->352 353 44cb23-44cb33 call 44769c 351->353 355 44cb3e-44cb46 352->355 356 44cb49-44cb6d MultiByteToWideChar 352->356 353->352 363 44cb35 353->363 355->356 357 44cd00-44cd13 call 43c755 356->357 358 44cb73-44cb7f 356->358 360 44cb81-44cb92 358->360 361 44cbd3 358->361 364 44cb94-44cba3 call 43d350 360->364 365 44cbb1-44cbc2 call 44a52b 360->365 367 44cbd5-44cbd7 361->367 363->352 370 44ccf5 364->370 377 44cba9-44cbaf 364->377 365->370 378 44cbc8 365->378 367->370 371 44cbdd-44cbf0 MultiByteToWideChar 367->371 375 44ccf7-44ccfe call 43c1c6 370->375 371->370 374 44cbf6-44cc08 call 44c80a 371->374 380 44cc0d-44cc11 374->380 375->357 382 44cbce-44cbd1 377->382 378->382 380->370 383 44cc17-44cc1e 380->383 382->367 384 44cc20-44cc25 383->384 385 44cc58-44cc64 383->385 384->375 386 44cc2b-44cc2d 384->386 387 44cc66-44cc77 385->387 388 44ccb0 385->388 386->370 389 44cc33-44cc4d call 44c80a 386->389 391 44cc92-44cca3 call 44a52b 387->391 392 44cc79-44cc88 call 43d350 387->392 390 44ccb2-44ccb4 388->390 389->375 404 44cc53 389->404 394 44ccb6-44cccf call 44c80a 390->394 395 44ccee-44ccf4 call 43c1c6 390->395 391->395 403 44cca5 391->403 392->395 407 44cc8a-44cc90 392->407 394->395 409 44ccd1-44ccd8 394->409 395->370 408 44ccab-44ccae 403->408 404->370 407->408 408->390 410 44cd14-44cd1a 409->410 411 44ccda-44ccdb 409->411 412 44ccdc-44ccec WideCharToMultiByte 410->412 411->412 412->395 413 44cd1c-44cd23 call 43c1c6 412->413 413->375
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,004452AA,004452AA,?,?,?,0044CD59,00000001,00000001,E6E85006), ref: 0044CB62
                                                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0044CD59,00000001,00000001,E6E85006,?,?,?), ref: 0044CBE8
                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,E6E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044CCE2
                                                • __freea.LIBCMT ref: 0044CCEF
                                                  • Part of subcall function 0044A52B: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0044D1A0,00000000,?,?,?,?,?,?,?,?,00443073,00000000), ref: 0044A55D
                                                • __freea.LIBCMT ref: 0044CCF8
                                                • __freea.LIBCMT ref: 0044CD1D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                • String ID:
                                                • API String ID: 1414292761-0
                                                • Opcode ID: 8d753ce1340f0af89d2a966ec4020b5b9adb12589067db4d0f9f42fdc91f469e
                                                • Instruction ID: bc5c0ab247f1ed717b33575c2fbdfaaacb328a4595e656132f737cafb658a95f
                                                • Opcode Fuzzy Hash: 8d753ce1340f0af89d2a966ec4020b5b9adb12589067db4d0f9f42fdc91f469e
                                                • Instruction Fuzzy Hash: 53510672601206ABFB258F65DCC1EBF77A9EB44754F19422EFD09E6280EB38DC40C658

                                                Control-flow Graph

                                                APIs
                                                • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000028,00000000,?,7FC866D6), ref: 00411E21
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: FolderPathSpecial
                                                • String ID: FastCopy$FastCopy$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                                • API String ID: 994120019-3101997651
                                                • Opcode ID: ba487b168f45413a8825fee989b7b6a5122aa8cd4fb1a0cae90a5357bc6670bf
                                                • Instruction ID: e5671268a5fea9e4b7b1c6c723f7814d25ba322f96064cfd98a15b99f381921a
                                                • Opcode Fuzzy Hash: ba487b168f45413a8825fee989b7b6a5122aa8cd4fb1a0cae90a5357bc6670bf
                                                • Instruction Fuzzy Hash: 4121CC30A40218AFDB24DF50DC86FEAB378EB04704F40456FB909A21D1FF746A49CA99

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 440 41e890-41e8a6 441 41e8c6-41e8da call 43c931 440->441 442 41e8a8-41e8af 440->442 441->442 447 41e8dc-41e905 GetModuleHandleW GetProcAddress call 43c8e7 441->447 444 41e8b1-41e8c1 GetSystemFirmwareTable 442->444 445 41e8c2-41e8c5 442->445 447->442
                                                APIs
                                                • GetSystemFirmwareTable.KERNELBASE(52534D42,00000000,?,?,00000000,?,?,00000000,0045BF04,000000FF), ref: 0041E8BE
                                                • GetModuleHandleW.KERNEL32(kernel32,GetSystemFirmwareTable,00000000,?,?,00000000,0045BF04,000000FF), ref: 0041E8E6
                                                • GetProcAddress.KERNEL32(00000000), ref: 0041E8ED
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: AddressFirmwareHandleModuleProcSystemTable
                                                • String ID: GetSystemFirmwareTable$kernel32
                                                • API String ID: 2688943460-2548160066
                                                • Opcode ID: ee004eb549ff47bb46911af9bd7b4d9b21efb960c69a83896ef83d9e69793226
                                                • Instruction ID: c97b9269743cdf1d1aef064dce0d6cd585d022e47a57241a26c1a3ab13d5e3e3
                                                • Opcode Fuzzy Hash: ee004eb549ff47bb46911af9bd7b4d9b21efb960c69a83896ef83d9e69793226
                                                • Instruction Fuzzy Hash: BBF0C2356403009FDA10AFB9EC49B9A3754AB55B15F10003BFA09CB2A1DB39AC41AA6E

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 450 41cf70-41cf78 451 41cfc0-41cfc6 450->451 452 41cf7a-41cf93 GetStdHandle AttachConsole 450->452 453 41cf95-41cf96 452->453 454 41cf97-41cfa0 call 41cfd0 452->454 457 41cfa2-41cfa6 GetStdHandle 454->457 458 41cfab-41cfbb GetStdHandle 454->458 457->458 458->451
                                                APIs
                                                • GetStdHandle.KERNEL32(000000F5,?,00411226), ref: 0041CF82
                                                • AttachConsole.KERNELBASE(000000FF,?,00411226), ref: 0041CF8B
                                                • GetStdHandle.KERNEL32(000000F5,?,00411226), ref: 0041CFA4
                                                • GetStdHandle.KERNEL32(000000F4,?,00411226), ref: 0041CFAD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: Handle$AttachConsole
                                                • String ID:
                                                • API String ID: 3946486800-0
                                                • Opcode ID: 88bc93c7c3dc68290c0c96fe93f5429619183b7e7465b9d6f7f4fb93eb6618e3
                                                • Instruction ID: 16407302301c7395c512c237f62dbe49345b873898126d683e1e0da521be4782
                                                • Opcode Fuzzy Hash: 88bc93c7c3dc68290c0c96fe93f5429619183b7e7465b9d6f7f4fb93eb6618e3
                                                • Instruction Fuzzy Hash: 79F030319482259ECF646B3ABD445D93B95AB01735B240B3FB134C26F4E63498838B5C

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 459 44c80a-44c838 call 44c32b 462 44c861-44c87b call 44c892 LCMapStringW 459->462 463 44c83a-44c85f LCMapStringEx 459->463 467 44c881-44c88f call 43c755 462->467 463->467
                                                APIs
                                                • LCMapStringEx.KERNELBASE(?,00443EA8,00000010,?,?,004452AA,00000000,?,?,00000000,00000000,?,0041D0B0,00000000,-00486124), ref: 0044C85D
                                                • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,E6E85006,00000001,?,?), ref: 0044C87B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: String
                                                • String ID: LCMapStringEx
                                                • API String ID: 2568140703-3893581201
                                                • Opcode ID: 053775c26a657dccb78ae0c7d16ce851a20d1d7514978fbcfebcc7645542c30a
                                                • Instruction ID: 74e22b018818250540dec4f3d024ae5c2196a676d7d7e5642fd9bf961a14b574
                                                • Opcode Fuzzy Hash: 053775c26a657dccb78ae0c7d16ce851a20d1d7514978fbcfebcc7645542c30a
                                                • Instruction Fuzzy Hash: 05018C36500209BBCF12AF90CC01EEE7F62EF08750F044026FE0525120CB768971EB99

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 512 412f90-412fbb CreateFileW 513 412fc4-412fe1 512->513 514 412fbd-412fbf 512->514 517 412ff3-413029 call 413650 ReadFile 513->517 518 412fe3-412ff1 513->518 515 413051-413054 514->515 522 41303b-41304f CloseHandle 517->522 523 41302b-413039 517->523 518->515 522->515 523->515
                                                APIs
                                                • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,?), ref: 00412FB2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: CreateFile
                                                • String ID:
                                                • API String ID: 823142352-0
                                                • Opcode ID: f2ed564a57136dcdfd9afc14d4280a279a6561515fd8f8e06747ede3fd6620df
                                                • Instruction ID: 8b6ed7d91a51469added2a976593c8c41b361ef093895cf95e6012bd0c9d318a
                                                • Opcode Fuzzy Hash: f2ed564a57136dcdfd9afc14d4280a279a6561515fd8f8e06747ede3fd6620df
                                                • Instruction Fuzzy Hash: 1E31EA75A00108FFCB04DF98C881F9EB7B9EF49310F208199E918AB391D671AE42DB54
                                                APIs
                                                • ExitProcess.KERNEL32 ref: 004533FE
                                                • VirtualProtect.KERNELBASE(0041200C,0044ABC5,0044ABC5,00000000,?,?,-00486124,?,?,?,?,-00486124,-00000065), ref: 0045347E
                                                • VirtualProtect.KERNELBASE(0041200C,?,?,?,?,-00486124,?,?,?,?,-00486124,-00000065), ref: 004534C5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual$ExitProcess
                                                • String ID:
                                                • API String ID: 757691837-0
                                                • Opcode ID: 29053bcdf66999f559eb444738066931aeb31fea29479a80ad0c5827ff869c12
                                                • Instruction ID: 3779c1e5fe8931b58af16acdcec7b29547e3766bd6d4637068053676408edc27
                                                • Opcode Fuzzy Hash: 29053bcdf66999f559eb444738066931aeb31fea29479a80ad0c5827ff869c12
                                                • Instruction Fuzzy Hash: 24116A361041019FC709EF18EC8296E77E9FB46396318482FE84587332D735A846DB5C

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 525 40f160-40f1a8 call 40ed60 CreateFileW 528 40f1c0 525->528 529 40f1aa-40f1ad 525->529 531 40f1c2-40f1c4 528->531 529->528 530 40f1af-40f1be ReadFile 529->530 530->531 532 40f1d2-40f1e4 call 43c755 531->532 533 40f1c6-40f1c9 531->533 533->532 534 40f1cb-40f1cc CloseHandle 533->534 534->532
                                                APIs
                                                  • Part of subcall function 0040ED60: SHGetSpecialFolderPathW.SHELL32(00000000,?,00000023,00000000), ref: 0040ED81
                                                • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 0040F19E
                                                • ReadFile.KERNEL32(00000000,?,?,?,00000000), ref: 0040F1B6
                                                • CloseHandle.KERNEL32(00000000), ref: 0040F1CC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: File$CloseCreateFolderHandlePathReadSpecial
                                                • String ID:
                                                • API String ID: 249527137-0
                                                • Opcode ID: 853e8b92e607af0e5b90fefc338658e3dde266ea588838612b1d436b8fab1b3e
                                                • Instruction ID: fa01f6cbc25e3b8cb8c3156fcf6051c3cda572213449e5ed83e981cb1644a3af
                                                • Opcode Fuzzy Hash: 853e8b92e607af0e5b90fefc338658e3dde266ea588838612b1d436b8fab1b3e
                                                • Instruction Fuzzy Hash: FB01F531A01318A7D7305A29DC45F9FB7689F48B24F100236BD18BB2D0EA349D4A46E9
                                                APIs
                                                  • Part of subcall function 00413650: GlobalAlloc.KERNELBASE(00000000,00000000,00000000), ref: 00413680
                                                  • Part of subcall function 00412BC0: LoadLibraryW.KERNELBASE(?), ref: 00412BF1
                                                • VirtualProtect.KERNELBASE(?,00000000,?,00000000), ref: 004149A5
                                                • VirtualProtect.KERNELBASE(?,00000000,00000000,00000000), ref: 004149D8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual$AllocGlobalLibraryLoad
                                                • String ID:
                                                • API String ID: 2510009449-0
                                                • Opcode ID: 240aa55989c54137efdc20a0ee1ae1ca480df6d3202c4e1da627c4bf8a4fd026
                                                • Instruction ID: 7d0e4552dcc845c019ba505946a745f4ca48045b8816fae346b729283b6f7aa4
                                                • Opcode Fuzzy Hash: 240aa55989c54137efdc20a0ee1ae1ca480df6d3202c4e1da627c4bf8a4fd026
                                                • Instruction Fuzzy Hash: 6D92F7B5E00208EFCB44DF98D991EEEB7B5AF88304F148199E509A7345E635AE81CF94
                                                APIs
                                                • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 0044FEE8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: Info
                                                • String ID:
                                                • API String ID: 1807457897-3916222277
                                                • Opcode ID: 7afba8b55d3488ba715570c5dd0b0bed42bab5df859cfade2121e85ef12322fa
                                                • Instruction ID: f340c0cc391ca2d0465b1bddbf1d0248f1dfe2de6c54524d21e1eca9e67ccfd1
                                                • Opcode Fuzzy Hash: 7afba8b55d3488ba715570c5dd0b0bed42bab5df859cfade2121e85ef12322fa
                                                • Instruction Fuzzy Hash: B4411C7050428C9BEB228E548C84BFABBA9DB46704F1404FFE58A87143D239994ADF25
                                                APIs
                                                • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000023,00000000), ref: 0040ED81
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: FolderPathSpecial
                                                • String ID: FastCopyLab\FastCopy\
                                                • API String ID: 994120019-2627472495
                                                • Opcode ID: d8ef5f93265ef5d9d734ae2ab39bac510f197aa2e39d074298dbfcec71fa741e
                                                • Instruction ID: 9d32c16395f0faa5c18dc5d241280ae51ee29f1d9a3d24980e65306043626ca6
                                                • Opcode Fuzzy Hash: d8ef5f93265ef5d9d734ae2ab39bac510f197aa2e39d074298dbfcec71fa741e
                                                • Instruction Fuzzy Hash: CA311635D0021A96CB24EB15DC85BEAB330EF54304F1009BAE82D771D1E7746EA58AC9
                                                APIs
                                                • GetCurrentProcessId.KERNEL32(7FC866D6,?,?), ref: 004241C7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: CurrentProcess
                                                • String ID: tapp_%d
                                                • API String ID: 2050909247-297970625
                                                • Opcode ID: cdfb01d9f22fbec1b38e9e2a2087e691c8b70f2b603266fe742309b2340c3c80
                                                • Instruction ID: a9140052bc013eab3a6fdb4f78acdd1278dff2a207837cd484f9f6115e79cba6
                                                • Opcode Fuzzy Hash: cdfb01d9f22fbec1b38e9e2a2087e691c8b70f2b603266fe742309b2340c3c80
                                                • Instruction Fuzzy Hash: 72410AB0500705AFD710DF15C459B9ABBF4FF44314F10862EE4198BA80D7B9A598CFD4
                                                APIs
                                                • GetModuleFileNameW.KERNEL32(00000000,00000104,00000104), ref: 00410F4F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: FileModuleName
                                                • String ID: FastCopy
                                                • API String ID: 514040917-3929645458
                                                • Opcode ID: c8863655552205c480adf680288b8279f85946f5e5d04ce576f9092bbb49eab5
                                                • Instruction ID: a78c0bfd507434f41c180f6c11f157e3f6159f7e88261d94356a3ba55a7a07c7
                                                • Opcode Fuzzy Hash: c8863655552205c480adf680288b8279f85946f5e5d04ce576f9092bbb49eab5
                                                • Instruction Fuzzy Hash: 8111C470A84308ABDB20EF65CC46BAE77B4EB04714F00066FB9159B2D1DF7859408B99
                                                APIs
                                                  • Part of subcall function 0044FDEB: GetOEMCP.KERNEL32(00000000,?,?,00450074,?), ref: 0044FE16
                                                • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,004500B9,?,00000000), ref: 0045028C
                                                • GetCPInfo.KERNEL32(00000000,004500B9,?,?,?,004500B9,?,00000000), ref: 0045029F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: CodeInfoPageValid
                                                • String ID:
                                                • API String ID: 546120528-0
                                                • Opcode ID: 48aa889f73fde5d9f53fdfd0012ca96b64e2af6ad5cbf1c911fc539f47b983da
                                                • Instruction ID: 9ecbc4e406435950a58755d66ce0bd6bd4e56992bc4aa5e0c112b3c6c0d1832e
                                                • Opcode Fuzzy Hash: 48aa889f73fde5d9f53fdfd0012ca96b64e2af6ad5cbf1c911fc539f47b983da
                                                • Instruction Fuzzy Hash: 1C5135789003459FEB208F75C8856BFBBE5EF41305F1444AFEC968A253D63C994ACB88
                                                APIs
                                                  • Part of subcall function 0044A348: GetLastError.KERNEL32(?,?,00442F3D,?,-00486124,?,004435EA,00000000,-00486124,?,00000000), ref: 0044A34C
                                                  • Part of subcall function 0044A348: _free.LIBCMT ref: 0044A37F
                                                  • Part of subcall function 0044A348: SetLastError.KERNEL32(00000000,-00486124,?,00000000), ref: 0044A3C0
                                                  • Part of subcall function 0044A348: _abort.LIBCMT ref: 0044A3C6
                                                  • Part of subcall function 00450176: _abort.LIBCMT ref: 004501A8
                                                  • Part of subcall function 00450176: _free.LIBCMT ref: 004501DC
                                                  • Part of subcall function 0044FDEB: GetOEMCP.KERNEL32(00000000,?,?,00450074,?), ref: 0044FE16
                                                • _free.LIBCMT ref: 004500CF
                                                • _free.LIBCMT ref: 00450105
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: _free$ErrorLast_abort
                                                • String ID:
                                                • API String ID: 2991157371-0
                                                • Opcode ID: a4b886dfc6446ff479558324975a859181530649fc601d7036e0eb32f265b5f2
                                                • Instruction ID: 44c8dc2519b5f1fe22a4e896b9567054afe7fd395d80bb34583fc352816edaaa
                                                • Opcode Fuzzy Hash: a4b886dfc6446ff479558324975a859181530649fc601d7036e0eb32f265b5f2
                                                • Instruction Fuzzy Hash: 8D310735800244AFEB10EFA9D481B9DB7E4EF01725F25409FFD049B2A2EB7A5D45CB18
                                                APIs
                                                • CreateDialogParamW.USER32(00000000,?,00000000,00424560,0000065C), ref: 00427CD2
                                                • CreateDialogParamW.USER32(7FC866D6,?,00000000,00424560,0000065C), ref: 00427D1D
                                                  • Part of subcall function 0041D060: GetTickCount.KERNEL32 ref: 0041D070
                                                  • Part of subcall function 0041D060: GetCurrentThreadId.KERNEL32 ref: 0041D08A
                                                  • Part of subcall function 0041D060: OutputDebugStringA.KERNEL32(00000000,?,?,?,?,?,?,?,?,0040D72B), ref: 0041D0D1
                                                  • Part of subcall function 0041D060: WriteConsoleA.KERNEL32(FFFFFFFF,00000000,00000000,0040D72B,00000000,?,?,?,?,?,?,?,?,0040D72B), ref: 0041D0ED
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: CreateDialogParam$ConsoleCountCurrentDebugOutputStringThreadTickWrite
                                                • String ID:
                                                • API String ID: 1709457916-0
                                                • Opcode ID: 8eb65d06854c80bd026900cf9c94b452a61a3a63b1553df82bd4c939347b2476
                                                • Instruction ID: 15598d646d01ead9bdfe16b3ae32fb22ee5f9bb3e7a8bb82bd02d538f2a138ca
                                                • Opcode Fuzzy Hash: 8eb65d06854c80bd026900cf9c94b452a61a3a63b1553df82bd4c939347b2476
                                                • Instruction Fuzzy Hash: 6321D6313186209BD325DB75B800B7B77A5EF80300F64082FE68687751D77AE841CB9C
                                                APIs
                                                • RegOpenKeyExW.KERNELBASE(?,7FC866D6,00000000,?,?,00000000,00000000,?,00422208,00000000,00000000,?,?,?,0040DF09,Software), ref: 0042228C
                                                • RegOpenKeyExW.KERNELBASE(?,7FC866D6,00000000,?,?,?,00422208,00000000,00000000,?,?,?,0040DF09,Software,?,80000002), ref: 004222B8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: Open
                                                • String ID:
                                                • API String ID: 71445658-0
                                                • Opcode ID: 9bde9e4ee27e932945716a3380b01b228df06183be3dbb0729b023b0a0d5cbb5
                                                • Instruction ID: 399dd6e434088c276433afcbd2c229c9f8fe51a1f53e3ddfc47a66a9e059f6ce
                                                • Opcode Fuzzy Hash: 9bde9e4ee27e932945716a3380b01b228df06183be3dbb0729b023b0a0d5cbb5
                                                • Instruction Fuzzy Hash: 2A11E632350218BFE7258E58EC01FBB73ACEB50B10F90852EFA46D6190D7E9F9408764
                                                APIs
                                                • GlobalAlloc.KERNELBASE(00000000,00000000,00000000), ref: 00413680
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: AllocGlobal
                                                • String ID: J!A
                                                • API String ID: 3761449716-252229089
                                                • Opcode ID: 9e5e02ec3ae36198606aa10b822d832cfef97aae54456fdc6b76e3fc24730506
                                                • Instruction ID: f461d7ce4b7e5731e933a860296e4a626b40112df9728b4c47e7a1448f9175b1
                                                • Opcode Fuzzy Hash: 9e5e02ec3ae36198606aa10b822d832cfef97aae54456fdc6b76e3fc24730506
                                                • Instruction Fuzzy Hash: D1F022B8A14208EFCB44DF58D580999B7A5EB48360F10C299AC198B345D631EE81DB94
                                                APIs
                                                  • Part of subcall function 0044C1C2: RtlAllocateHeap.NTDLL(00000008,-00486124,00000000,?,0044A376,00000001,00000364,?,00442F3D,?,-00486124,?,004435EA,00000000,-00486124), ref: 0044C203
                                                • _free.LIBCMT ref: 00450869
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: AllocateHeap_free
                                                • String ID:
                                                • API String ID: 614378929-0
                                                • Opcode ID: 68632b6accfa67c6589bb11ae5d599ee0574b43283875d41925a816431e9d548
                                                • Instruction ID: 59488e23db80046a0a67b0f20c4173f22cbf737649f8d2187ff4cc8a2f01a699
                                                • Opcode Fuzzy Hash: 68632b6accfa67c6589bb11ae5d599ee0574b43283875d41925a816431e9d548
                                                • Instruction Fuzzy Hash: 6B012B762003055BE3219E5A9881D5AFBD9EB85370F250A1EF58443281EA346805C6A8
                                                APIs
                                                • RtlAllocateHeap.NTDLL(00000008,-00486124,00000000,?,0044A376,00000001,00000364,?,00442F3D,?,-00486124,?,004435EA,00000000,-00486124), ref: 0044C203
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: AllocateHeap
                                                • String ID:
                                                • API String ID: 1279760036-0
                                                • Opcode ID: 5319b87e35019527b3a171d8a0a78833a1e69add73ad36924bad9e8b93c17e8c
                                                • Instruction ID: 387ec8851bebc52b237abdb73c08da3c83a64a2c90ace65eb963f4337cd5a631
                                                • Opcode Fuzzy Hash: 5319b87e35019527b3a171d8a0a78833a1e69add73ad36924bad9e8b93c17e8c
                                                • Instruction Fuzzy Hash: 50F02B3154652056FB606B638C81A1B3744BF41B60B0C8067AC05E6241CEB8EC01869D
                                                APIs
                                                • RegQueryValueExW.KERNELBASE(?,FFFFFFFF,00000000,00000001,?,7FC866D6,00000000,?,?,00422442,00000000,00000000,?,7FC866D6), ref: 004224D5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: QueryValue
                                                • String ID:
                                                • API String ID: 3660427363-0
                                                • Opcode ID: 8a21a867a35b328897f923b99d484d3285cd852b88006582c91d65d8edcbfa4f
                                                • Instruction ID: 2bf2986a0d2763897da3f9b84fa5c96cc7dbae943dbf720639d6e3ab8c15ec36
                                                • Opcode Fuzzy Hash: 8a21a867a35b328897f923b99d484d3285cd852b88006582c91d65d8edcbfa4f
                                                • Instruction Fuzzy Hash: 10F0FF76210209BBDB21CF94ED44EEAB7ADEB08310F00856AFD55C6250D772EA60DB94
                                                APIs
                                                • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0044D1A0,00000000,?,?,?,?,?,?,?,?,00443073,00000000), ref: 0044A55D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: AllocateHeap
                                                • String ID:
                                                • API String ID: 1279760036-0
                                                • Opcode ID: f18a210d7fabcd7a56c169cf49c6ba2088eb89eb12ee893d5575ca8dc09e485e
                                                • Instruction ID: 83f9c735561bf47dce41eac88d06de404f8ef7f89711f7e17f4bc5a92a881313
                                                • Opcode Fuzzy Hash: f18a210d7fabcd7a56c169cf49c6ba2088eb89eb12ee893d5575ca8dc09e485e
                                                • Instruction Fuzzy Hash: 32E0E535180621B6FB2077268E0175B76499F417F0F190127BC04E6291CB3CDC2081EF
                                                APIs
                                                  • Part of subcall function 00413650: GlobalAlloc.KERNELBASE(00000000,00000000,00000000), ref: 00413680
                                                • LoadLibraryW.KERNELBASE(?), ref: 00412BF1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: AllocGlobalLibraryLoad
                                                • String ID:
                                                • API String ID: 3361179946-0
                                                • Opcode ID: f0635a325a859858965f79386bc2292b2c6fb1dc49c835a5e9fb86d575d4b663
                                                • Instruction ID: 68c734deace97c9547bdc46c8beefb2551936a8ae2835f7f576d04a2557860a4
                                                • Opcode Fuzzy Hash: f0635a325a859858965f79386bc2292b2c6fb1dc49c835a5e9fb86d575d4b663
                                                • Instruction Fuzzy Hash: 3CE0E579E00108BBCB00DFA8DD4199D7BB89F48205F108159F90897341E531EB518791
                                                APIs
                                                • CoInitialize.OLE32(00000000), ref: 004240EE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: Initialize
                                                • String ID:
                                                • API String ID: 2538663250-0
                                                • Opcode ID: 12131e1421671ee0d7c940b351190fe939cc99e826fb4d5def3e21c9d5349ef3
                                                • Instruction ID: 1fcfdca611d37629bbb0df76c48111eff694d6ac6465704d07cf3cb625e86608
                                                • Opcode Fuzzy Hash: 12131e1421671ee0d7c940b351190fe939cc99e826fb4d5def3e21c9d5349ef3
                                                • Instruction Fuzzy Hash: 73E0CD7050470557D3407B66EC0A74D7BD89F44319F00062DFED8812D1FB796194876F
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: __aullrem
                                                • String ID: """"$3333$DDDD$UUUU$wwww
                                                • API String ID: 3758378126-1454985032
                                                • Opcode ID: 94933d7b4f6dce7e3534b43c6ce3df2fc0142a6a39d71385a232e0db3e27c205
                                                • Instruction ID: 407035f4b4803d1f953a5efa07fa5b6cb056a4ea784015299f4e1767cf74ba53
                                                • Opcode Fuzzy Hash: 94933d7b4f6dce7e3534b43c6ce3df2fc0142a6a39d71385a232e0db3e27c205
                                                • Instruction Fuzzy Hash: 72517274E002699BCF04CFA9E8916AEFBB0FF49300F14815AD915BB315D3799906CBA6
                                                APIs
                                                  • Part of subcall function 0044A348: GetLastError.KERNEL32(?,?,00442F3D,?,-00486124,?,004435EA,00000000,-00486124,?,00000000), ref: 0044A34C
                                                  • Part of subcall function 0044A348: _free.LIBCMT ref: 0044A37F
                                                  • Part of subcall function 0044A348: SetLastError.KERNEL32(00000000,-00486124,?,00000000), ref: 0044A3C0
                                                  • Part of subcall function 0044A348: _abort.LIBCMT ref: 0044A3C6
                                                  • Part of subcall function 0044A348: _free.LIBCMT ref: 0044A3A7
                                                  • Part of subcall function 0044A348: SetLastError.KERNEL32(00000000,-00486124,?,00000000), ref: 0044A3B4
                                                • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 00452CEE
                                                • IsValidCodePage.KERNEL32(00000000), ref: 00452D49
                                                • IsValidLocale.KERNEL32(?,00000001), ref: 00452D58
                                                • GetLocaleInfoW.KERNEL32(?,00001001,00448FAA,00000040,?,004490CA,00000055,00000000,?,?,00000055,00000000), ref: 00452DA0
                                                • GetLocaleInfoW.KERNEL32(?,00001002,0044902A,00000040), ref: 00452DBF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                • String ID: |6F
                                                • API String ID: 745075371-3020504566
                                                • Opcode ID: 0921e32962e1c775b5fa5a85f87d94b92a1d29e2793dd0783e4931349a4cd31a
                                                • Instruction ID: fd1fcad5380488482e06c330b428e01038e31de4d40f227e95b78bc9e51c2a7d
                                                • Opcode Fuzzy Hash: 0921e32962e1c775b5fa5a85f87d94b92a1d29e2793dd0783e4931349a4cd31a
                                                • Instruction Fuzzy Hash: E951A671900205ABDB21DFA5DD45ABF73B8BF06702F04446BED05E7252E7B89E088B69
                                                APIs
                                                • GetLocaleInfoW.KERNEL32(00000000,2000000B,00000000,00000002,00000000,?,?,?,00452D2D,?,00000000), ref: 00452AA7
                                                • GetLocaleInfoW.KERNEL32(00000000,20001004,00000000,00000002,00000000,?,?,?,00452D2D,?,00000000), ref: 00452AD0
                                                • GetACP.KERNEL32(?,?,00452D2D,?,00000000), ref: 00452AE5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: InfoLocale
                                                • String ID: --E$ACP$OCP
                                                • API String ID: 2299586839-3256854490
                                                • Opcode ID: 65d9bb3179b9dfd5199c6c4127b62bbd6708adde3e2c96220b0bfc25e78d7d28
                                                • Instruction ID: 9e2cb8e85154f29def903e404e974f7b4ed5372836a4c2cc1505ab20edc32e59
                                                • Opcode Fuzzy Hash: 65d9bb3179b9dfd5199c6c4127b62bbd6708adde3e2c96220b0bfc25e78d7d28
                                                • Instruction Fuzzy Hash: E221B522B00101A7DB348F54CA04A9773A6EF56B52B168467ED09D7302E7B6DE4AC398
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: __floor_pentium4
                                                • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                • API String ID: 4168288129-2761157908
                                                • Opcode ID: 600f6084088d5b4d5bd7b6b96aa46daa381874a7b7efd3daf6dc496d0a9f6d35
                                                • Instruction ID: 66e90d7675bf020ba9da1383151328b886b5d81187b4c7883042c8eb33c7e065
                                                • Opcode Fuzzy Hash: 600f6084088d5b4d5bd7b6b96aa46daa381874a7b7efd3daf6dc496d0a9f6d35
                                                • Instruction Fuzzy Hash: 2CD26F71E042288FDB25CE28DD407EAB3B5EB85356F1441EBD80DE7241E778AE858F45
                                                APIs
                                                  • Part of subcall function 0044A348: GetLastError.KERNEL32(?,?,00442F3D,?,-00486124,?,004435EA,00000000,-00486124,?,00000000), ref: 0044A34C
                                                  • Part of subcall function 0044A348: _free.LIBCMT ref: 0044A37F
                                                  • Part of subcall function 0044A348: SetLastError.KERNEL32(00000000,-00486124,?,00000000), ref: 0044A3C0
                                                  • Part of subcall function 0044A348: _abort.LIBCMT ref: 0044A3C6
                                                • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00448FB1,?,?,?,?,00448A08,?,00000006), ref: 0045238C
                                                • _wcschr.LIBVCRUNTIME ref: 0045241C
                                                • _wcschr.LIBVCRUNTIME ref: 0045242A
                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00448FB1,00000000,004490D1), ref: 004524CD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                • String ID: |6F
                                                • API String ID: 4212172061-3020504566
                                                • Opcode ID: a4e0d5d045cfdbd8fc936b155a441da6d1c9af4700e5d0b6e555782e193c2162
                                                • Instruction ID: 47768b974a1f7be17f4d854725fb541139c2bb059ba7293febe1aedf56c89812
                                                • Opcode Fuzzy Hash: a4e0d5d045cfdbd8fc936b155a441da6d1c9af4700e5d0b6e555782e193c2162
                                                • Instruction Fuzzy Hash: EA610931600205AAD724AF71CD46BAB7398EF06706F14006FFD05D7282EBBCE908C7A9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Auth$Genu$cAMD$enti$ineI$ntel
                                                • API String ID: 0-1714976780
                                                • Opcode ID: c77623a033a8abfacda9f66ad4af76de5be2dd884c722bfa4f30fc1e450f6a10
                                                • Instruction ID: b0277bcb4c11fcf27d79857274acc09c90c07fbe13848fd3ab292745788dc46f
                                                • Opcode Fuzzy Hash: c77623a033a8abfacda9f66ad4af76de5be2dd884c722bfa4f30fc1e450f6a10
                                                • Instruction Fuzzy Hash: DD31F87BE145160BFB29B838C8853AD61839391330F2AC73BD926F36E5E87C8D814194
                                                APIs
                                                • GetCurrentProcessId.KERNEL32(?,000001A4,00000001), ref: 0041E446
                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0041E452
                                                • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0041E46B
                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0041E490
                                                • CloseHandle.KERNEL32(00000000), ref: 0041E4A2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: Process32$CloseCreateCurrentFirstHandleNextProcessSnapshotToolhelp32
                                                • String ID:
                                                • API String ID: 592884611-0
                                                • Opcode ID: 7e59e4e07fd5113ef0432372c04b36a79a2f7466cb0504c185736072f3a355f3
                                                • Instruction ID: 17c18518249c65d890080ada07daeb844b3145a52f562d6ede5e5493ce8074ad
                                                • Opcode Fuzzy Hash: 7e59e4e07fd5113ef0432372c04b36a79a2f7466cb0504c185736072f3a355f3
                                                • Instruction Fuzzy Hash: 21110B35D0131897D730AB659C48BAEB768DF48725F0402A6ED09A32D1D738CD468AA8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: jG$@$HH$iG
                                                • API String ID: 0-337142849
                                                • Opcode ID: 9e7ef6276b13fb398f65526b6f150b0cd287d6ce167e23f9f9b639d24e04da9c
                                                • Instruction ID: b3eac76d8630454c087f20d8abf30efdd854582e2c8e862270af3f791f4447fd
                                                • Opcode Fuzzy Hash: 9e7ef6276b13fb398f65526b6f150b0cd287d6ce167e23f9f9b639d24e04da9c
                                                • Instruction Fuzzy Hash: 2462AE71E002598FCB18CFA8C5906ADFBF2FF89300F2491AEE855AB341DB799945CB54
                                                APIs
                                                • CryptAcquireContextA.ADVAPI32(00000000,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000000,7FC866D6), ref: 0040E158
                                                Strings
                                                • Microsoft Enhanced RSA and AES Cryptographic Provider, xrefs: 0040E135, 0040E14E
                                                • Microsoft Enhanced RSA and AES Cryptographic Provider (Prototype), xrefs: 0040E12D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: AcquireContextCrypt
                                                • String ID: Microsoft Enhanced RSA and AES Cryptographic Provider$Microsoft Enhanced RSA and AES Cryptographic Provider (Prototype)
                                                • API String ID: 3951991833-3432907261
                                                • Opcode ID: 7a6656eb58b83a501e88466642f7dbf7e6111671403cce33cfcdecd4d3bbad31
                                                • Instruction ID: 1f102a94f756fb90f4d2e735d5ff3e54c282a2bc969c4474a65222f9af746e08
                                                • Opcode Fuzzy Hash: 7a6656eb58b83a501e88466642f7dbf7e6111671403cce33cfcdecd4d3bbad31
                                                • Instruction Fuzzy Hash: 03916C71A002289FDF25CF65CC45BDDBBB5AF49304F0485EAEA08AB290D7749E94CF94
                                                APIs
                                                  • Part of subcall function 0044A348: GetLastError.KERNEL32(?,?,00442F3D,?,-00486124,?,004435EA,00000000,-00486124,?,00000000), ref: 0044A34C
                                                  • Part of subcall function 0044A348: _free.LIBCMT ref: 0044A37F
                                                  • Part of subcall function 0044A348: SetLastError.KERNEL32(00000000,-00486124,?,00000000), ref: 0044A3C0
                                                  • Part of subcall function 0044A348: _abort.LIBCMT ref: 0044A3C6
                                                  • Part of subcall function 0044A348: _free.LIBCMT ref: 0044A3A7
                                                  • Part of subcall function 0044A348: SetLastError.KERNEL32(00000000,-00486124,?,00000000), ref: 0044A3B4
                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004526E9
                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045273A
                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004527FA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ErrorInfoLastLocale$_free$_abort
                                                • String ID:
                                                • API String ID: 2829624132-0
                                                • Opcode ID: ffaf75f295ce85e7e8ed44c0d5aab4c5dc592b649e92e1a95accec9fe31ce12b
                                                • Instruction ID: 3d18a123724a688aa2198eb0804b27019195e71889a034af333853c9d098d4de
                                                • Opcode Fuzzy Hash: ffaf75f295ce85e7e8ed44c0d5aab4c5dc592b649e92e1a95accec9fe31ce12b
                                                • Instruction Fuzzy Hash: 8761C2715402079BEB28AF65CE82B7B77A8EF05302F10417BED01D6282E7BCD949DB58
                                                APIs
                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 004433DC
                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 004433E6
                                                • UnhandledExceptionFilter.KERNEL32(0044A0A3,?,?,?,?,?,00000000), ref: 004433F3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                • String ID:
                                                • API String ID: 3906539128-0
                                                • Opcode ID: a165e2e838e8048909f4e95f3655495299300fee987aef41989b4ca728518909
                                                • Instruction ID: 21279b697b3e8e65d40430b440e322ac1daf376582b29af52f144de37c980351
                                                • Opcode Fuzzy Hash: a165e2e838e8048909f4e95f3655495299300fee987aef41989b4ca728518909
                                                • Instruction Fuzzy Hash: DE31D575D0122C9BCB21DF65DC8978DBBB8BF08311F5041EAE81CA6261EB349F858F48
                                                APIs
                                                • GetCurrentProcess.KERNEL32(0044769B,?,00447A96,0044769B,0047E1F0,0000000C,00447BED,0044769B,00000002,00000000,?,0044769B), ref: 00447AE1
                                                • TerminateProcess.KERNEL32(00000000,?,00447A96,0044769B,0047E1F0,0000000C,00447BED,0044769B,00000002,00000000,?,0044769B), ref: 00447AE8
                                                • ExitProcess.KERNEL32 ref: 00447AFA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: Process$CurrentExitTerminate
                                                • String ID:
                                                • API String ID: 1703294689-0
                                                • Opcode ID: f2b00bbe24a58d09a7f490b20f49f7a9752c64b9b166b5e5895f077b32f7cd32
                                                • Instruction ID: 66884d226cd6908ee03d4072582e596a491f5494560376c94c09ba5f3e314da6
                                                • Opcode Fuzzy Hash: f2b00bbe24a58d09a7f490b20f49f7a9752c64b9b166b5e5895f077b32f7cd32
                                                • Instruction Fuzzy Hash: 33E08C31404608EFEF21AF20DD09A4A3B29EF4079AF108025F805EB232DB39ED43CB58
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: @^G$@^G$K^G
                                                • API String ID: 0-3667819164
                                                • Opcode ID: 42752be6ce5d7947d28470db3839fccd7a8190e57b63e787abee8166e4398b27
                                                • Instruction ID: dcb74a4bd41cfc789d610ca45eadb0594a7f0e5c919e2e6f1e3ac2b84bfba2af
                                                • Opcode Fuzzy Hash: 42752be6ce5d7947d28470db3839fccd7a8190e57b63e787abee8166e4398b27
                                                • Instruction Fuzzy Hash: 7D32F2719087419BC348DF29D88065BFBE1FFC9358F658A2EF489A7320D734A9448F86
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: .
                                                • API String ID: 0-248832578
                                                • Opcode ID: 109dc8de3550e436c2b7cddf23ae251a75f077c561c21a25f3ae8875978694c1
                                                • Instruction ID: 7fc264c81611b34d1d28db67d4ba625c71bb72a272814525e49252ee8ba3836e
                                                • Opcode Fuzzy Hash: 109dc8de3550e436c2b7cddf23ae251a75f077c561c21a25f3ae8875978694c1
                                                • Instruction Fuzzy Hash: 1D310671900249AFEB249E79CC84EFBBBBDDB85304F1401AEF818D7251E6349D498B54
                                                APIs
                                                • CryptBinaryToStringA.CRYPT32(?,00000010,00000001,00000000,00000025), ref: 0041F925
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: BinaryCryptString
                                                • String ID: %
                                                • API String ID: 80407269-2567322570
                                                • Opcode ID: 4a8f9aa07dbcbbb4d91ab63de4a8d1e62c372f3d263184c244958974326e12dd
                                                • Instruction ID: 63b556d1d43833baaee8f91911cb88a93a543c0edf8229bcbf6e2839a119be6e
                                                • Opcode Fuzzy Hash: 4a8f9aa07dbcbbb4d91ab63de4a8d1e62c372f3d263184c244958974326e12dd
                                                • Instruction Fuzzy Hash: 03F02471A0010873DB10EA56EC06EDF77ACCBC5724F00007FF90897240E9B15A5692D9
                                                APIs
                                                • GetLocaleInfoW.KERNEL32(00000000,80000002,00000000,?,?,?,?,?,80000002), ref: 0044C65D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: InfoLocale
                                                • String ID: GetLocaleInfoEx
                                                • API String ID: 2299586839-2904428671
                                                • Opcode ID: 888d28e0e23220c2a2849725c9a281171a4ea3d1c12d3398a340c56cb0ea0184
                                                • Instruction ID: 43edc0971aa6edd81b901cc051b0e80189047587586467722f751319b4cbd0ce
                                                • Opcode Fuzzy Hash: 888d28e0e23220c2a2849725c9a281171a4ea3d1c12d3398a340c56cb0ea0184
                                                • Instruction Fuzzy Hash: D9F0F071B01308BBDB116F61DD02E7E7B64EF44B04F54806AFC0526291DF798D10AB9E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: aa1a064a515151b418c2cf71fa96124600c8b9b236f9e5624687ff340715903a
                                                • Instruction ID: ea90aa5d5f38cc1dffd3cc1aa86b068c5f0230ea2c53253f908d629e204390f9
                                                • Opcode Fuzzy Hash: aa1a064a515151b418c2cf71fa96124600c8b9b236f9e5624687ff340715903a
                                                • Instruction Fuzzy Hash: B8024D71E002199FEF14CFA9C9806AEB7F1FF49314F25826AD819E7341D735AE418B85
                                                APIs
                                                • CryptAcquireContextA.ADVAPI32(0041C54D,00000000,00000000,00000018,F0000020), ref: 004214BF
                                                • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000003,F0000020), ref: 004214D6
                                                  • Part of subcall function 00421500: EnterCriticalSection.KERNEL32(00000000,7FC866D6,?,?,?,000000FF,?,00421651), ref: 00421538
                                                  • Part of subcall function 00421500: LeaveCriticalSection.KERNEL32(00000000,?,000000FF,?,00421651), ref: 00421574
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: AcquireContextCriticalCryptSection$EnterLeave
                                                • String ID:
                                                • API String ID: 2201596401-0
                                                • Opcode ID: 2be582bd4a09cbb5d565e65c21fb2a05c2685d62ff5a176ecc192f6502453fb4
                                                • Instruction ID: b2c1261bb61495dd5567ecdc428636ea79b382e525775839ef03458fc5c1dc7b
                                                • Opcode Fuzzy Hash: 2be582bd4a09cbb5d565e65c21fb2a05c2685d62ff5a176ecc192f6502453fb4
                                                • Instruction Fuzzy Hash: 0511B470740214E7DB20AB69FC4AF5E335CAB25705F50417BFA09E72A0DA6999009B9D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4da689ddc86d4a50b152b55c5ecd8e765e5340b7e0f36ae35751aac68e074203
                                                • Instruction ID: a95d8f68ec4771e499f0d418fb0192c977c9eda7b481b030c40ed5c459e983f3
                                                • Opcode Fuzzy Hash: 4da689ddc86d4a50b152b55c5ecd8e765e5340b7e0f36ae35751aac68e074203
                                                • Instruction Fuzzy Hash: DB23A2B390C7088FD324DEA5D882197F3E1BFD8204F4AC73DE994A7601EBB4A90596C5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ,HH
                                                • API String ID: 0-2393991737
                                                • Opcode ID: 23cc3849220096b89ae33a4c2174ec2f0a3b1cbd002e59204f6e9ef4328e90e8
                                                • Instruction ID: 1ab3bd716f8b3248da6aac54cb9169068c2de84bef128864ee3165ff34426a84
                                                • Opcode Fuzzy Hash: 23cc3849220096b89ae33a4c2174ec2f0a3b1cbd002e59204f6e9ef4328e90e8
                                                • Instruction Fuzzy Hash: 06626EB0E002169FDB14CF59C5846AEBBB1BF48308F29D1AED814AB342C779D946CF94
                                                APIs
                                                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0044DAE3,?,?,00000008,?,?,00456A80,00000000), ref: 0044DD15
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ExceptionRaise
                                                • String ID:
                                                • API String ID: 3997070919-0
                                                • Opcode ID: c7c7725e891025eeee0acebd5be23dc516c0557d5652f40bbea13e70d5dc0789
                                                • Instruction ID: ba4724da440dbae40d750d9fbfc3a1fdb0c5861c1fde8ef59a6c5471ef90a042
                                                • Opcode Fuzzy Hash: c7c7725e891025eeee0acebd5be23dc516c0557d5652f40bbea13e70d5dc0789
                                                • Instruction Fuzzy Hash: CDB14E71A10608DFE715CF28C48AB657BE0FF45364F258659E899CF3A1C339E982CB44
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 5`G
                                                • API String ID: 0-1352942077
                                                • Opcode ID: 4a4270c957540fcc42f8c4b305c371a67e04e3205a9f86bb1aee19d8778dbcad
                                                • Instruction ID: 29a9c21f40011ffbd936625c37afed79026650b67204ff357391fa5feafa45d5
                                                • Opcode Fuzzy Hash: 4a4270c957540fcc42f8c4b305c371a67e04e3205a9f86bb1aee19d8778dbcad
                                                • Instruction Fuzzy Hash: DF02B3B18187818BD705CF38C5416AAF7E0FF95348F14DB1EF994A7212E734A689CB46
                                                APIs
                                                  • Part of subcall function 0044A348: GetLastError.KERNEL32(?,?,00442F3D,?,-00486124,?,004435EA,00000000,-00486124,?,00000000), ref: 0044A34C
                                                  • Part of subcall function 0044A348: _free.LIBCMT ref: 0044A37F
                                                  • Part of subcall function 0044A348: SetLastError.KERNEL32(00000000,-00486124,?,00000000), ref: 0044A3C0
                                                  • Part of subcall function 0044A348: _abort.LIBCMT ref: 0044A3C6
                                                  • Part of subcall function 0044A348: _free.LIBCMT ref: 0044A3A7
                                                  • Part of subcall function 0044A348: SetLastError.KERNEL32(00000000,-00486124,?,00000000), ref: 0044A3B4
                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452939
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ErrorLast$_free$InfoLocale_abort
                                                • String ID:
                                                • API String ID: 1663032902-0
                                                • Opcode ID: a05e2808d0aad3375e9f7fdb90f75d9cab6ee2128226dbe87e470c308685cdc3
                                                • Instruction ID: 5288281195dd0558ef5a9005e13f5f075d3f741b8d8b69286eb37bb9ec8efc43
                                                • Opcode Fuzzy Hash: a05e2808d0aad3375e9f7fdb90f75d9cab6ee2128226dbe87e470c308685cdc3
                                                • Instruction Fuzzy Hash: F321B6B2600206ABDB249F65CD41BBB73A8EF05315F10017BED05D6342EBB89D44DB59
                                                APIs
                                                  • Part of subcall function 0044A348: GetLastError.KERNEL32(?,?,00442F3D,?,-00486124,?,004435EA,00000000,-00486124,?,00000000), ref: 0044A34C
                                                  • Part of subcall function 0044A348: _free.LIBCMT ref: 0044A37F
                                                  • Part of subcall function 0044A348: SetLastError.KERNEL32(00000000,-00486124,?,00000000), ref: 0044A3C0
                                                  • Part of subcall function 0044A348: _abort.LIBCMT ref: 0044A3C6
                                                • EnumSystemLocalesW.KERNEL32(00452695,00000001,00000000,?,00448FAA,?,00452CC2,00000000,?,?,?), ref: 004525DF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                • String ID:
                                                • API String ID: 1084509184-0
                                                • Opcode ID: 992056a111dffc065082c41e4972960a92f5d9580a3d9da185f032c46a74f65b
                                                • Instruction ID: 7120b1b8de8889812730e53d15dcc97e27a9f8c44bfbb35679370cc92cc5893e
                                                • Opcode Fuzzy Hash: 992056a111dffc065082c41e4972960a92f5d9580a3d9da185f032c46a74f65b
                                                • Instruction Fuzzy Hash: 8F118C372003055FDB189F39C9A167AB791FF8132AB14442EED4747B01E7B5B946C744
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: __aullrem
                                                • String ID:
                                                • API String ID: 3758378126-0
                                                • Opcode ID: 32bcddcbb0f57876d42cc29c6b4b474e58285569bfc60d93861ade61fdd6c24f
                                                • Instruction ID: aa9f0b36cffe243bc0c383586418db659a3445d30606054d1a7220af99ce4afd
                                                • Opcode Fuzzy Hash: 32bcddcbb0f57876d42cc29c6b4b474e58285569bfc60d93861ade61fdd6c24f
                                                • Instruction Fuzzy Hash: D101AC727001186BE714CF66EC41EABB79AEFCC310F128129FD04A7241D6B1AD2197E4
                                                APIs
                                                  • Part of subcall function 0044A348: GetLastError.KERNEL32(?,?,00442F3D,?,-00486124,?,004435EA,00000000,-00486124,?,00000000), ref: 0044A34C
                                                  • Part of subcall function 0044A348: _free.LIBCMT ref: 0044A37F
                                                  • Part of subcall function 0044A348: SetLastError.KERNEL32(00000000,-00486124,?,00000000), ref: 0044A3C0
                                                  • Part of subcall function 0044A348: _abort.LIBCMT ref: 0044A3C6
                                                • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,004528B3,00000000,00000000,?), ref: 00452B41
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ErrorLast$InfoLocale_abort_free
                                                • String ID:
                                                • API String ID: 2692324296-0
                                                • Opcode ID: 508c54c8c177b43912c39c81adbd80600cc7d41b7de7a6453091a89205b6e70a
                                                • Instruction ID: 1a12c9176f5697537a32963eccedf0a34c8f42e1ab969b2199ee13d6293a3aa4
                                                • Opcode Fuzzy Hash: 508c54c8c177b43912c39c81adbd80600cc7d41b7de7a6453091a89205b6e70a
                                                • Instruction Fuzzy Hash: DEF07D32A001157FDB245E65CD45BBB7768EB01315F04042FED05A3241EAB8FE45C6DC
                                                APIs
                                                  • Part of subcall function 0044A348: GetLastError.KERNEL32(?,?,00442F3D,?,-00486124,?,004435EA,00000000,-00486124,?,00000000), ref: 0044A34C
                                                  • Part of subcall function 0044A348: _free.LIBCMT ref: 0044A37F
                                                  • Part of subcall function 0044A348: SetLastError.KERNEL32(00000000,-00486124,?,00000000), ref: 0044A3C0
                                                  • Part of subcall function 0044A348: _abort.LIBCMT ref: 0044A3C6
                                                • EnumSystemLocalesW.KERNEL32(004528E5,00000001,00000006,?,00448FAA,?,00452C86,00448FAA,?,?,?,?,?,00448FAA,?,?), ref: 00452654
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                • String ID:
                                                • API String ID: 1084509184-0
                                                • Opcode ID: c0ba92f636020946e6eb4993e2200f11f4c9b49ae34681ce57eac36c9584fd4a
                                                • Instruction ID: e31a53f9b0638ea960390cf4ed884842106cf75b53bf651b6960596dfb9f54be
                                                • Opcode Fuzzy Hash: c0ba92f636020946e6eb4993e2200f11f4c9b49ae34681ce57eac36c9584fd4a
                                                • Instruction Fuzzy Hash: D7F022363003045FDB246F399C91A6A7B94FF82729F05402FFD028B641D6B9AC01C608
                                                APIs
                                                • GetLocalTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,0040E79C), ref: 0040F637
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: LocalTime
                                                • String ID:
                                                • API String ID: 481472006-0
                                                • Opcode ID: c0058c6c02c3ed7ece96fba209971392b529757b3aa28988486f2436cf9b1a9b
                                                • Instruction ID: 8748f48d316d72b309bea25ba8209b7f6d9857cfaba0638c7c6d7617c797735c
                                                • Opcode Fuzzy Hash: c0058c6c02c3ed7ece96fba209971392b529757b3aa28988486f2436cf9b1a9b
                                                • Instruction Fuzzy Hash: 7BF01271A0410D9B8B14EF65DA418FD73A4DB58204F10457A9C0AB6191FA34AE558B95
                                                APIs
                                                  • Part of subcall function 00446FD4: EnterCriticalSection.KERNEL32(-0090B924,?,0044A0E8,?,0047E2B8,00000008,0044A1B6,-00486124,-00486124,?,-00486124,?,00000000), ref: 00446FE3
                                                • EnumSystemLocalesW.KERNEL32(0044C21F,00000001,0047E3C0,0000000C), ref: 0044C29D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: CriticalEnterEnumLocalesSectionSystem
                                                • String ID:
                                                • API String ID: 1272433827-0
                                                • Opcode ID: 4548e947f49409be8e616b4a42067fa84e2bfe5d6d6d1d5a55db095928d18e1b
                                                • Instruction ID: 5327eb8be103c97127a491e66e102bf7b25453b6e1629cb8784895e86d2b465f
                                                • Opcode Fuzzy Hash: 4548e947f49409be8e616b4a42067fa84e2bfe5d6d6d1d5a55db095928d18e1b
                                                • Instruction Fuzzy Hash: 1EF08C32A10704EFEB00EFA9DC06B5C37A1AB09324F00856AF420DB2A1CBB88941CB09
                                                APIs
                                                  • Part of subcall function 0044A348: GetLastError.KERNEL32(?,?,00442F3D,?,-00486124,?,004435EA,00000000,-00486124,?,00000000), ref: 0044A34C
                                                  • Part of subcall function 0044A348: _free.LIBCMT ref: 0044A37F
                                                  • Part of subcall function 0044A348: SetLastError.KERNEL32(00000000,-00486124,?,00000000), ref: 0044A3C0
                                                  • Part of subcall function 0044A348: _abort.LIBCMT ref: 0044A3C6
                                                • EnumSystemLocalesW.KERNEL32(00452479,00000001,00000006,?,?,00452CE4,00448FAA,?,?,?,?,?,00448FAA,?,?,?), ref: 00452559
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                • String ID:
                                                • API String ID: 1084509184-0
                                                • Opcode ID: 2d077b49134461ad3e177e539cf48d332caa93386e6abb78057a3192a309bd25
                                                • Instruction ID: 0aed8c12a51424d524cf40a91c63ddca23b63110a7820a4bd529b3f80c88f504
                                                • Opcode Fuzzy Hash: 2d077b49134461ad3e177e539cf48d332caa93386e6abb78057a3192a309bd25
                                                • Instruction Fuzzy Hash: D2F05536300308A7CB049F76E85566B7F90EFC2B65B0A005BEE058B252D6B9D882C754
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0
                                                • API String ID: 0-4108050209
                                                • Opcode ID: 54c5fcd7b22ae4f7905f209de64bade0d0584be9eddac90626a81f0c70438e1a
                                                • Instruction ID: cf2fb4714997f0e74d8901a5fc95d5e32c9a3900fd6cd5eafa9670710c744ec8
                                                • Opcode Fuzzy Hash: 54c5fcd7b22ae4f7905f209de64bade0d0584be9eddac90626a81f0c70438e1a
                                                • Instruction Fuzzy Hash: 0A517BA1244A845BFF3489B884567BF67D9DBC1304F18091FD582EB382C61CED42935F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: EB
                                                • API String ID: 0-4058845024
                                                • Opcode ID: 7e1a2460ff2deb269224f99021c263a15c4a4d124c1fb3f888e1022cddf892f6
                                                • Instruction ID: 6a93347d0772c4282ee35c739165d75ad50256c7318fdf863a9acf2e0c5f2f17
                                                • Opcode Fuzzy Hash: 7e1a2460ff2deb269224f99021c263a15c4a4d124c1fb3f888e1022cddf892f6
                                                • Instruction Fuzzy Hash: E2E0C232520A519FC7218F29C605713F7E4BF947A2F19886EEC8997612D739E948CF48
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 37bf95ad1b49956eee4b7cc310841e1af362ba3954655cbc4465e83a2fdaa01d
                                                • Instruction ID: 21978241cada3e8faa305e9222fbd3e0fdc3f09c6084ed1a03195d13b451e8a2
                                                • Opcode Fuzzy Hash: 37bf95ad1b49956eee4b7cc310841e1af362ba3954655cbc4465e83a2fdaa01d
                                                • Instruction Fuzzy Hash: B842EE11319B858FC329CE7D889029AFEE26B6A100B4C8A7DE4C6D7B83D515F91DC7E1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fdc5bdfe9c49ed7a395e3ca49c467cd3675301bdce186629b4f020360231ce4f
                                                • Instruction ID: 903373d930cefbc0880684c862f34a8c9deaadfd3342bad0587017b994e5cb52
                                                • Opcode Fuzzy Hash: fdc5bdfe9c49ed7a395e3ca49c467cd3675301bdce186629b4f020360231ce4f
                                                • Instruction Fuzzy Hash: D3323461D29F014DE7239636CD22336A248BFB73C5F15D737F81AB5AAAEB68C4834105
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d9e1dffb9c167f2a1bfd412aa57ca9546c7a865265bd6293c312d3add4af8ce4
                                                • Instruction ID: a7e04f7a097b3304455a4dd99eddf1f1f0ee64f5e8ba51464e5414a710c8c8fb
                                                • Opcode Fuzzy Hash: d9e1dffb9c167f2a1bfd412aa57ca9546c7a865265bd6293c312d3add4af8ce4
                                                • Instruction Fuzzy Hash: 112264735417044BE318CF2FCC81582B3E3AFD822475F857EC926CB696EEB9A61B4548
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: af81b254b35d8647013b9b690b76d24c50b8a6b1e162c157e7fcb7cd7736212d
                                                • Instruction ID: 498a50be9d829e8831ad35f6c09ae71d079e3d3ba44ac3422ffbac47f2d0f2e8
                                                • Opcode Fuzzy Hash: af81b254b35d8647013b9b690b76d24c50b8a6b1e162c157e7fcb7cd7736212d
                                                • Instruction Fuzzy Hash: 9342C0716187458FC348CF29C491A5BFBE2BF8C314F86992EE59ACB251DB30E845CB46
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d6be13c6d50210a6142a0770867933b0d658cad41e8064490dfc23b1fa49c2e2
                                                • Instruction ID: 530754d4f5c1c5516d24a32e6a753ce913d370d41dd851942dc1186af7733544
                                                • Opcode Fuzzy Hash: d6be13c6d50210a6142a0770867933b0d658cad41e8064490dfc23b1fa49c2e2
                                                • Instruction Fuzzy Hash: 5332F872A087458BC714CF69C88061BF7F1BFD8354F458A2DF998A7311EB74E9848B82
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d3d2bace96df991c9bbf8eff9eee7d339d789403f64e7e5114a932755614ef60
                                                • Instruction ID: 8944b274190f983084bb251118d62b6ba1b2f020612e0515f183a3c4d8d15ef8
                                                • Opcode Fuzzy Hash: d3d2bace96df991c9bbf8eff9eee7d339d789403f64e7e5114a932755614ef60
                                                • Instruction Fuzzy Hash: CE22D471E001198BCB14DF68C9807EEF7B5FF89314F24825ED819A7391EB34AA85CB95
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 983508a39290bbdc0a14a9c49db98bd7fe77faf2ad3763c3dd05995955e26843
                                                • Instruction ID: 130500b6a4d22b057562171bc33f9443ed13a47fc9b56b424f0c0d0916206bee
                                                • Opcode Fuzzy Hash: 983508a39290bbdc0a14a9c49db98bd7fe77faf2ad3763c3dd05995955e26843
                                                • Instruction Fuzzy Hash: 1C22CE71A083518FC748DF28D88065BFBE1BFC8358F558A2EF899A7311D774E9448B86
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 22e5b58d81eacbef79955eae6e9d4e4d8818c3fcfcc69c8dc50da3911740d7fd
                                                • Instruction ID: 4f3c533d27854bb29013c4462865122892f68e6eef5a7f643975abfb89382653
                                                • Opcode Fuzzy Hash: 22e5b58d81eacbef79955eae6e9d4e4d8818c3fcfcc69c8dc50da3911740d7fd
                                                • Instruction Fuzzy Hash: B1E14E30314424DFC7289F19E848F6EBBF9EF88716B60045AF586C7252CB399D42DB95
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2ad68ac1da2fc48663c87777dd8f15e0f16bfcdb3b54e6391bba4fd8d785bf47
                                                • Instruction ID: 481c0593de47d68c49b2d2aa8fce330e825971d5d6cf844f408aca30eae67390
                                                • Opcode Fuzzy Hash: 2ad68ac1da2fc48663c87777dd8f15e0f16bfcdb3b54e6391bba4fd8d785bf47
                                                • Instruction Fuzzy Hash: 58F170B19097418FC705CF38C5446AAF7E0BFD9348F189B1EF999A7211E730E9858B86
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: caf49820fa807b94d0f106b97b3a28fc126ac1404d47f7e6d138c94fc9639a5e
                                                • Instruction ID: b9b44a9b6128aefaa2c5fbca0c869b85948a71696589cd33b57c57189b6e8441
                                                • Opcode Fuzzy Hash: caf49820fa807b94d0f106b97b3a28fc126ac1404d47f7e6d138c94fc9639a5e
                                                • Instruction Fuzzy Hash: C3F15C755082118FCB09CF18C4D48FABBF5AF69310F1A82FED8899B3A6D7359981CB51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9db5f5e99c0e2cf70c72e7009468d71799b76a0b68520a13dbf1203c1b9f1949
                                                • Instruction ID: 45cf9cf25b0b3925fc23d2a9fd3168d115f05b362fb3854f2dd8036e59773ccb
                                                • Opcode Fuzzy Hash: 9db5f5e99c0e2cf70c72e7009468d71799b76a0b68520a13dbf1203c1b9f1949
                                                • Instruction Fuzzy Hash: DAE19F71A208188FC708CF1DECA157973E1FB49302745416AF682E7392DB79EA21DF96
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 56a3ad62dab985e4d1f37e210bd85745669cfce5f285a58ea42366cc64121319
                                                • Instruction ID: e0d62ac77eb86f1bc5b15ff5484b2044df181e0689a07b0b23c66bcf203cd096
                                                • Opcode Fuzzy Hash: 56a3ad62dab985e4d1f37e210bd85745669cfce5f285a58ea42366cc64121319
                                                • Instruction Fuzzy Hash: 70E11171A083518FC314DF28D880A5BBBF5BFC9348F554A2EF899A7321D734E9458B86
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 30f1277d5a8c3c77aec790d0348c111311f339a94c1985228c84a2612242991d
                                                • Instruction ID: 5b238b8cde80ef590434112ace3fa5a2e5c0623979dffe439a1a365f63646078
                                                • Opcode Fuzzy Hash: 30f1277d5a8c3c77aec790d0348c111311f339a94c1985228c84a2612242991d
                                                • Instruction Fuzzy Hash: 0E9116B2F053146BD714AA35DC90A6FB5D39BC8300F0A8A3DF86AF7345D978AD1442D5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1ea683574af7d9f6593a00d6064c240e0011c299af65a5fe7c7b800fd6a00b47
                                                • Instruction ID: f8786a4b5bd81001c1776f05b5dd212b7667d39a22995fbd3718aad53ef7704e
                                                • Opcode Fuzzy Hash: 1ea683574af7d9f6593a00d6064c240e0011c299af65a5fe7c7b800fd6a00b47
                                                • Instruction Fuzzy Hash: ACA1FF2271A6C79FC30D8E6D48405A9FF607B7610074887DEE8C5EB783C514EAA9C7E2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7f320af3f0fdc0ed27fd180fefcb6c8c8ea32900801bb2654319e2cd716b47c4
                                                • Instruction ID: d8cc1a648bebecb6fc7fb58e0bfceeae650e5e66508d4c123f76cbd44543ff5e
                                                • Opcode Fuzzy Hash: 7f320af3f0fdc0ed27fd180fefcb6c8c8ea32900801bb2654319e2cd716b47c4
                                                • Instruction Fuzzy Hash: 13614AB1640B0857FE385A6859D2BBF6394DBC1744F28091FE842DF385DA1DED42835E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: caef234aa8e12eea03f80804059b5c66a30f1319b19350332f7bd88dd02b699c
                                                • Instruction ID: 6f4318be4b52005aac0989d886fbc1682381af284dca42337812af0f45ba3c9c
                                                • Opcode Fuzzy Hash: caef234aa8e12eea03f80804059b5c66a30f1319b19350332f7bd88dd02b699c
                                                • Instruction Fuzzy Hash: 55616772200B0467FE349A685892BBF6385FBC1708F60081FE546DB782DB1DDD4A875E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6f586c73bac3fe9c21d22c2ee3b6f2d9012ae9ad5994e8b1ed17511fa7dd5e76
                                                • Instruction ID: 7eb13b7df3363057bc619f5e5248791461f86ac90b34b2e5724c767d3970be86
                                                • Opcode Fuzzy Hash: 6f586c73bac3fe9c21d22c2ee3b6f2d9012ae9ad5994e8b1ed17511fa7dd5e76
                                                • Instruction Fuzzy Hash: 78919670A101259FCF18CF79DC8447EB7F1EB4A301BC681ABE945EB295C638E911CBA4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 90071b4f7eb5a335959c569701d6d625404ef65d2631da024539842673bd38d2
                                                • Instruction ID: 6355e4473cd233166006d096bf52ded002da75ce42549287f71dc62ec743fc2f
                                                • Opcode Fuzzy Hash: 90071b4f7eb5a335959c569701d6d625404ef65d2631da024539842673bd38d2
                                                • Instruction Fuzzy Hash: 9A61E672E101148BD718CF6DFC51366B3A6F7E9310F56833F8855932B0CA756D62CA89
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: af61a7bf3f62f0ad302b68cc2424a7f96668e127692df547e5c1c9c81f72b1b4
                                                • Instruction ID: 2a27d6e2c1384cf6015fdabbf1b09b088dd0ff299dc3ac48496ffe79ca38c33e
                                                • Opcode Fuzzy Hash: af61a7bf3f62f0ad302b68cc2424a7f96668e127692df547e5c1c9c81f72b1b4
                                                • Instruction Fuzzy Hash: EE615EB2B249114BC31CCB28DCA4235B7D1FF8D302705817EE916CB396DF68A960DB94
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e9efb4b21a665edd337b48c14cb1081434ccb0241194add65235abc3b4e8b6ad
                                                • Instruction ID: ac695a9d5f582632563f69f71f4194d530d4c27f35c56cbe90e4b50bf67a3f58
                                                • Opcode Fuzzy Hash: e9efb4b21a665edd337b48c14cb1081434ccb0241194add65235abc3b4e8b6ad
                                                • Instruction Fuzzy Hash: 2C51E473F146104BE748CA69CC9137AB7D3ABC4315F0D857DE6AAC7282DAB8C50AC791
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 63773620c1bbc958270631632036e27bc8fdf67ae08ae388996033c2d1f287e0
                                                • Instruction ID: 04ac7e4d6049e38c4eb2ce7faf3fe014ce37d57fbf1f29e6b199d7ac4d4d92ff
                                                • Opcode Fuzzy Hash: 63773620c1bbc958270631632036e27bc8fdf67ae08ae388996033c2d1f287e0
                                                • Instruction Fuzzy Hash: 12510432B193054BD708CE2DDC9126AB7C2EBC5304F08867CE986DB346DAB9D919C392
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 824c2203f9fb1fa45b330883f59a994bf3ecff877083757ce0705eb8181a3178
                                                • Instruction ID: 035e91453429dba3eaf972e3c4f20be080e4d572245e74a254ba5e4831d6d36d
                                                • Opcode Fuzzy Hash: 824c2203f9fb1fa45b330883f59a994bf3ecff877083757ce0705eb8181a3178
                                                • Instruction Fuzzy Hash: 7351CDF5A105D18FC714CF29ECA0435BBB1BB4A30630845AAE9D197391E276EA21CF96
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4f702d432ce55b235456de9ac390bd1519cf7e68da9b3c32befe7a047617c288
                                                • Instruction ID: e4dc213016ae69c4af6d0ed308e4c648c734ae8a6830be41d569b959b516f1a8
                                                • Opcode Fuzzy Hash: 4f702d432ce55b235456de9ac390bd1519cf7e68da9b3c32befe7a047617c288
                                                • Instruction Fuzzy Hash: 2C416B719083128BC714DF2AC84565BF7E1FFC8314F144D2EE899E7280D779E9458B86
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 366e9b7dcfd3b3b9d4a921d686b8df086239f5aec3d3387713fafe9ea38b6369
                                                • Instruction ID: 9587ee539ac28cb0e782d82634a661afbf1a3677956d4fe3cf9d4f68bc9eab75
                                                • Opcode Fuzzy Hash: 366e9b7dcfd3b3b9d4a921d686b8df086239f5aec3d3387713fafe9ea38b6369
                                                • Instruction Fuzzy Hash: 5F4130612192C69FC30E8E6D48805A6FF646F66100B4886DEECC4EF787C514D6A9C7F6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cc8bd312f3e349f9dad806a753a52897bfbf746fa31be2927ab33105536cb1f1
                                                • Instruction ID: 1bc64aafb0f17a8802c48e0dba6faf43848a2ec450e7c7b4812ce4b7386397f8
                                                • Opcode Fuzzy Hash: cc8bd312f3e349f9dad806a753a52897bfbf746fa31be2927ab33105536cb1f1
                                                • Instruction Fuzzy Hash: E23164612092D29FC71A8E6D48816A6FF64AF66200B4C87DEECC49F787C114D5A8C7F5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: aecfbb0000b8596a95327721a81862697d11fb05f9d644a732aea48e48d4a968
                                                • Instruction ID: 7afe4be8484a056bea242e53f4c35833cb7deafc585f3aae0342aac50de08b1c
                                                • Opcode Fuzzy Hash: aecfbb0000b8596a95327721a81862697d11fb05f9d644a732aea48e48d4a968
                                                • Instruction Fuzzy Hash: F731D472A083009FC748CF2DD88561AF7E5AFC8318F498A2EB999D7351D730D9448B86
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 11eebb7cfaba661fed68b8ce840fa2932926899e4130be5df7d846f9ec35b48f
                                                • Instruction ID: eed80fb6a54759ab7018dd1e656627b4d7db3862adad2f39b09debb5e65cf281
                                                • Opcode Fuzzy Hash: 11eebb7cfaba661fed68b8ce840fa2932926899e4130be5df7d846f9ec35b48f
                                                • Instruction Fuzzy Hash: 1201AD323083134FC7008E3C9A40796BBE5EB96364F15467AE40AE3255E375AD15C790
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6b8f637df2607be9020db41d03dd8198541e46f60173560b77d50ac6b1b40836
                                                • Instruction ID: ebab065df887caa0ee3f39f4d58ced73b40ca3d93af9aad11e8cb252812dba09
                                                • Opcode Fuzzy Hash: 6b8f637df2607be9020db41d03dd8198541e46f60173560b77d50ac6b1b40836
                                                • Instruction Fuzzy Hash: 1EF0B4322053124FD300CE29D640653FBE9EBA6364F11057AF00AD3256C3B59D11CBD0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 064a24ab1cfdd551d807013aefb0a81b7e6aa21002605d6b14b430a091fcdaf8
                                                • Instruction ID: ea8b19540ea35ca10510ced1c198cb5a7d6191b47b8d0a5b87022a85f42c974a
                                                • Opcode Fuzzy Hash: 064a24ab1cfdd551d807013aefb0a81b7e6aa21002605d6b14b430a091fcdaf8
                                                • Instruction Fuzzy Hash: BBE09233A042212B635CD935DC62CBF658687C8210F05CB2EB80392184C8646C1582D6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e5bfa0e5758767135c03b9cfa7ebf1cfc6a497a7f4626eb04003b2b0c40fd88f
                                                • Instruction ID: 61d1875f842735be8a05241bd4e7e21cba1aa0ea045287040abfd64e4b205b3d
                                                • Opcode Fuzzy Hash: e5bfa0e5758767135c03b9cfa7ebf1cfc6a497a7f4626eb04003b2b0c40fd88f
                                                • Instruction Fuzzy Hash: 54D0C27B4051005ADA01D928ED51822B3A1F7E2720F48CD39E081F2124D63D8614A129
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3585cc5e86e4b4f2c0b231822883ac188ad7ac996d5f3a190238e1ab2981f7b1
                                                • Instruction ID: 3aed54436f5767a83b01f55326dea564c088d466d319321e9a1229c6b183aa19
                                                • Opcode Fuzzy Hash: 3585cc5e86e4b4f2c0b231822883ac188ad7ac996d5f3a190238e1ab2981f7b1
                                                • Instruction Fuzzy Hash: DCC04C7595664CEBC711CB89D541A59B7FCE709650F100195EC0893700D5356E109595
                                                APIs
                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 0041CB1D
                                                • CloseHandle.KERNEL32(?), ref: 0041CB33
                                                • CloseHandle.KERNEL32(?), ref: 0041CB3B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: CloseHandle$CreateProcess
                                                • String ID: del /q "%s"$ if %%i%% gtr 10 goto END$ if exist "%s" goto LOOP$ ping 127.0.0.1 -n 2$ rd /q "%s"$ set /a i=i+1$:END$:LOOP$D$cd "%s"$cmd.exe /c "%s"$deldir.bat$rd /s /q "%s"$set i=0$tlib
                                                • API String ID: 2922976086-2169007383
                                                • Opcode ID: 957af1b8c44c711ea2ba51c34fa336142b5a7d040021e4bbc8a6185a0d74a8be
                                                • Instruction ID: 0c0a0788314b7d43f73b850e442758857e74c2a2b0256311aba6ef8d3d72745b
                                                • Opcode Fuzzy Hash: 957af1b8c44c711ea2ba51c34fa336142b5a7d040021e4bbc8a6185a0d74a8be
                                                • Instruction Fuzzy Hash: 1851BC71E4021876DB20E611AC43FEE73685F55704F5441ABB90CB6182FBBC6BC58AAE
                                                APIs
                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 0041CD84
                                                • CloseHandle.KERNEL32(?), ref: 0041CD9A
                                                • CloseHandle.KERNEL32(?), ref: 0041CDA2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: CloseHandle$CreateProcess
                                                • String ID: del /q "%s"$ if %%i%% gtr 10 goto END$ if exist "%s" goto LOOP$ ping 127.0.0.1 -n 2$ set /a i=i+1$:END$:LOOP$D$cd "%s"$cmd.exe /c "%s"$deldir.bat$rd /s /q "%s"$set i=0$tlib
                                                • API String ID: 2922976086-3055506515
                                                • Opcode ID: db24526b645a2aed3e8b58a1a2b4cc5f31dd18a6ab88ae33cd65acc0b10ebcef
                                                • Instruction ID: 1c2cf7d3615497df17d0d6b673d952ef88d997ce94ddaae7b008e3619ffc8289
                                                • Opcode Fuzzy Hash: db24526b645a2aed3e8b58a1a2b4cc5f31dd18a6ab88ae33cd65acc0b10ebcef
                                                • Instruction Fuzzy Hash: 1351DB75E8021876D720E611AC43FEA766C9F55704F1041ABF90CB1182EBBC6BC48BED
                                                APIs
                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?,00000000), ref: 0041C652
                                                • _wcsrchr.LIBVCRUNTIME ref: 0041C699
                                                • CopyFileW.KERNEL32(?,?,00000001,?,?,?,?,?,?,?,?,?,00000000), ref: 0041C6CD
                                                • GetCommandLineW.KERNEL32(00000000), ref: 0041C723
                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000040), ref: 0041C80F
                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000040), ref: 0041C823
                                                • CloseHandle.KERNEL32(?,?,?,00000040), ref: 0041C833
                                                • CloseHandle.KERNEL32(?,?,?,00000040), ref: 0041C839
                                                • GetFileAttributesW.KERNEL32(?,?,?,00000040), ref: 0041C84B
                                                • DeleteFileW.KERNEL32(?,?,?,00000040), ref: 0041C85A
                                                • GetFileAttributesW.KERNEL32(?,?,?,00000040), ref: 0041C868
                                                • RemoveDirectoryW.KERNEL32(?,?,?,00000040), ref: 0041C877
                                                • Sleep.KERNEL32(000001F4,?,?,00000040), ref: 0041C882
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: File$AttributesCloseHandle$CommandCopyCreateDeleteDirectoryLineModuleNameObjectProcessRemoveSingleSleepWait_wcsrchr
                                                • String ID: "%s"$/TEMPDIR$D
                                                • API String ID: 2101136283-116382730
                                                • Opcode ID: 5a63c2984293973916a19ff6f51b608704b562aa10cc16e3d24518d2153c2716
                                                • Instruction ID: 92ebca56a36d1a779d2a7cd5b6707c3296d293630c0e77e40aa1c4bf15cedfcf
                                                • Opcode Fuzzy Hash: 5a63c2984293973916a19ff6f51b608704b562aa10cc16e3d24518d2153c2716
                                                • Instruction Fuzzy Hash: 466180B29043409BD720EB64DC89BDB73E8AF84719F40093EF649D21D1EB74D549CB96
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: _free$Info
                                                • String ID:
                                                • API String ID: 2509303402-0
                                                • Opcode ID: 36082e3037333ac212b2ddb4424394586568033ae9371a7943febd965f4be8a2
                                                • Instruction ID: 9b67b2d0f7a3248fa6c24f03dec9c2a90cadc772078b91b9fd60ca32160ee64a
                                                • Opcode Fuzzy Hash: 36082e3037333ac212b2ddb4424394586568033ae9371a7943febd965f4be8a2
                                                • Instruction Fuzzy Hash: 3DB1AE719002059FEB21DF69C881BEEBBF5BF09304F14406EF998A7242DB79AC458B65
                                                APIs
                                                  • Part of subcall function 0041DD80: CreateFileW.KERNEL32(?,?,?,00000000,?,?,00000000), ref: 0041DDC4
                                                  • Part of subcall function 0041DD80: GetLastError.KERNEL32(?,?,?,00000000,?,?,00000000), ref: 0041DDD1
                                                  • Part of subcall function 0041DD80: CreateFileW.KERNEL32(?,?,?,00000000,?,?,00000000), ref: 0041DE1A
                                                  • Part of subcall function 0041DD80: SetLastError.KERNEL32(00000000), ref: 0041DE28
                                                • GetLastError.KERNEL32(?,7FC866D6), ref: 004273D0
                                                  • Part of subcall function 0041D110: GetTickCount.KERNEL32 ref: 0041D121
                                                  • Part of subcall function 0041D110: GetCurrentThreadId.KERNEL32 ref: 0041D13B
                                                  • Part of subcall function 0041D110: OutputDebugStringW.KERNEL32(00000000), ref: 0041D194
                                                  • Part of subcall function 0041D110: WriteConsoleW.KERNEL32(FFFFFFFF,00000000,00000000,?,00000000), ref: 0041D1BC
                                                • GetFileSize.KERNEL32(00000000,00000000,?,7FC866D6), ref: 004273FC
                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,?,?,?,?,?,?,7FC866D6), ref: 0042745B
                                                • GetLastError.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,?,?,?,?,?,?,7FC866D6), ref: 0042746B
                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,7FC866D6), ref: 00427553
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ErrorFileLast$Create$CloseConsoleCountCurrentDebugHandleOutputSizeStringThreadTickWrite
                                                • String ID:
                                                • API String ID: 895585712-0
                                                • Opcode ID: 8b927ea43518847aa96dd96a360cbee10b756ebb935ca364ed246137ba283ee8
                                                • Instruction ID: 177761a6b83a000391e142aad0615db01089c8d770d0bac769558510628444f1
                                                • Opcode Fuzzy Hash: 8b927ea43518847aa96dd96a360cbee10b756ebb935ca364ed246137ba283ee8
                                                • Instruction Fuzzy Hash: AA512871F443147BDB209B68EC46FAFB3A8EF44B25F500226FA14E32D1DB789D418669
                                                APIs
                                                • ___free_lconv_mon.LIBCMT ref: 004518DC
                                                  • Part of subcall function 00450C2B: _free.LIBCMT ref: 00450C48
                                                  • Part of subcall function 00450C2B: _free.LIBCMT ref: 00450C5A
                                                  • Part of subcall function 00450C2B: _free.LIBCMT ref: 00450C6C
                                                  • Part of subcall function 00450C2B: _free.LIBCMT ref: 00450C7E
                                                  • Part of subcall function 00450C2B: _free.LIBCMT ref: 00450C90
                                                  • Part of subcall function 00450C2B: _free.LIBCMT ref: 00450CA2
                                                  • Part of subcall function 00450C2B: _free.LIBCMT ref: 00450CB4
                                                  • Part of subcall function 00450C2B: _free.LIBCMT ref: 00450CC6
                                                  • Part of subcall function 00450C2B: _free.LIBCMT ref: 00450CD8
                                                  • Part of subcall function 00450C2B: _free.LIBCMT ref: 00450CEA
                                                  • Part of subcall function 00450C2B: _free.LIBCMT ref: 00450CFC
                                                  • Part of subcall function 00450C2B: _free.LIBCMT ref: 00450D0E
                                                  • Part of subcall function 00450C2B: _free.LIBCMT ref: 00450D20
                                                • _free.LIBCMT ref: 004518D1
                                                  • Part of subcall function 0044A4F1: HeapFree.KERNEL32(00000000,00000000,?,00451398,-00486124,00000000,-00486124,00000000,?,0045163C,-00486124,00000007,-00486124,?,00451A30,-00486124), ref: 0044A507
                                                  • Part of subcall function 0044A4F1: GetLastError.KERNEL32(-00486124,?,00451398,-00486124,00000000,-00486124,00000000,?,0045163C,-00486124,00000007,-00486124,?,00451A30,-00486124,-00486124), ref: 0044A519
                                                • _free.LIBCMT ref: 004518F3
                                                • _free.LIBCMT ref: 00451908
                                                • _free.LIBCMT ref: 00451913
                                                • _free.LIBCMT ref: 00451935
                                                • _free.LIBCMT ref: 00451948
                                                • _free.LIBCMT ref: 00451956
                                                • _free.LIBCMT ref: 00451961
                                                • _free.LIBCMT ref: 00451999
                                                • _free.LIBCMT ref: 004519A0
                                                • _free.LIBCMT ref: 004519BD
                                                • _free.LIBCMT ref: 004519D5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                • String ID:
                                                • API String ID: 161543041-0
                                                • Opcode ID: e241acf566adbee0da8335c60fd19b63cad821c1f0fb7a6c6d2bd884e8ac57ca
                                                • Instruction ID: d0763aaf48d098d2705fb4fc9a3ca78186d36ff5918f4299e6b102420546e321
                                                • Opcode Fuzzy Hash: e241acf566adbee0da8335c60fd19b63cad821c1f0fb7a6c6d2bd884e8ac57ca
                                                • Instruction Fuzzy Hash: 06317F715003019FEB20AA79D849B5B73E8EF00355F10941FF948D7262DF79AD99CB29
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: \E$\E
                                                • API String ID: 0-2746232386
                                                • Opcode ID: a4e0cc55af878dfb13149370fddd6ef560a0f1a028f977aab78fe436cd7bc702
                                                • Instruction ID: 38121a2ea5842d315b041485afd8c76dcd42a5e37acd44c829244f58f8e9e1de
                                                • Opcode Fuzzy Hash: a4e0cc55af878dfb13149370fddd6ef560a0f1a028f977aab78fe436cd7bc702
                                                • Instruction Fuzzy Hash: F7C1D270904345AFDB11DFA8D881BAEBBB4AF09315F15419EED00A7393CB389D49CB69
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: _free
                                                • String ID:
                                                • API String ID: 269201875-0
                                                • Opcode ID: 9a03dcda8f28c39caa078d0d97852edccd277a8699b020615718aaf50ac9ff53
                                                • Instruction ID: e1a2d14cca123e39014218d43fd2ed0b0d876a72aa5435c0dea6f9ee707ef9f9
                                                • Opcode Fuzzy Hash: 9a03dcda8f28c39caa078d0d97852edccd277a8699b020615718aaf50ac9ff53
                                                • Instruction Fuzzy Hash: 68C16976E40205AFEB60DB98CC82FEE77F99B08705F140166FE05EB282D57899458B58
                                                APIs
                                                  • Part of subcall function 00455A64: CreateFileW.KERNEL32(00000000,00000000,?,00455DCE,?,?,00000000,?,00455DCE,00000000,0000000C), ref: 00455A81
                                                • GetLastError.KERNEL32 ref: 00455E39
                                                • __dosmaperr.LIBCMT ref: 00455E40
                                                • GetFileType.KERNEL32(00000000), ref: 00455E4C
                                                • GetLastError.KERNEL32 ref: 00455E56
                                                • __dosmaperr.LIBCMT ref: 00455E5F
                                                • CloseHandle.KERNEL32(00000000), ref: 00455E7F
                                                • CloseHandle.KERNEL32(?), ref: 00455FC9
                                                • GetLastError.KERNEL32 ref: 00455FFB
                                                • __dosmaperr.LIBCMT ref: 00456002
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                • String ID: H
                                                • API String ID: 4237864984-2852464175
                                                • Opcode ID: 2d7b23edbf5f7c10672aacbbaa71b6006bd9b3a5e1c4bba1cad64c92333131bf
                                                • Instruction ID: c96aef165f07415c1d648542ce398c265d31266bcb11b17f428104075235ae67
                                                • Opcode Fuzzy Hash: 2d7b23edbf5f7c10672aacbbaa71b6006bd9b3a5e1c4bba1cad64c92333131bf
                                                • Instruction Fuzzy Hash: 6CA13532A106548FDF19DF68D8927BE7BA0EB06325F18015EEC02DB392C7389D1AC759
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: _free
                                                • String ID: <YH$<YH$@YH
                                                • API String ID: 269201875-1962219393
                                                • Opcode ID: 40bb283a1cc13c8afdc41f955a5273fcb5e8ef8fb8b02b78132a99fdcf0e3020
                                                • Instruction ID: 3d74657f5b639414bcfd657e8bbcd51f5a55aa9c50066278d76c0e1eb4163688
                                                • Opcode Fuzzy Hash: 40bb283a1cc13c8afdc41f955a5273fcb5e8ef8fb8b02b78132a99fdcf0e3020
                                                • Instruction Fuzzy Hash: F161E231900205AFEB20DF69C882B9EBBF5EF04310F1445ABFD45EB292D7789D458B58
                                                APIs
                                                • SetDllDirectoryW.KERNEL32(00473178), ref: 00410DCC
                                                • SetCurrentDirectoryW.KERNEL32(00000000), ref: 00410DD8
                                                • GetCommandLineW.KERNEL32 ref: 00410DEC
                                                • _wcsstr.LIBVCRUNTIME ref: 00410DFA
                                                • _wcsstr.LIBVCRUNTIME ref: 00410E0C
                                                • _wcsstr.LIBVCRUNTIME ref: 00410E1E
                                                • _wcsstr.LIBVCRUNTIME ref: 00410E30
                                                  • Part of subcall function 0041C610: GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?,00000000), ref: 0041C652
                                                  • Part of subcall function 0041C610: _wcsrchr.LIBVCRUNTIME ref: 0041C699
                                                  • Part of subcall function 0041C610: CopyFileW.KERNEL32(?,?,00000001,?,?,?,?,?,?,?,?,?,00000000), ref: 0041C6CD
                                                  • Part of subcall function 0041C610: GetCommandLineW.KERNEL32(00000000), ref: 0041C723
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: _wcsstr$CommandDirectoryFileLine$CopyCurrentModuleName_wcsrchr
                                                • String ID: /TEMPDIR$/UPDATE$/runas=
                                                • API String ID: 777160178-2186619886
                                                • Opcode ID: 26c7d2cec480a5dd383deabdaaf2af28292a8e3e6deb2b4db833de097a1664dd
                                                • Instruction ID: b922d73480ca559a4f1cbc01fddd249b2f3b04925782a9b3c0b7e2709873db7a
                                                • Opcode Fuzzy Hash: 26c7d2cec480a5dd383deabdaaf2af28292a8e3e6deb2b4db833de097a1664dd
                                                • Instruction Fuzzy Hash: B1F06D32A8271422961137779D07BDF37588C6574BF04483BFC09D0282F6CC9A9281AF
                                                APIs
                                                • _free.LIBCMT ref: 0044A268
                                                  • Part of subcall function 0044A4F1: HeapFree.KERNEL32(00000000,00000000,?,00451398,-00486124,00000000,-00486124,00000000,?,0045163C,-00486124,00000007,-00486124,?,00451A30,-00486124), ref: 0044A507
                                                  • Part of subcall function 0044A4F1: GetLastError.KERNEL32(-00486124,?,00451398,-00486124,00000000,-00486124,00000000,?,0045163C,-00486124,00000007,-00486124,?,00451A30,-00486124,-00486124), ref: 0044A519
                                                • _free.LIBCMT ref: 0044A274
                                                • _free.LIBCMT ref: 0044A27F
                                                • _free.LIBCMT ref: 0044A28A
                                                • _free.LIBCMT ref: 0044A295
                                                • _free.LIBCMT ref: 0044A2A0
                                                • _free.LIBCMT ref: 0044A2AB
                                                • _free.LIBCMT ref: 0044A2B6
                                                • _free.LIBCMT ref: 0044A2C1
                                                • _free.LIBCMT ref: 0044A2CF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: 8c39027cbba713273718d996808573781ef20b2d876756b33561af9143ea92d8
                                                • Instruction ID: 18b08fc394aa40bd2b77af4edf73a090bb28494c9ddb0c56b274b923a1bc596c
                                                • Opcode Fuzzy Hash: 8c39027cbba713273718d996808573781ef20b2d876756b33561af9143ea92d8
                                                • Instruction Fuzzy Hash: DF11E676141058BFDB01EF5AC856CDD3BA5EF04354B4150AAFB088F232DA75EEA09B86
                                                APIs
                                                • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000024,00000000), ref: 0041DB5C
                                                • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001C,00000000,?,?), ref: 0041DC9F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: FolderPathSpecial
                                                • String ID: (x86)$#$$$&$*$\VirtualStore%s
                                                • API String ID: 994120019-4086142128
                                                • Opcode ID: fe9f88afd0057b3d1beff9e7f32121fd1cb7701e0ee6e332a388b7a6d522fc26
                                                • Instruction ID: aa3230fd2c7ec7d7197a8b00ce64965695e44b2594fcb6094d41e63a889dd173
                                                • Opcode Fuzzy Hash: fe9f88afd0057b3d1beff9e7f32121fd1cb7701e0ee6e332a388b7a6d522fc26
                                                • Instruction Fuzzy Hash: BF5114B5E002149ACB209F54EC487EBB3B4EF55354F1109ABD809A7280EB79ADC5CBD8
                                                APIs
                                                  • Part of subcall function 0044A348: GetLastError.KERNEL32(?,?,00442F3D,?,-00486124,?,004435EA,00000000,-00486124,?,00000000), ref: 0044A34C
                                                  • Part of subcall function 0044A348: _free.LIBCMT ref: 0044A37F
                                                  • Part of subcall function 0044A348: SetLastError.KERNEL32(00000000,-00486124,?,00000000), ref: 0044A3C0
                                                  • Part of subcall function 0044A348: _abort.LIBCMT ref: 0044A3C6
                                                • _memcmp.LIBVCRUNTIME ref: 00449961
                                                • _free.LIBCMT ref: 004499D2
                                                • _free.LIBCMT ref: 004499EB
                                                • _free.LIBCMT ref: 00449A1D
                                                • _free.LIBCMT ref: 00449A26
                                                • _free.LIBCMT ref: 00449A32
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: _free$ErrorLast$_abort_memcmp
                                                • String ID: C
                                                • API String ID: 1679612858-1037565863
                                                • Opcode ID: 2aed541aef3411419980d53fddfb84edd90178823ed0385a40bc13b0f96fc7fa
                                                • Instruction ID: 77749b77856741a2bf16b1759a04f7d373e2cac00915cc106974636258728ff9
                                                • Opcode Fuzzy Hash: 2aed541aef3411419980d53fddfb84edd90178823ed0385a40bc13b0f96fc7fa
                                                • Instruction Fuzzy Hash: 7DB15975A01229DFEB24DF18C885AAEB7B4FF48304F1045AEE909A7350E735AE90CF45
                                                APIs
                                                • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00455639,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00454F06
                                                • __fassign.LIBCMT ref: 00454F81
                                                • __fassign.LIBCMT ref: 00454F9C
                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00454FC2
                                                • WriteFile.KERNEL32(?,00000000,00000000,00455639,00000000,?,?,?,?,?,?,?,?,?,00455639,00000000), ref: 00454FE1
                                                • WriteFile.KERNEL32(?,00000000,00000001,00455639,00000000,?,?,?,?,?,?,?,?,?,00455639,00000000), ref: 0045501A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                • String ID:
                                                • API String ID: 1324828854-0
                                                • Opcode ID: c8aebabe6f21adf80fb062b6d6bd38b25ad54b60e1c6b3fa23249dd0b9240746
                                                • Instruction ID: 94c0d3ccf81f98fbbbdfeb9775e17126659faa4811651160f403aa36165e293a
                                                • Opcode Fuzzy Hash: c8aebabe6f21adf80fb062b6d6bd38b25ad54b60e1c6b3fa23249dd0b9240746
                                                • Instruction Fuzzy Hash: 6E51E3719002099FCB10CFA8D895AEEBBF4FF09701F18412BE956E7292D7349945CBA9
                                                APIs
                                                • std::_Lockit::_Lockit.LIBCPMT ref: 004103ED
                                                • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0041043C
                                                  • Part of subcall function 0043BC03: _Yarn.LIBCPMT ref: 0043BC22
                                                  • Part of subcall function 0043BC03: _Yarn.LIBCPMT ref: 0043BC46
                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0041046E
                                                • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 004104A6
                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 0041053A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: std::_$Locinfo::_LockitYarn$Exception@8Locinfo_ctorLocinfo_dtorLockit::_Lockit::~_Throw
                                                • String ID: bad locale name
                                                • API String ID: 3244628736-1405518554
                                                • Opcode ID: bfed77743ca5484e5ad16091644337873f9ba8fe80d53a870fd602ff43613d1a
                                                • Instruction ID: 0b47d3dcdc5a6a03506649fc6ed4a6375d1a5f838ce0120b86682906bd57ee4b
                                                • Opcode Fuzzy Hash: bfed77743ca5484e5ad16091644337873f9ba8fe80d53a870fd602ff43613d1a
                                                • Instruction Fuzzy Hash: 0C41B3B19007449FE720EF66C801B47B7E8EB04714F00892EE84AD7B81E7B9E604CB99
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: _free
                                                • String ID: bcrypt.dll
                                                • API String ID: 269201875-1107098536
                                                • Opcode ID: e42a761f8bbe03379a11fdac8b8c64394205dd6ee07a1fcd5abc616919286c9d
                                                • Instruction ID: 7c59deeafc3f393370ab6ad3a8db410d3be559959923bbd3e15428130d3cfe58
                                                • Opcode Fuzzy Hash: e42a761f8bbe03379a11fdac8b8c64394205dd6ee07a1fcd5abc616919286c9d
                                                • Instruction Fuzzy Hash: 94412436A002009FDB20DF78C884A6EB3B5EF89714F11456EEA15EB341EB35ED02CB84
                                                APIs
                                                • _ValidateLocalCookies.LIBCMT ref: 0043E47B
                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 0043E483
                                                • _ValidateLocalCookies.LIBCMT ref: 0043E511
                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 0043E53C
                                                • _ValidateLocalCookies.LIBCMT ref: 0043E591
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                • String ID: csm
                                                • API String ID: 1170836740-1018135373
                                                • Opcode ID: ff9308fff5db92995b66b9191fe59adb8af1da34f68728788229997d5ee99979
                                                • Instruction ID: 888951a9f7c08fb9d708a3357a2c94d672d5577bc0a6533be428af5e1ab61e9b
                                                • Opcode Fuzzy Hash: ff9308fff5db92995b66b9191fe59adb8af1da34f68728788229997d5ee99979
                                                • Instruction Fuzzy Hash: B441E734A01208EBCF10DF6AC840A9FBBA5AF4931CF14816BE8159B3D2D739DA45CB95
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: _wcschr
                                                • String ID: HOG$LOG$LOG$LOG
                                                • API String ID: 2691759472-882294224
                                                • Opcode ID: 799c7f4fadf8e1616fe67100953d3464757771e7967676407cbb7131d5baf31f
                                                • Instruction ID: 5ab140bf6a31946d4ca921a66d43077b04e7297e5186c6a8caf06aab13658000
                                                • Opcode Fuzzy Hash: 799c7f4fadf8e1616fe67100953d3464757771e7967676407cbb7131d5baf31f
                                                • Instruction Fuzzy Hash: DB319275B00119978B248B6D98815BAB3E5EF98350B25407BEC4AC7340FB39CD87A2D8
                                                APIs
                                                • CreateFileW.KERNEL32(?,40000000,00000007,00000000,00000002,00000080,00000000), ref: 0041CE34
                                                • CloseHandle.KERNEL32(00000000), ref: 0041CE5D
                                                • DeleteFileW.KERNEL32(?), ref: 0041CE75
                                                • Sleep.KERNEL32(000000C8), ref: 0041CE84
                                                • CloseHandle.KERNEL32(00000000), ref: 0041CE96
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: CloseFileHandle$CreateDeleteSleep
                                                • String ID: tlib-%llx
                                                • API String ID: 813185504-4025929660
                                                • Opcode ID: 698e67f51eae2bb693fc8f3e1e35daa3cd273ae54f87b0e3fbedea4f3d3159b5
                                                • Instruction ID: 05021f08ce7de6106e6c1de5a7928c80c76a27cff6ce2ec1535d48b0914cd71a
                                                • Opcode Fuzzy Hash: 698e67f51eae2bb693fc8f3e1e35daa3cd273ae54f87b0e3fbedea4f3d3159b5
                                                • Instruction Fuzzy Hash: 58212C32E403105BC230AF64AC89BDFB7949F48729F00062AFD58D72D1DB34984647DA
                                                APIs
                                                  • Part of subcall function 0045136A: _free.LIBCMT ref: 00451393
                                                • _free.LIBCMT ref: 00451671
                                                  • Part of subcall function 0044A4F1: HeapFree.KERNEL32(00000000,00000000,?,00451398,-00486124,00000000,-00486124,00000000,?,0045163C,-00486124,00000007,-00486124,?,00451A30,-00486124), ref: 0044A507
                                                  • Part of subcall function 0044A4F1: GetLastError.KERNEL32(-00486124,?,00451398,-00486124,00000000,-00486124,00000000,?,0045163C,-00486124,00000007,-00486124,?,00451A30,-00486124,-00486124), ref: 0044A519
                                                • _free.LIBCMT ref: 0045167C
                                                • _free.LIBCMT ref: 00451687
                                                • _free.LIBCMT ref: 004516DB
                                                • _free.LIBCMT ref: 004516E6
                                                • _free.LIBCMT ref: 004516F1
                                                • _free.LIBCMT ref: 004516FC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: 45bfe5d81deeab46d02a808e1d32005954562647bc1e4c98c39b370fd1afa7d4
                                                • Instruction ID: d6f47198eb795f9f41c41033cfe0c4d8ff3bb357b3bc5f275e56b2be381edb13
                                                • Opcode Fuzzy Hash: 45bfe5d81deeab46d02a808e1d32005954562647bc1e4c98c39b370fd1afa7d4
                                                • Instruction Fuzzy Hash: B6118132541B04AAEA20B7B2CC4BFCB779CBF00705F40481EBE9A66463DA6CB9588655
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: __cftoe
                                                • String ID:
                                                • API String ID: 4189289331-0
                                                • Opcode ID: 72f73e8eda8cd3de51657ddfe8d4ec82b751ae02c9f9a6d2916c9b2f8d1341f6
                                                • Instruction ID: 5d4efb9d7cfef8b5144a46a1f18cb30abb618994dbe08e554f44fddba3a87db4
                                                • Opcode Fuzzy Hash: 72f73e8eda8cd3de51657ddfe8d4ec82b751ae02c9f9a6d2916c9b2f8d1341f6
                                                • Instruction Fuzzy Hash: 02513F32904205ABFB259F598C46EAF77A9EF49324F14421FF91496382DB3CDD02C66D
                                                APIs
                                                • GetLastError.KERNEL32(?,?,004407D9,0043DB86), ref: 004407F0
                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 004407FE
                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00440817
                                                • SetLastError.KERNEL32(00000000,?,004407D9,0043DB86), ref: 00440869
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ErrorLastValue___vcrt_
                                                • String ID:
                                                • API String ID: 3852720340-0
                                                • Opcode ID: 6cf3dfbe9a8500023a101f6171816b00d867ac43c7ca9491b893c36d3fdd2019
                                                • Instruction ID: b201999696807267a4c0a07219b49bf2b325bfe9a53378954708f91606be22f2
                                                • Opcode Fuzzy Hash: 6cf3dfbe9a8500023a101f6171816b00d867ac43c7ca9491b893c36d3fdd2019
                                                • Instruction Fuzzy Hash: 4B01283220A3115EB6213776AC8656B664CDB12779730063FF718556F1EF294C9292CC
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: __alldvrm$_strrchr
                                                • String ID: m6D
                                                • API String ID: 1036877536-1206097309
                                                • Opcode ID: 3c54beaae978beddc10ac7ccd0518da632ec50764f4ae70d83dc09b4b8e7f40c
                                                • Instruction ID: 9c6afbc0c4addc09ac54d3434b9d1c536269fc3c1fb9715d54c7a3282da0f90a
                                                • Opcode Fuzzy Hash: 3c54beaae978beddc10ac7ccd0518da632ec50764f4ae70d83dc09b4b8e7f40c
                                                • Instruction Fuzzy Hash: 32A178729803869FF711CE28C8917AEBBE1EF15300F14416FE585AB382C63C9D52C75A
                                                APIs
                                                • GetLastError.KERNEL32(?,?,00442F3D,?,-00486124,?,004435EA,00000000,-00486124,?,00000000), ref: 0044A34C
                                                • _free.LIBCMT ref: 0044A37F
                                                • _free.LIBCMT ref: 0044A3A7
                                                • SetLastError.KERNEL32(00000000,-00486124,?,00000000), ref: 0044A3B4
                                                • SetLastError.KERNEL32(00000000,-00486124,?,00000000), ref: 0044A3C0
                                                • _abort.LIBCMT ref: 0044A3C6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ErrorLast$_free$_abort
                                                • String ID:
                                                • API String ID: 3160817290-0
                                                • Opcode ID: fa44734158aaed7f3a38c2a22c10f03cf131cb2c53922dda2d5d2aaadfa96055
                                                • Instruction ID: d43a22e6a9747f3d295ce572408345573b40a5fdb35c2809b49903df2d209258
                                                • Opcode Fuzzy Hash: fa44734158aaed7f3a38c2a22c10f03cf131cb2c53922dda2d5d2aaadfa96055
                                                • Instruction Fuzzy Hash: D8F0F936581A1066F31277296C49A1F256A5FC0735F29012FFD19D22E2FE2CC867411F
                                                APIs
                                                  • Part of subcall function 0041CF50: InterlockedIncrement.KERNEL32(00486144), ref: 0041CF55
                                                • GetTickCount.KERNEL32 ref: 0041D121
                                                • GetCurrentThreadId.KERNEL32 ref: 0041D13B
                                                • OutputDebugStringW.KERNEL32(00000000), ref: 0041D194
                                                • WriteConsoleW.KERNEL32(FFFFFFFF,00000000,00000000,?,00000000), ref: 0041D1BC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ConsoleCountCurrentDebugIncrementInterlockedOutputStringThreadTickWrite
                                                • String ID: %04d.%02d: [%4x]:
                                                • API String ID: 1593025748-2866869537
                                                • Opcode ID: f3a70c26e608eac7ba38bd2cac5e67a88d6bd7999bc01b313b195e5fe79e9624
                                                • Instruction ID: 309d17462de7827c14dd4e2872e7e83f3dd7d07634f4370849871a10e1fac294
                                                • Opcode Fuzzy Hash: f3a70c26e608eac7ba38bd2cac5e67a88d6bd7999bc01b313b195e5fe79e9624
                                                • Instruction Fuzzy Hash: 09212CB3E002102BD72567359C46AAB798D9F84724F05033EFC1A972D2EE28CD0586D9
                                                APIs
                                                • GetFullPathNameW.KERNEL32(?,00000104,?,00000000), ref: 00411062
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: FullNamePath
                                                • String ID: fastcopy$fastcopy.exe$fastcopy_upd$fcp.exe
                                                • API String ID: 608056474-1011532868
                                                • Opcode ID: ccd8b2d6d976ed4c5d8d15ded39d73b96c801c44b1e2eba3ef3184064d0d77b2
                                                • Instruction ID: 688ed6ed664e0307daa826855f1a712aa0a7fc14a3c6f96152a90f668d04fb5a
                                                • Opcode Fuzzy Hash: ccd8b2d6d976ed4c5d8d15ded39d73b96c801c44b1e2eba3ef3184064d0d77b2
                                                • Instruction Fuzzy Hash: 08219BB5E0020856DF60AB219C42FDA77AC9B14305F0041FBB909E7591FE78AEC49AD9
                                                APIs
                                                  • Part of subcall function 0041CF50: InterlockedIncrement.KERNEL32(00486144), ref: 0041CF55
                                                • GetTickCount.KERNEL32 ref: 0041D070
                                                • GetCurrentThreadId.KERNEL32 ref: 0041D08A
                                                • OutputDebugStringA.KERNEL32(00000000,?,?,?,?,?,?,?,?,0040D72B), ref: 0041D0D1
                                                • WriteConsoleA.KERNEL32(FFFFFFFF,00000000,00000000,0040D72B,00000000,?,?,?,?,?,?,?,?,0040D72B), ref: 0041D0ED
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ConsoleCountCurrentDebugIncrementInterlockedOutputStringThreadTickWrite
                                                • String ID: %04d.%02d: [%4x]:
                                                • API String ID: 1593025748-2866869537
                                                • Opcode ID: 5d621a03ad8b7898f78e2edcdc9d6ba445544391ea92c9af8ecd12775feb7664
                                                • Instruction ID: 411a10c37e6a417b4cf3e9d5dc94a1743720951c053e8cac2e768459bf684b5b
                                                • Opcode Fuzzy Hash: 5d621a03ad8b7898f78e2edcdc9d6ba445544391ea92c9af8ecd12775feb7664
                                                • Instruction Fuzzy Hash: 55113A72E002146FC710BB39DC499AB7F9DDF44269B000536F809C3292DE34DD05C6A4
                                                APIs
                                                • GetModuleHandleW.KERNEL32 ref: 0041DA8C
                                                • GetProcAddress.KERNEL32(00000000), ref: 0041DA93
                                                • GetCurrentProcess.KERNEL32(00000000), ref: 0041DAA3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: AddressCurrentHandleModuleProcProcess
                                                • String ID: IsWow64Process$kernel32
                                                • API String ID: 4190356694-3789238822
                                                • Opcode ID: d9c40c23f09c8b84be84aa99a35843bc8731ea70483f66437361ab6ccc7c8b92
                                                • Instruction ID: bd4f8f66dff082535e6d1a44981f976043d08d0d39319206d5714a6321e744df
                                                • Opcode Fuzzy Hash: d9c40c23f09c8b84be84aa99a35843bc8731ea70483f66437361ab6ccc7c8b92
                                                • Instruction Fuzzy Hash: DF11BFB1D04604EFC720CFA8DC45B9AB7A8EB09710F10463BEA15D7390DB3AA8008B89
                                                APIs
                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,5D,00000000,00000000,?,0044C36E,5D,00000000,00000000,00000000,?,0044C5D8,00000006,FlsSetValue), ref: 0044C3F9
                                                • GetLastError.KERNEL32(?,0044C36E,5D,00000000,00000000,00000000,?,0044C5D8,00000006,FlsSetValue,004629BC,FlsSetValue,00000000,00000364,?,0044A41A), ref: 0044C405
                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044C36E,5D,00000000,00000000,00000000,?,0044C5D8,00000006,FlsSetValue,004629BC,FlsSetValue,00000000), ref: 0044C413
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: LibraryLoad$ErrorLast
                                                • String ID: 5D
                                                • API String ID: 3177248105-934400931
                                                • Opcode ID: 405b9fcf7d6e9cb4ba458d17f3d255862c2421280a8d416d078d92e90ebb29cd
                                                • Instruction ID: ce3b3dbf8419b9f7b95c3633cc86dbcaea94c89949699141cf5a3acaa3072375
                                                • Opcode Fuzzy Hash: 405b9fcf7d6e9cb4ba458d17f3d255862c2421280a8d416d078d92e90ebb29cd
                                                • Instruction Fuzzy Hash: 9301FC367027329BE7714B78AD949777798AF45BA1B540531FE05D3241DB24D802C6EC
                                                APIs
                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00447AF6,0044769B,?,00447A96,0044769B,0047E1F0,0000000C,00447BED,0044769B,00000002), ref: 00447B65
                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00447B78
                                                • FreeLibrary.KERNEL32(00000000,?,?,?,00447AF6,0044769B,?,00447A96,0044769B,0047E1F0,0000000C,00447BED,0044769B,00000002,00000000), ref: 00447B9B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: 3879134358e871eac203d1e7f8126970f84934d4c1e07abe88b68ecd2a8602a0
                                                • Instruction ID: da9bcafbafd70123376a3e917fcc62abb965d6e5f6f417c5fa79239f53500e38
                                                • Opcode Fuzzy Hash: 3879134358e871eac203d1e7f8126970f84934d4c1e07abe88b68ecd2a8602a0
                                                • Instruction Fuzzy Hash: C7F04430900318BBDB115F51DC49F9EBFB4EF04716F00416AF805A2261DB349D85CB99
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 71593a549cbf56420d4e87148139fb4afa2d36546803176819d10f59259692f5
                                                • Instruction ID: 72cb2edb8d46de3760501d3187d1c59ac9ab58a28be8e9d94d8e138f95182d1a
                                                • Opcode Fuzzy Hash: 71593a549cbf56420d4e87148139fb4afa2d36546803176819d10f59259692f5
                                                • Instruction Fuzzy Hash: EC71E531D002169BEF21DF99C844ABFBB75FF41364F26422BE41857291DB788D81CBA9
                                                APIs
                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,?,?,?,?,?,0047571C,00000000), ref: 00427A46
                                                • GetLastError.KERNEL32(?,?,?,?,?,?,0047571C,00000000), ref: 00427A63
                                                • WriteFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,0047571C,00000000), ref: 00427ABD
                                                • SetFileTime.KERNEL32(00000000,?,?,?,?,?,00989680,00000000,?,?,?,?,?,0047571C,00000000), ref: 00427B0E
                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,?,0047571C,00000000), ref: 00427B24
                                                  • Part of subcall function 00427300: GetFileAttributesW.KERNEL32(?), ref: 00427344
                                                  • Part of subcall function 00427300: DeleteFileW.KERNEL32(?), ref: 00427356
                                                  • Part of subcall function 0041DD80: CreateFileW.KERNEL32(?,?,?,00000000,?,?,00000000), ref: 0041DDC4
                                                  • Part of subcall function 0041DD80: GetLastError.KERNEL32(?,?,?,00000000,?,?,00000000), ref: 0041DDD1
                                                  • Part of subcall function 0041DD80: CreateFileW.KERNEL32(?,?,?,00000000,?,?,00000000), ref: 0041DE1A
                                                  • Part of subcall function 0041DD80: SetLastError.KERNEL32(00000000), ref: 0041DE28
                                                  • Part of subcall function 00427220: GetFileAttributesW.KERNEL32(?), ref: 0042729E
                                                  • Part of subcall function 00427220: MoveFileExW.KERNEL32(?,?,00000001), ref: 004272B9
                                                  • Part of subcall function 00427220: MoveFileExW.KERNEL32(?,00000000,00000004), ref: 004272CA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: File$CreateErrorLast$AttributesMove$CloseDeleteHandleTimeWrite
                                                • String ID:
                                                • API String ID: 249337999-0
                                                • Opcode ID: 43818784a43fc20b7db5404f413aa0d907d25ab8eed26752cbb4a289c9778b64
                                                • Instruction ID: a8bab8172e5b6a882793e9538f84de6cd957d154053d780ba5b88cacbdb2f2cd
                                                • Opcode Fuzzy Hash: 43818784a43fc20b7db5404f413aa0d907d25ab8eed26752cbb4a289c9778b64
                                                • Instruction Fuzzy Hash: F1618271E00218ABDF14DF91EC46BEFB7B8AF44318F54412AF901B7281D7789A05CBA9
                                                APIs
                                                  • Part of subcall function 0044A52B: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0044D1A0,00000000,?,?,?,?,?,?,?,?,00443073,00000000), ref: 0044A55D
                                                • _free.LIBCMT ref: 00449344
                                                • _free.LIBCMT ref: 0044935B
                                                • _free.LIBCMT ref: 0044937A
                                                • _free.LIBCMT ref: 00449395
                                                • _free.LIBCMT ref: 004493AC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: _free$AllocateHeap
                                                • String ID:
                                                • API String ID: 3033488037-0
                                                • Opcode ID: 628bca80cc3bcf03914b6007774ed4ba2381097925e17c04e2af61ded92ae7fe
                                                • Instruction ID: 041558fd0f8c54082201bbd978cc0ec8fb1b43ee61a6898b970cf46d75c6d7ba
                                                • Opcode Fuzzy Hash: 628bca80cc3bcf03914b6007774ed4ba2381097925e17c04e2af61ded92ae7fe
                                                • Instruction Fuzzy Hash: 6F51B131A00205AFEB20DF6AC881A6B77F4EF59724F1445AFE809D7290E739ED419B49
                                                APIs
                                                • GetCurrentProcess.KERNEL32(00000008,?,?,0041EADF,00000010), ref: 0041E94A
                                                • OpenProcessToken.ADVAPI32(00000000,?,0041EADF,00000010), ref: 0041E951
                                                • GetTokenInformation.ADVAPI32(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?,0045BBC8,?,0041EADF,00000010), ref: 0041E974
                                                • GetTokenInformation.ADVAPI32(00000000,00000001(TokenIntegrityLevel),00000000,00000000,00000000,?,?,0041EADF,00000010), ref: 0041E9B3
                                                • CloseHandle.KERNEL32(00000000,?,0041EADF,00000010), ref: 0041EA2E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: Token$InformationProcess$CloseCurrentHandleOpen
                                                • String ID:
                                                • API String ID: 434396405-0
                                                • Opcode ID: b09de237493dfc0b4c98a06d3c1136c4fe89a38552d541f3b0843de85eba35e0
                                                • Instruction ID: 419853f0f4f0e5c980132bcce33265372abfa63601a3a38600314cb1ed947ccb
                                                • Opcode Fuzzy Hash: b09de237493dfc0b4c98a06d3c1136c4fe89a38552d541f3b0843de85eba35e0
                                                • Instruction Fuzzy Hash: A031C5B5E00206ABEB109FA2DC45B9FBBB8FF04744F140066FD05E2291EB75DA54CB99
                                                APIs
                                                • GetEnvironmentStringsW.KERNEL32 ref: 004504D3
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004504F6
                                                  • Part of subcall function 0044A52B: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0044D1A0,00000000,?,?,?,?,?,?,?,?,00443073,00000000), ref: 0044A55D
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0045051C
                                                • _free.LIBCMT ref: 0045052F
                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0045053E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                • String ID:
                                                • API String ID: 336800556-0
                                                • Opcode ID: df910c5c37bf6149e56a2ecee20dc1b37b81de2dd5552b88339d729f049d2373
                                                • Instruction ID: cbc7e2fa6879bfcc3b14cc576e1b12a403b4637eab75837c2c3d457c39680a60
                                                • Opcode Fuzzy Hash: df910c5c37bf6149e56a2ecee20dc1b37b81de2dd5552b88339d729f049d2373
                                                • Instruction Fuzzy Hash: 5301DD76A017197F23315A766C8CC7F696CDEC2FA6315013AFD04C3242FA64CD068979
                                                APIs
                                                • GetLastError.KERNEL32(?,-00486124,?,00446B49,0044C214,?,0044A376,00000001,00000364,?,00442F3D,?,-00486124,?,004435EA,00000000), ref: 0044A3D1
                                                • _free.LIBCMT ref: 0044A406
                                                • _free.LIBCMT ref: 0044A42D
                                                • SetLastError.KERNEL32(00000000,-00486124,?,00000000), ref: 0044A43A
                                                • SetLastError.KERNEL32(00000000,-00486124,?,00000000), ref: 0044A443
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ErrorLast$_free
                                                • String ID:
                                                • API String ID: 3170660625-0
                                                • Opcode ID: 7a3e8514dd29e5fca0c76d6c1b1b85d82fadb488b8ad7044cdd50c0b1e2f06ab
                                                • Instruction ID: 4c4ea9aeb1064e4e35cb6243a46123a746baa1a33fbcf068a091b78e9f0ed475
                                                • Opcode Fuzzy Hash: 7a3e8514dd29e5fca0c76d6c1b1b85d82fadb488b8ad7044cdd50c0b1e2f06ab
                                                • Instruction Fuzzy Hash: FE01D63628661067F31266695CCE92F15699BC4779724442BF50592292EEACCC63421F
                                                APIs
                                                • _free.LIBCMT ref: 004510FD
                                                  • Part of subcall function 0044A4F1: HeapFree.KERNEL32(00000000,00000000,?,00451398,-00486124,00000000,-00486124,00000000,?,0045163C,-00486124,00000007,-00486124,?,00451A30,-00486124), ref: 0044A507
                                                  • Part of subcall function 0044A4F1: GetLastError.KERNEL32(-00486124,?,00451398,-00486124,00000000,-00486124,00000000,?,0045163C,-00486124,00000007,-00486124,?,00451A30,-00486124,-00486124), ref: 0044A519
                                                • _free.LIBCMT ref: 0045110F
                                                • _free.LIBCMT ref: 00451121
                                                • _free.LIBCMT ref: 00451133
                                                • _free.LIBCMT ref: 00451145
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: 55d3128645d43a0328d598d2460d88df82300fdcec6eef1ef996e9127dfbfd9f
                                                • Instruction ID: 65badc70ad4a87c772fec15b779229cc105aff130046b24e5a048ba4af552193
                                                • Opcode Fuzzy Hash: 55d3128645d43a0328d598d2460d88df82300fdcec6eef1ef996e9127dfbfd9f
                                                • Instruction Fuzzy Hash: 63F08C32401650ABC320EB1DE8C6D0E73ECAA097517248C0FFA08C3A22CA68FCC14A6D
                                                APIs
                                                • _strpbrk.LIBCMT ref: 0044F837
                                                • _free.LIBCMT ref: 0044F954
                                                  • Part of subcall function 004434DB: IsProcessorFeaturePresent.KERNEL32(00000017,004434AD,00447669,0000002C,0047E400,0044F65D,00000000,?,?,?,004434BA,00000000,00000000,00000000,00000000,00000000), ref: 004434DD
                                                  • Part of subcall function 004434DB: GetCurrentProcess.KERNEL32(C0000417,0000002C,00447669,00000016,0044A3CB,?,00000000), ref: 004434FF
                                                  • Part of subcall function 004434DB: TerminateProcess.KERNEL32(00000000,?,00000000), ref: 00443506
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                • String ID: *?$.
                                                • API String ID: 2812119850-3972193922
                                                • Opcode ID: 4fca0da324e288080f7fa78d35576da6f5e2eb1eda0b1aaa19624ea257ed5473
                                                • Instruction ID: 1c2beec6006765b626ecddd19d8b7556fbbf634175d2db55dd7b5fe273b046c1
                                                • Opcode Fuzzy Hash: 4fca0da324e288080f7fa78d35576da6f5e2eb1eda0b1aaa19624ea257ed5473
                                                • Instruction Fuzzy Hash: 2E51A371E00109AFEF14DFA9C881AAEB7B5EF58314F25417EE854E7301E739AE058B54
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,?,?,?,00000000,?,?,00000000,\E), ref: 00457CC0
                                                • GetLastError.KERNEL32(?,?,00000000,?,?,00000000,\E,?,?,?,?,0044C04B,00000000), ref: 00457CCC
                                                • __dosmaperr.LIBCMT ref: 00457CD3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                                • String ID: \E
                                                • API String ID: 2434981716-4102632411
                                                • Opcode ID: 13695e106838e8ea1b07a645858ed4ce3d9f15c759f7c7fe897c2a5c1eb325ec
                                                • Instruction ID: 2136222e54398bf2f5f948cc56717551b408cc038b2d900d42123992abb554be
                                                • Opcode Fuzzy Hash: 13695e106838e8ea1b07a645858ed4ce3d9f15c759f7c7fe897c2a5c1eb325ec
                                                • Instruction Fuzzy Hash: 16417C3050C185AFDB269F28E880A7D3FA6EB86345B2841BFFC8587253D539CC16979C
                                                APIs
                                                • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe,00000104), ref: 00447C80
                                                • _free.LIBCMT ref: 00447D4B
                                                • _free.LIBCMT ref: 00447D55
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: _free$FileModuleName
                                                • String ID: C:\Users\user\Desktop\40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe
                                                • API String ID: 2506810119-1297405165
                                                • Opcode ID: 879fd34d3a0b9a7c54f71d83e097b4d086d2deb7189392c05b7123e9634d1cdb
                                                • Instruction ID: daab6c9f0fa0a2b818df638fa569b06bcaf4c5c3fd4c68e00be913e88e695b91
                                                • Opcode Fuzzy Hash: 879fd34d3a0b9a7c54f71d83e097b4d086d2deb7189392c05b7123e9634d1cdb
                                                • Instruction Fuzzy Hash: 7631D3B1E04618AFEB21DF99DCC19AEBBECEF85314B10406BF90497311D7744A42CB99
                                                APIs
                                                • GetFileAttributesW.KERNEL32(?), ref: 0042729E
                                                • MoveFileExW.KERNEL32(?,?,00000001), ref: 004272B9
                                                • MoveFileExW.KERNEL32(?,00000000,00000004), ref: 004272CA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: File$Move$Attributes
                                                • String ID: hVG
                                                • API String ID: 1508057057-3185339755
                                                • Opcode ID: 11f4b71dc8f107ac6713f66fcb303f15506e271b592085e037e9401bceb3f2b6
                                                • Instruction ID: 122cebe0dbf0c347f2e3b281480db438ec3a43537a70cfa83596f6fab66a9e78
                                                • Opcode Fuzzy Hash: 11f4b71dc8f107ac6713f66fcb303f15506e271b592085e037e9401bceb3f2b6
                                                • Instruction Fuzzy Hash: 35119AB1F4021D9BDB109A64DC85FDA73ACDB48714F8041B7F60CE7181D674ED458B68
                                                APIs
                                                • GetTempPathW.KERNEL32(00000104,?,?,?,?,0045BBC8,000000FF), ref: 0041C511
                                                • CreateDirectoryW.KERNEL32(?,0045BBC8,?,?,?,?,?,?,?,?,0045BBC8,000000FF), ref: 0041C56D
                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,0045BBC8,000000FF), ref: 0041C577
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: CreateDirectoryErrorLastPathTemp
                                                • String ID: %s-%llx
                                                • API String ID: 3750913106-4122602866
                                                • Opcode ID: 82e63d97726f5b9c62ec73c17267d2a62982c841621fd9e77cb6b40365343599
                                                • Instruction ID: fbdc6595394894e952820cf35e7c0f4badbe9fea544646fe42e7001e655ec404
                                                • Opcode Fuzzy Hash: 82e63d97726f5b9c62ec73c17267d2a62982c841621fd9e77cb6b40365343599
                                                • Instruction Fuzzy Hash: C3012F32E401147BCB106FBAEC85AFFB779EF84715F00417BF908D1151EA3599515698
                                                APIs
                                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0041DF7E
                                                • CloseHandle.KERNEL32(00000000), ref: 0041DF91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: CloseHandleObjectSingleWait
                                                • String ID: LG$<
                                                • API String ID: 528846559-2104703480
                                                • Opcode ID: 3fff040cf0815762dcc68e50da1480e87cd2cba8cc6d8c1bfeaa280b80bd90a6
                                                • Instruction ID: 3657efbc79d2fe22212824dff7e1658ab259cf2452914dc3b05d29a1211d38ca
                                                • Opcode Fuzzy Hash: 3fff040cf0815762dcc68e50da1480e87cd2cba8cc6d8c1bfeaa280b80bd90a6
                                                • Instruction Fuzzy Hash: EA118270D013186BEB209F55DC05BDFBBB8AB45728F100116F914BA3C0D7B859458BAD
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: _free
                                                • String ID: ("F
                                                • API String ID: 269201875-4044516559
                                                • Opcode ID: 1456a9b4fb173dfcc21da0c8ab648c0a4f4ca925cef08bb884ec668f7a4edaea
                                                • Instruction ID: 75a013e61f6c8390daa0d7ee47d538bc4f63527bf6155b32b5a8e33c378c49a6
                                                • Opcode Fuzzy Hash: 1456a9b4fb173dfcc21da0c8ab648c0a4f4ca925cef08bb884ec668f7a4edaea
                                                • Instruction Fuzzy Hash: 2DF0F4329096107BE714366AA846B9F67499B41379F20002FFD0856193CBAD684642EE
                                                APIs
                                                • GetModuleHandleW.KERNEL32(user32,SwitchToThisWindow), ref: 0041C4D8
                                                • GetProcAddress.KERNEL32(00000000), ref: 0041C4DF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: AddressHandleModuleProc
                                                • String ID: SwitchToThisWindow$user32
                                                • API String ID: 1646373207-3637499893
                                                • Opcode ID: bf27ac272121e6ce06170bf6f2d37bf57a89c27f0ca0e7903faa2b242c0a0bec
                                                • Instruction ID: 44f7ca93bd2f2794aea4ff68d27735bd908187adb7afc910884ef8454a43c5a5
                                                • Opcode Fuzzy Hash: bf27ac272121e6ce06170bf6f2d37bf57a89c27f0ca0e7903faa2b242c0a0bec
                                                • Instruction Fuzzy Hash: 42F089B19846009BD620DB6CACC5F9E3364AB16711F14413BF10597292DB7CDD819B9D
                                                APIs
                                                • GetModuleHandleW.KERNEL32(user32,ChangeWindowMessageFilter), ref: 0041DD58
                                                • GetProcAddress.KERNEL32(00000000), ref: 0041DD5F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: AddressHandleModuleProc
                                                • String ID: ChangeWindowMessageFilter$user32
                                                • API String ID: 1646373207-1355250615
                                                • Opcode ID: 60cf3188ab1f857f7704e09653a307826e7eba5c8e8ab68b3222f94442ac0178
                                                • Instruction ID: 7b1759a4afc4db76abed4644960b9387a57cecf31b604ce7f32be694f2269e64
                                                • Opcode Fuzzy Hash: 60cf3188ab1f857f7704e09653a307826e7eba5c8e8ab68b3222f94442ac0178
                                                • Instruction Fuzzy Hash: 2EF089F1A40200D7D6109B78AD46F5D3360AB15702F54053FF2059A2D1DB7DEC419B1D
                                                APIs
                                                • GetModuleHandleW.KERNEL32(kernel32,SetDefaultDllDirectories), ref: 0041DFF9
                                                • GetProcAddress.KERNEL32(00000000), ref: 0041E000
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: AddressHandleModuleProc
                                                • String ID: SetDefaultDllDirectories$kernel32
                                                • API String ID: 1646373207-2865617923
                                                • Opcode ID: 2971ea9f1c73b8f7efd610c9bbf4ed13aed5d7c1920aeac2f35faa7a75663601
                                                • Instruction ID: 934fbe57e39bded1eec7c017f3a8beeed7f620c2c3e07537b78ab3558ae33c49
                                                • Opcode Fuzzy Hash: 2971ea9f1c73b8f7efd610c9bbf4ed13aed5d7c1920aeac2f35faa7a75663601
                                                • Instruction Fuzzy Hash: 58F05EF0E40700DBD6109BB8AC49B553360AB59702F24413BE116DA2A1DB39ED429A4E
                                                APIs
                                                • __Towlower.LIBCPMT ref: 0041B88E
                                                • __Towlower.LIBCPMT ref: 0041B8B7
                                                  • Part of subcall function 0043BD57: ___crtLCMapStringW.LIBCPMT ref: 0043BD9E
                                                • __Towlower.LIBCPMT ref: 0041B977
                                                • Concurrency::cancel_current_task.LIBCPMT ref: 0041BAAC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: Towlower$Concurrency::cancel_current_taskString___crt
                                                • String ID:
                                                • API String ID: 1193043153-0
                                                • Opcode ID: 1767e900a39ca1387a17d1fbac61b6fcdf5652652a143da576b2d81ce759017e
                                                • Instruction ID: 1ed96a70a6ea75c683336faa60210ce7e5da6e7ada3dd0fc95c97965bb3c7624
                                                • Opcode Fuzzy Hash: 1767e900a39ca1387a17d1fbac61b6fcdf5652652a143da576b2d81ce759017e
                                                • Instruction Fuzzy Hash: 1D819DB1A006118FC724DF29C880AAAB7E5EF58311B15856FEC8ACB711E734EC81CB94
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: _free
                                                • String ID:
                                                • API String ID: 269201875-0
                                                • Opcode ID: de4267e61b0b02472fc99ff73ded0ff0eb57705c85b610cca8fba728bfda5d52
                                                • Instruction ID: 85bf29b4d5606e66ed969160f78e48ca79c95a331e8ce7bba03d2f2f6f9d8aa5
                                                • Opcode Fuzzy Hash: de4267e61b0b02472fc99ff73ded0ff0eb57705c85b610cca8fba728bfda5d52
                                                • Instruction Fuzzy Hash: 5C417E316041106BEB207B7EBC46E6E3A65DF05379F14013BFC18D6293DA3C5849C26E
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,?,?,00000000,?,00000001,?,?,00000001,?,?), ref: 0044D149
                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0044D1D2
                                                • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 0044D1E4
                                                • __freea.LIBCMT ref: 0044D1ED
                                                  • Part of subcall function 0044A52B: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0044D1A0,00000000,?,?,?,?,?,?,?,?,00443073,00000000), ref: 0044A55D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                • String ID:
                                                • API String ID: 2652629310-0
                                                • Opcode ID: d355a92ae0b31548aa996caac8bdd32df8bda606e03f6c9ddf85ae1585e6ce29
                                                • Instruction ID: b6c4f82598daaed9bc13409bd6df9792d28a40fbf4978bb811f990352bb8a59e
                                                • Opcode Fuzzy Hash: d355a92ae0b31548aa996caac8bdd32df8bda606e03f6c9ddf85ae1585e6ce29
                                                • Instruction Fuzzy Hash: 3731B032E0020AABEF259F65DC81EAF7BA5EF00714F14416AFC04D6291EB39CD51CB98
                                                APIs
                                                • GetFileAttributesExW.KERNEL32(?,00000000,?), ref: 00427132
                                                • GetFileAttributesExW.KERNEL32(?,00000000,?,?,00000000,?), ref: 00427143
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00427182
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004271AB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: AttributesFileUnothrow_t@std@@@__ehfuncinfo$??2@
                                                • String ID:
                                                • API String ID: 501703347-0
                                                • Opcode ID: 3ca59ec722104492152f0ce63bd1bf6e63719fd4335987d08fc80f4cebda5d1c
                                                • Instruction ID: 38232cd008c9736d9a9ca812f44e65207b305452144f64f08792aeb323e15330
                                                • Opcode Fuzzy Hash: 3ca59ec722104492152f0ce63bd1bf6e63719fd4335987d08fc80f4cebda5d1c
                                                • Instruction Fuzzy Hash: DF31C231B05229A6DF10AAA9AC81FBF73A9DB94704F54056BF815F7380DA29AC04877D
                                                APIs
                                                • CreateFileW.KERNEL32(?,?,?,00000000,?,?,00000000), ref: 0041DDC4
                                                • GetLastError.KERNEL32(?,?,?,00000000,?,?,00000000), ref: 0041DDD1
                                                  • Part of subcall function 00426F80: GetFullPathNameW.KERNEL32(?,00000104,00000000,A), ref: 00426FC4
                                                • CreateFileW.KERNEL32(?,?,?,00000000,?,?,00000000), ref: 0041DE1A
                                                • SetLastError.KERNEL32(00000000), ref: 0041DE28
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: CreateErrorFileLast$FullNamePath
                                                • String ID:
                                                • API String ID: 884815997-0
                                                • Opcode ID: 0948e60114e0d295d857c414629b4234ef272bdf1ad607b7870e598353da2887
                                                • Instruction ID: bb2375e5176a54e96e13b6640953f53191a577d76cf680df8095fa7475690898
                                                • Opcode Fuzzy Hash: 0948e60114e0d295d857c414629b4234ef272bdf1ad607b7870e598353da2887
                                                • Instruction Fuzzy Hash: 3A110D75E4031C6BCB209F65DC48BEAB778EF58711F1002A9F919972D1D7309D808F94
                                                APIs
                                                • EnterCriticalSection.KERNEL32(004853CC,00479DC8,?,0041E157,00498680,?,?,?,7FC866D6), ref: 0043C8F1
                                                • LeaveCriticalSection.KERNEL32(004853CC,?,0041E157,00498680,?,?,?,7FC866D6), ref: 0043C924
                                                • SetEvent.KERNEL32(00000000,00498680,?,?,?,7FC866D6), ref: 0043C9B2
                                                • ResetEvent.KERNEL32(?,?,?,7FC866D6), ref: 0043C9BE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: CriticalEventSection$EnterLeaveReset
                                                • String ID:
                                                • API String ID: 3553466030-0
                                                • Opcode ID: 2366b453981c19721fc7de70bc93c44c9a2f8c6005573cfcd381aa3e7d5e9a30
                                                • Instruction ID: 6244584131ec2cab5ea41e6e120ac1312b7f348bca7fd3b4edc4cde79a69f452
                                                • Opcode Fuzzy Hash: 2366b453981c19721fc7de70bc93c44c9a2f8c6005573cfcd381aa3e7d5e9a30
                                                • Instruction Fuzzy Hash: BF011A75A00B14DBCB049F28FC98A5D7BA9FB0A745B01443AE902A7761CB759842CB99
                                                APIs
                                                • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0043B64B
                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0043B659
                                                  • Part of subcall function 0043EA17: RaiseException.KERNEL32(?,?,0043B63E,00000000,00000000,00000000,00479DC8,?,?,?,?,0043B63E,00000000,0047DDEC,?,00000000), ref: 0043EA77
                                                • std::regex_error::regex_error.LIBCPMT ref: 0043B66B
                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0043B679
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: Exception@8Throw$ExceptionRaisestd::invalid_argument::invalid_argumentstd::regex_error::regex_error
                                                • String ID:
                                                • API String ID: 744872699-0
                                                • Opcode ID: d6bdba78b69decf847b4d1e218f44082f1f89d33dc30cf617a6ad17d31f783a7
                                                • Instruction ID: ef772611e8dc4d21a58a6d5f92b7a368c83a611d071faf06dfac01caeb133d40
                                                • Opcode Fuzzy Hash: d6bdba78b69decf847b4d1e218f44082f1f89d33dc30cf617a6ad17d31f783a7
                                                • Instruction Fuzzy Hash: CEE04F31C0020C77CB04FAE6DC46DED773CAE18300F80981ABB6462482EB78A60987D8
                                                APIs
                                                • ___from_strstr_to_strchr.LIBCMT ref: 004234C9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ___from_strstr_to_strchr
                                                • String ID: P4B$list<T> too long
                                                • API String ID: 601868998-4160811081
                                                • Opcode ID: dd13cd3cee1302d8fa579bd1087bfa3976727b529fa55db0134efcf2c3c05c66
                                                • Instruction ID: 747be4ae4192a8d206e75c2dc7b6be4e7c314297ff831e7db27a162a7b08f0f6
                                                • Opcode Fuzzy Hash: dd13cd3cee1302d8fa579bd1087bfa3976727b529fa55db0134efcf2c3c05c66
                                                • Instruction Fuzzy Hash: EB616D71B002159FDB14DF65D881B9EB7F5AF48311F10816EE91AA7341EB38EE05CBA4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: WH$,WH
                                                • API String ID: 0-3089320185
                                                • Opcode ID: d68351f520a74ccb60f01d52cc96cb2e4a9f43583d05d00f7c7915872c34c134
                                                • Instruction ID: a4ef496b129204ebd986a66c97a3711e33cddfe57394effc15a4765697b01967
                                                • Opcode Fuzzy Hash: d68351f520a74ccb60f01d52cc96cb2e4a9f43583d05d00f7c7915872c34c134
                                                • Instruction Fuzzy Hash: 0731D332D00700DADB10EF68E88279E77A5DB09324F10D56FE925FB2C1D7B89A458B9C
                                                APIs
                                                • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00452364,?,00000050,?,?,?,?,?), ref: 004521E4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ACP$OCP
                                                • API String ID: 0-711371036
                                                • Opcode ID: 3da82b711d8406e1961ba499738e54a3443df8bf307d5dbcc06131080a12b18b
                                                • Instruction ID: 0f0c35e6a070c4cbf3a36b6ec39d0ed77f5c138a3aad2243a9cf0aa1338ea1ca
                                                • Opcode Fuzzy Hash: 3da82b711d8406e1961ba499738e54a3443df8bf307d5dbcc06131080a12b18b
                                                • Instruction Fuzzy Hash: EA21F962A00A01B7D7348A55CF41B9772669F52B53F168427EF0AD7302E77ADE05C358
                                                APIs
                                                  • Part of subcall function 0044C1C2: RtlAllocateHeap.NTDLL(00000008,-00486124,00000000,?,0044A376,00000001,00000364,?,00442F3D,?,-00486124,?,004435EA,00000000,-00486124), ref: 0044C203
                                                • _free.LIBCMT ref: 0044BAAC
                                                  • Part of subcall function 0044A4F1: HeapFree.KERNEL32(00000000,00000000,?,00451398,-00486124,00000000,-00486124,00000000,?,0045163C,-00486124,00000007,-00486124,?,00451A30,-00486124), ref: 0044A507
                                                  • Part of subcall function 0044A4F1: GetLastError.KERNEL32(-00486124,?,00451398,-00486124,00000000,-00486124,00000000,?,0045163C,-00486124,00000007,-00486124,?,00451A30,-00486124,-00486124), ref: 0044A519
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: Heap$AllocateErrorFreeLast_free
                                                • String ID: DG$Uq
                                                • API String ID: 314386986-1795643913
                                                • Opcode ID: f79b21ebe6c8f7f51dd1e72d6ff23d80a34962a3d717fc892d5b0cab65b52614
                                                • Instruction ID: c0c70b0884434c4fd40bc8b4154fc00c46d1dfe53e9cba7ef73f1b069a217092
                                                • Opcode Fuzzy Hash: f79b21ebe6c8f7f51dd1e72d6ff23d80a34962a3d717fc892d5b0cab65b52614
                                                • Instruction Fuzzy Hash: 8521D131601701AFEB11DF59C8C1B5AB368EF01328F10451AF915AB781DB38ED41CBD9
                                                APIs
                                                • GetProcAddress.KERNEL32(00000000,-00486124), ref: 0044C38B
                                                • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 0044C398
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: AddressProc__crt_fast_encode_pointer
                                                • String ID: 5D
                                                • API String ID: 2279764990-934400931
                                                • Opcode ID: cb9b665aa19bb0efa0ca3fa13492aa89810fea40f43a87fa015ae37731be1fc1
                                                • Instruction ID: e30e372cca5b2e79b8281317a55c55c3eb331f2d82a04ad887588d194548b6f0
                                                • Opcode Fuzzy Hash: cb9b665aa19bb0efa0ca3fa13492aa89810fea40f43a87fa015ae37731be1fc1
                                                • Instruction Fuzzy Hash: E3113A37A016208BEB21DE29DCC095F7395AB81720B1EC236FC15AB354D734EC0287D9
                                                APIs
                                                • LoadLibraryW.KERNEL32(?,00479DC8,0041E772,?,?), ref: 0041D9D2
                                                • GetLastError.KERNEL32(?,?), ref: 0041D9DE
                                                  • Part of subcall function 0041D060: GetTickCount.KERNEL32 ref: 0041D070
                                                  • Part of subcall function 0041D060: GetCurrentThreadId.KERNEL32 ref: 0041D08A
                                                  • Part of subcall function 0041D060: OutputDebugStringA.KERNEL32(00000000,?,?,?,?,?,?,?,?,0040D72B), ref: 0041D0D1
                                                  • Part of subcall function 0041D060: WriteConsoleA.KERNEL32(FFFFFFFF,00000000,00000000,0040D72B,00000000,?,?,?,?,?,?,?,?,0040D72B), ref: 0041D0ED
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ConsoleCountCurrentDebugErrorLastLibraryLoadOutputStringThreadTickWrite
                                                • String ID: TLoadLibraryW err=%d
                                                • API String ID: 3729237134-286212260
                                                • Opcode ID: a441e3535453ffd9108e8b2228a45a9f462a71442408d748d52854ea8e86a494
                                                • Instruction ID: d2da24007daf9eab93b61cea3f2165193f5f3afa345e17901cd63641830bb378
                                                • Opcode Fuzzy Hash: a441e3535453ffd9108e8b2228a45a9f462a71442408d748d52854ea8e86a494
                                                • Instruction Fuzzy Hash: 07D05EF1D5023157CA3123A47C097D729149F007AAF01023BF90AD1292D728C8C1C2AE
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,7FC866D6,00000000,00000000,00000000,00000000,0047E59C,0047E59C,00000000,00000000,00000000,7FC866D6), ref: 0044D2AF
                                                • GetLastError.KERNEL32(?,0047E59C), ref: 0044D2BD
                                                • MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,7FC866D6,00000000,?,0047E59C), ref: 0044D318
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1673572488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1673515441.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673683865.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673728731.0000000000481000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673755880.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000484000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673788209.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1673852442.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_40122c3fc307277bbcb516dce390f74f27e2f798cb351.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide$ErrorLast
                                                • String ID:
                                                • API String ID: 1717984340-0
                                                • Opcode ID: 64049eacdcd1aadf0891ca6d30f58ca29db5bd5751ab9179a69296d3f145b54f
                                                • Instruction ID: 5e4a79ef43b98ec2e7e85e4ce19094185e158f801687e593f2a8ce446e3af92f
                                                • Opcode Fuzzy Hash: 64049eacdcd1aadf0891ca6d30f58ca29db5bd5751ab9179a69296d3f145b54f
                                                • Instruction Fuzzy Hash: DD41E730E00646EFEF219F65C8447AB7BA4EF02324F1582ABFC5597291DB349D01C76A