Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
CSh#U0430rk F1 x.exe

Overview

General Information

Sample name:CSh#U0430rk F1 x.exe
renamed because original name is a hash value
Original sample name:CShrk F1 x.exe
Analysis ID:1532884
MD5:152025c926edf53603411541f0f259c0
SHA1:0be7af5fc1c37b723e97846acbea794e31300614
SHA256:e9d09aee08577c911b177231aa238614dc119adb0a1e73ac148f4bac60eab8be
Tags:exeuser-4k95m
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Found API chain indicative of debugger detection
Found direct / indirect Syscall (likely to bypass EDR)
Queries memory information (via WMI often done to detect virtual machines)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains functionality to launch a program with higher privileges
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found large amount of non-executed APIs
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • CSh#U0430rk F1 x.exe (PID: 1772 cmdline: "C:\Users\user\Desktop\CSh#U0430rk F1 x.exe" MD5: 152025C926EDF53603411541F0F259C0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: CSh#U0430rk F1 x.exeReversingLabs: Detection: 36%
Source: CSh#U0430rk F1 x.exeVirustotal: Detection: 43%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.2% probability
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C948640 TlsGetValue,BCryptGenRandom,SystemFunction036,TlsGetValue,TlsSetValue,HeapFree,HeapFree,TlsGetValue,TlsSetValue,HeapFree,HeapFree,0_2_00007FF68C948640
Source: CSh#U0430rk F1 x.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2417421702.000001FEBF2F2000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2421453971.000001FEBEC13000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2426415652.000001FEBF2F7000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2431269979.000001FEBF2F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2417421702.000001FEBF2F2000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2421453971.000001FEBEC13000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2426415652.000001FEBF2F7000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2431269979.000001FEBF2F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2421453971.000001FEBEC13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2417421702.000001FEBF2F2000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2421453971.000001FEBEC13000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2426415652.000001FEBF2F7000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2431269979.000001FEBF2F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2417421702.000001FEBF2F2000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2421453971.000001FEBEC13000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2426415652.000001FEBF2F7000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2431269979.000001FEBF2F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2421453971.000001FEBEC13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2417421702.000001FEBF394000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2417421702.000001FEBF394000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9660B0 GetProcessTimes,GetLastError,GetSystemTimes,GetLastError,GetProcessIoCounters,OpenProcessToken,GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,GetLastError,GetLastError,CloseHandle,GetLastError,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,HeapFree,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,GetLastError,memset,GetModuleFileNameExW,K32GetModuleFileNameExW,HeapFree,HeapFree,HeapFree,GetLastError,CloseHandle,HeapFree,ReadProcessMemory,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,VirtualQueryEx,ReadProcessMemory,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,ReadProcessMemory,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,RtlFreeHeap,HeapFree,HeapFree,HeapFree,VirtualQueryEx,HeapFree,HeapFree,HeapFree,HeapFree,RtlFreeHeap,ReadProcessMemory,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,HeapFree,0_2_00007FF68C9660B0
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9679F0 NtQueryInformationProcess,GetErrorInfo,NtQueryInformationProcess,HeapFree,HeapFree,0_2_00007FF68C9679F0
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C92C3C7 memcpy,memcmp,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,GetCurrentProcess,OpenProcessToken,GetTokenInformation,QueryPerformanceCounter,QueryPerformanceFrequency,QueryPerformanceCounter,QueryPerformanceFrequency,QueryPerformanceFrequency,GetCurrentProcess,CheckRemoteDebuggerPresent,GetCurrentProcess,NtQueryInformationProcess,GetCurrentProcess,NtQueryInformationProcess,GetCurrentProcess,NtQueryInformationProcess,SetThreadExecutionState,0_2_00007FF68C92C3C7
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C928CE1 memset,HeapFree,memcpy,memset,HeapFree,memcpy,GetComputerNameExW,GetComputerNameExW,GetLastError,HeapFree,HeapFree,HeapFree,memcpy,SysFreeString,SysFreeString,HeapFree,GetErrorInfo,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,GetErrorInfo,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,GetTickCount64,HeapFree,HeapFree,HeapFree,HeapFree,memset,GetErrorInfo,SysFreeString,SysFreeString,HeapFree,HeapFree,GetCurrentProcess,OpenProcessToken,GetTokenInformation,memcpy,CoInitializeEx,HeapFree,WaitForSingleObject,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,QueryPerformanceCounter,QueryPerformanceFrequency,QueryPerformanceCounter,QueryPerformanceFrequency,QueryPerformanceFrequency,GetCurrentProcess,CheckRemoteDebuggerPresent,GetCurrentProcess,NtQueryInformationProcess,GetCurrentProcess,NtQueryInformationProcess,GetCurrentProcess,NtQueryInformationProcess,SetThreadExecutionState,GetLastError,HeapFree,HeapFree,RegCreateKeyExW,HeapFree,RegOpenKeyExW,HeapFree,HeapFree,HeapFree,RegQueryValueExW,0_2_00007FF68C928CE1
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C961CD0 NtQuerySystemInformation,GetErrorInfo,GetSystemTimePreciseAsFileTime,HeapFree,HeapFree,memcpy,HeapFree,HeapFree,HeapFree,memcpy,memcpy,memcpy,memcpy,HeapFree,HeapFree,RtlFreeHeap,0_2_00007FF68C961CD0
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C928CE1 memset,HeapFree,memcpy,memset,HeapFree,memcpy,GetComputerNameExW,GetComputerNameExW,GetLastError,HeapFree,HeapFree,HeapFree,memcpy,SysFreeString,SysFreeString,HeapFree,GetErrorInfo,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,GetErrorInfo,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,GetTickCount64,HeapFree,HeapFree,HeapFree,HeapFree,memset,GetErrorInfo,SysFreeString,SysFreeString,HeapFree,HeapFree,GetCurrentProcess,OpenProcessToken,GetTokenInformation,memcpy,CoInitializeEx,HeapFree,WaitForSingleObject,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,QueryPerformanceCounter,QueryPerformanceFrequency,QueryPerformanceCounter,QueryPerformanceFrequency,QueryPerformanceFrequency,GetCurrentProcess,CheckRemoteDebuggerPresent,GetCurrentProcess,NtQueryInformationProcess,GetCurrentProcess,NtQueryInformationProcess,GetCurrentProcess,NtQueryInformationProcess,SetThreadExecutionState,GetLastError,HeapFree,HeapFree,RegCreateKeyExW,HeapFree,RegOpenKeyExW,HeapFree,HeapFree,HeapFree,RegQueryValueExW,0_2_00007FF68C928CE1
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C92DC75 HeapFree,HeapFree,QueryPerformanceCounter,QueryPerformanceFrequency,QueryPerformanceCounter,QueryPerformanceFrequency,QueryPerformanceFrequency,GetCurrentProcess,CheckRemoteDebuggerPresent,GetCurrentProcess,NtQueryInformationProcess,GetCurrentProcess,NtQueryInformationProcess,GetCurrentProcess,NtQueryInformationProcess,SetThreadExecutionState,0_2_00007FF68C92DC75
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C94D5E00_2_00007FF68C94D5E0
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C929E900_2_00007FF68C929E90
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9250600_2_00007FF68C925060
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9660B00_2_00007FF68C9660B0
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9628800_2_00007FF68C962880
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9519C00_2_00007FF68C9519C0
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9631700_2_00007FF68C963170
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C93293F0_2_00007FF68C93293F
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C96A1400_2_00007FF68C96A140
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9681B00_2_00007FF68C9681B0
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C969AF00_2_00007FF68C969AF0
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C92C3C70_2_00007FF68C92C3C7
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C928CE10_2_00007FF68C928CE1
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C961CD00_2_00007FF68C961CD0
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C94AC600_2_00007FF68C94AC60
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C949DEE0_2_00007FF68C949DEE
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C94C5F00_2_00007FF68C94C5F0
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C921E2D0_2_00007FF68C921E2D
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C963E300_2_00007FF68C963E30
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9555FF0_2_00007FF68C9555FF
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9236100_2_00007FF68C923610
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C92C5460_2_00007FF68C92C546
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9257100_2_00007FF68C925710
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C967F100_2_00007FF68C967F10
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9486400_2_00007FF68C948640
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9527C00_2_00007FF68C9527C0
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9248300_2_00007FF68C924830
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9587610_2_00007FF68C958761
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C93F7700_2_00007FF68C93F770
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C95B7720_2_00007FF68C95B772
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C921E2D0_2_00007FF68C921E2D
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C92E7AA0_2_00007FF68C92E7AA
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C963FB00_2_00007FF68C963FB0
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C93D0F00_2_00007FF68C93D0F0
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C93F1300_2_00007FF68C93F130
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9569350_2_00007FF68C956935
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9230FD0_2_00007FF68C9230FD
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9681000_2_00007FF68C968100
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9538700_2_00007FF68C953870
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9358400_2_00007FF68C935840
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C92E8490_2_00007FF68C92E849
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9350B00_2_00007FF68C9350B0
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C92E8490_2_00007FF68C92E849
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9240800_2_00007FF68C924080
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9611E00_2_00007FF68C9611E0
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9339F00_2_00007FF68C9339F0
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9259D00_2_00007FF68C9259D0
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C944A300_2_00007FF68C944A30
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C95DA300_2_00007FF68C95DA30
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C93CA000_2_00007FF68C93CA00
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9339600_2_00007FF68C933960
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9392E00_2_00007FF68C9392E0
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C926AE00_2_00007FF68C926AE0
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C931A600_2_00007FF68C931A60
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C928A400_2_00007FF68C928A40
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9232400_2_00007FF68C923240
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C968AB00_2_00007FF68C968AB0
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C95E2900_2_00007FF68C95E290
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C931A930_2_00007FF68C931A93
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C938BF00_2_00007FF68C938BF0
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C951C300_2_00007FF68C951C30
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9584040_2_00007FF68C958404
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9283400_2_00007FF68C928340
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C94F3400_2_00007FF68C94F340
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C958BB30_2_00007FF68C958BB3
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C959B860_2_00007FF68C959B86
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C928CE10_2_00007FF68C928CE1
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C95D4F00_2_00007FF68C95D4F0
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C935D100_2_00007FF68C935D10
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9514600_2_00007FF68C951460
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C933C700_2_00007FF68C933C70
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9234700_2_00007FF68C923470
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C92DC750_2_00007FF68C92DC75
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C93FC500_2_00007FF68C93FC50
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9584790_2_00007FF68C958479
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9434800_2_00007FF68C943480
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2431851481.000001FEBEFFA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameApplicationFrameHost.exej% vs CSh#U0430rk F1 x.exe
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2417878615.000001FEBEFE2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameApplicationFrameHost.exej% vs CSh#U0430rk F1 x.exe
Source: classification engineClassification label: mal72.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C96A140 CoCreateInstance,SysFreeString,CoSetProxyBlanket,GetErrorInfo,GetErrorInfo,SysFreeString,GetErrorInfo,0_2_00007FF68C96A140
Source: CSh#U0430rk F1 x.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM Win32_Process
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: CSh#U0430rk F1 x.exeReversingLabs: Detection: 36%
Source: CSh#U0430rk F1 x.exeVirustotal: Detection: 43%
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeSection loaded: pdh.dllJump to behavior
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeSection loaded: perfos.dllJump to behavior
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeSection loaded: profapi.dllJump to behavior
Source: CSh#U0430rk F1 x.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: CSh#U0430rk F1 x.exeStatic file information: File size 30524416 > 1048576
Source: CSh#U0430rk F1 x.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x1cba200
Source: CSh#U0430rk F1 x.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: CSh#U0430rk F1 x.exeStatic PE information: section name: .xdata
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_PortConnector
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeAPI coverage: 5.2 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C94D5E0 HeapFree,HeapFree,HeapFree,GetSystemInfo,HeapFree,memset,memcpy,WakeByAddressAll,WakeByAddressSingle,memcpy,HeapFree,HeapReAlloc,CloseHandle,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,WakeByAddressSingle,WakeByAddressSingle,HeapFree,0_2_00007FF68C94D5E0
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF13000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF17000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEEFB000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD1EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration Service
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF13000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF17000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEEFB000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD1EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Virtual Processor
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DHyper-V Virtual Machine Bus Pipesd
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2417421702.000001FEBF394000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2417421702.000001FEBF320000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000%
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Logical Processorc.sys
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X2Hyper-V VM Vid Partition
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: THyper-V Hypervisor Root Virtual Processor
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Virtual Machine Bus PipesZ
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: THyper-V Hypervisor Root Virtual Processor
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: JHyper-V Hypervisor Logical Processor
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2414207059.000001FEBEADB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6242WorkflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O T
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sWDHyper-V Hypervisor Root Partition
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V jlktlqfkpuggghd Bus Pipes
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DHyper-V Hypervisor Root Partition
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Hyper-V Hypervisor
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2431269979.000001FEBF309000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2421453971.000001FEBEC13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF13000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF17000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEEFB000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD1EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Partition@
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: JHyper-V Hypervisor Logical Processor$
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AlDHyper-V Virtual Machine Bus Pipes2
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2409617032.000001FEBEACD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O TLB Flushes Base4972Hyper-V Hypervisor Root Virtual Processor4974Total Run Time4976Hypervisor Run Time4978Remote Node Run Time4980Normalized Run Time4982Ideal Cpu4984Hypercalls/sec4986Hypercalls Cost4988Page Invalidations/sec4990Page Invalidations Cost4992Control Register Accesses/sec4994Control Register Accesses Cost4996IO Instructions/sec4998IO Instructions Cost5000HLT Instructions/sec5002HLT Instructions Cost5004MWAIT Instructions/sec5006MWAIT Instructions Cost5008CPUID Instructions/sec5010CPUID Instructions Cost5012MSR Accesses/sec5014MSR Accesses Cost5016Other Intercepts/sec5018Other Intercepts Cost5020External Interrupts/sec5022External Interrupts Cost5024Pending Interrupts/sec5026Pending Interrupts Cost5028Emulated Instructions/sec5030Emulated Instructions Cost5032Debug Register Accesses/sec5034Debug Register Accesses Cost5036Page Fault Intercepts/sec5038Page Fault Intercepts Cost5040NMI Interrupts/sec5042NMI Interrupts Cost5044Guest Page Table Maps/sec5046Large Page TLB Fills/sec5048Small Page TLB Fills/sec5050Reflected Guest Page Faults/sec5052APIC MMIO Accesses/sec5054IO Intercept Messages/sec5056Memory Intercept Messages/sec5058APIC EOI Accesses/sec5060Other Messages/sec5062Page Table Allocations/sec5064Logical Processor Migrations/sec5066Address Space Evictions/sec5068Address Space Switches/sec5070Address Domain Flushes/sec5072Address Space Flushes/sec5074Global GVA Range Flushes/sec5076Local Flushed GVA Ranges/sec5078Page Table Evictions/sec5080Page Table Reclamations/sec5082Page Table Re
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V VM Vid Partitione0
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration Service'
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V VM Vid Partition
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Partitionl;
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VHyper-V Dynamic Memory Integration Serviceg
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2417421702.000001FEBF394000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b},
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Virtual Processor3
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2417421702.000001FEBF394000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2417421702.000001FEBF394000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: NXTcaVMWare
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Virtual Machine Bus Pipes
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2417421702.000001FEBF394000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2409580092.000001FEBD2BF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ime Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O TLB Flushes Base4972Hyper-V Hypervisor Root Virtual Processor4974Total Run Time4976Hypervisor Run Time4978Remote Node Run Time4980Normalized Run Time4982Ideal Cpu4984Hypercalls/sec4986Hypercalls Cost4988Page Invalidations/sec4990Page Invalidations Cost4992Control Register Accesses/sec4994Control Register Accesses Cost4996IO Instructions/sec4998IO Instructions Cost5000HLT Instructions/sec5002HLT Instructions Cost5004MWAIT Instructions/sec5006MWAIT Instructions Cost5008CPUID Instructions/sec5010CPUID Instructions Cost5012MSR Accesses/sec5014MSR Accesses Cost5016Other Intercepts/sec5018Other Intercepts
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF13000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF17000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEEFB000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD1EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Logical Processorc.sys
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2409921608.000001FEBEACB000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2410092826.000001FEBEACB000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2408831349.000001FEBEACB000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2408899571.000001FEBEACB000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2410620969.000001FEBEACB000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2408985247.000001FEBEACB000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2410558008.000001FEBEACB000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2409727867.000001FEBEAA3000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2408813948.000001FEBEACB000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2410463963.000001FEBEACB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Active Operations3444Active Users3446Process ID1914Hyper-V VM Vid Partition1916Physical Pages Allocated1918Preferred NUMA Node Index1920Remote Physical Pages1922ClientHandles1924CompressPackTimeInUs1926CompressUnpackTimeInUs1928CompressPackInputSizeInBytes1930CompressUnpackInputSizeInBytes1932CompressPackOutputSizeInBytes1934CompressUnpackOutputSizeInBytes1936CompressUnpackUncompressedInputSizeInBytes1938CompressPackDiscardedSizeInBytes1940CompressWorkspaceSizeInBytes1942CompressScratchPoolSizeInBytes1944CryptPackTimeInUs1946CryptUnpackTimeInUs1948CryptPackInputSizeInBytes1950CryptUnpackInputSizeInBytes1952CryptPackOutputSizeInBytes1954CryptUnpackOutputSizeInBytes1956CryptScratchPoolSizeInBytesgg
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 2Hyper-V VM Vid Partition.dll
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2414241239.000001FEBEADA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle C
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF13000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF17000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEEFB000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD1EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF13000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF17000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEEFB000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD1EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Hyper-V Hypervisorr
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2417421702.000001FEBF394000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000_
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2417421702.000001FEBF394000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}0#{5-
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VHyper-V Dynamic Memory Integration ServiceEhN
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2417421702.000001FEBF320000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2432803702.000001FEBEF8F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000002.2439037665.000001FEBD268000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2428089691.000001FEBEF93000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2417174900.000001FEBEF78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V jlktlqfkpuggghd Bus
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C92C3C7 memcpy,memcmp,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,GetCurrentProcess,OpenProcessToken,GetTokenInformation,QueryPerformanceCounter,QueryPerformanceFrequency,QueryPerformanceCounter,QueryPerformanceFrequency,QueryPerformanceFrequency,GetCurrentProcess,CheckRemoteDebuggerPresent,GetCurrentProcess,NtQueryInformationProcess,GetCurrentProcess,NtQueryInformationProcess,GetCurrentProcess,NtQueryInformationProcess,SetThreadExecutionState,0_2_00007FF68C92C3C7
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_0-26124
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9660B0 GetProcessTimes,GetLastError,GetSystemTimes,GetLastError,GetProcessIoCounters,OpenProcessToken,GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,GetLastError,GetLastError,CloseHandle,GetLastError,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,HeapFree,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,GetLastError,memset,GetModuleFileNameExW,K32GetModuleFileNameExW,HeapFree,HeapFree,HeapFree,GetLastError,CloseHandle,HeapFree,ReadProcessMemory,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,VirtualQueryEx,ReadProcessMemory,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,ReadProcessMemory,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,RtlFreeHeap,HeapFree,HeapFree,HeapFree,VirtualQueryEx,HeapFree,HeapFree,HeapFree,HeapFree,RtlFreeHeap,ReadProcessMemory,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,HeapFree,0_2_00007FF68C9660B0
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9211B9 SetUnhandledExceptionFilter,malloc,0_2_00007FF68C9211B9
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeNtQueryInformationProcess: Indirect: 0x7FF68C96654CJump to behavior
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeNtQueryInformationProcess: Indirect: 0x7FF68C9666B1Jump to behavior
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeNtQueryInformationProcess: Indirect: 0x7FF68C967A1CJump to behavior
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeNtQueryInformationProcess: Indirect: 0x7FF68C967AB4Jump to behavior
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeNtQuerySystemInformation: Indirect: 0x7FF68C961D80Jump to behavior
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C94D5E0 HeapFree,HeapFree,HeapFree,GetSystemInfo,HeapFree,memset,memcpy,WakeByAddressAll,WakeByAddressSingle,memcpy,HeapFree,HeapReAlloc,CloseHandle,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,WakeByAddressSingle,WakeByAddressSingle,HeapFree,0_2_00007FF68C94D5E0
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2417421702.000001FEBF394000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd=
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2430671978.000001FEBF09F000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2425918312.000001FEBEEF6000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2416784373.000001FEBEC18000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
Source: CSh#U0430rk F1 x.exe, 00000000.00000003.2425918312.000001FEBEEF6000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2416784373.000001FEBEC18000.00000004.00000020.00020000.00000000.sdmp, CSh#U0430rk F1 x.exe, 00000000.00000003.2430671978.000001FEBF00C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndg
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeCode function: 0_2_00007FF68C9660B0 GetProcessTimes,GetLastError,GetSystemTimes,GetLastError,GetProcessIoCounters,OpenProcessToken,GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,GetLastError,GetLastError,CloseHandle,GetLastError,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,HeapFree,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,GetLastError,memset,GetModuleFileNameExW,K32GetModuleFileNameExW,HeapFree,HeapFree,HeapFree,GetLastError,CloseHandle,HeapFree,ReadProcessMemory,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,VirtualQueryEx,ReadProcessMemory,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,ReadProcessMemory,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,RtlFreeHeap,HeapFree,HeapFree,HeapFree,VirtualQueryEx,HeapFree,HeapFree,HeapFree,HeapFree,RtlFreeHeap,ReadProcessMemory,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,HeapFree,0_2_00007FF68C9660B0
Source: C:\Users\user\Desktop\CSh#U0430rk F1 x.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT displayName FROM AntiVirusProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts211
Windows Management Instrumentation
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Process Injection
1
Disable or Modify Tools
LSASS Memory421
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Abuse Elevation Control Mechanism
1
Process Injection
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
NTDS2
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets4
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
CSh#U0430rk F1 x.exe37%ReversingLabsWin64.Trojan.Generic
CSh#U0430rk F1 x.exe43%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://excel.office.com0%URL Reputationsafe
https://outlook.com0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://excel.office.comCSh#U0430rk F1 x.exe, 00000000.00000003.2417421702.000001FEBF394000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://outlook.comCSh#U0430rk F1 x.exe, 00000000.00000003.2417421702.000001FEBF394000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1532884
Start date and time:2024-10-14 04:44:14 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 44s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:5
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:CSh#U0430rk F1 x.exe
renamed because original name is a hash value
Original Sample Name:CShrk F1 x.exe
Detection:MAL
Classification:mal72.evad.winEXE@1/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 96%
  • Number of executed functions: 54
  • Number of non-executed functions: 100
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Report size getting too big, too many NtEnumerateKey calls found.
  • Report size getting too big, too many NtOpenKey calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • Report size getting too big, too many NtReadVirtualMemory calls found.
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
Entropy (8bit):7.998964526134545
TrID:
  • Win64 Executable (generic) (12005/4) 74.95%
  • Generic Win/DOS Executable (2004/3) 12.51%
  • DOS Executable Generic (2002/1) 12.50%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
File name:CSh#U0430rk F1 x.exe
File size:30'524'416 bytes
MD5:152025c926edf53603411541f0f259c0
SHA1:0be7af5fc1c37b723e97846acbea794e31300614
SHA256:e9d09aee08577c911b177231aa238614dc119adb0a1e73ac148f4bac60eab8be
SHA512:e88cb2eeba5c1ff9e7492235810a1b3eb5e959b8056320db92c02e69d7a3ed532f1051e508d64cfd280613dc008409c31b5c3a4e51f92f42eba52d4bab5b7797
SSDEEP:786432:7+FxZO069sx0lLnKmv6dKfet6knoearZiBTMyicL9o:7+FiVaxoOmvPG8twDicL9
TLSH:74673323E6F6F078C251C5769769FB33B672784544356D7703A4C232EF32B50AA2AB06
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......f...............+.......................@.............................0............`... ............................
Icon Hash:00928e8e8686b000
Entrypoint:0x1400013d0
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x66F8910B [Sat Sep 28 23:28:11 2024 UTC]
TLS Callbacks:0x40031530, 0x1, 0x4005bce0, 0x1, 0x4005bcb0, 0x1
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:55ed24bfeecf4f49e33cb0a4d5bfd645
Instruction
dec eax
sub esp, 28h
dec eax
mov eax, dword ptr [01D16D05h]
mov dword ptr [eax], 00000001h
call 00007FF380E60BCFh
nop
nop
dec eax
add esp, 28h
ret
nop dword ptr [eax]
dec eax
sub esp, 28h
dec eax
mov eax, dword ptr [01D16CE5h]
mov dword ptr [eax], 00000000h
call 00007FF380E60BAFh
nop
nop
dec eax
add esp, 28h
ret
nop dword ptr [eax]
dec eax
sub esp, 28h
call 00007FF380EBB33Ch
dec eax
cmp eax, 01h
sbb eax, eax
dec eax
add esp, 28h
ret
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
dec eax
lea ecx, dword ptr [00000009h]
jmp 00007FF380E60E09h
nop dword ptr [eax+00h]
ret
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
push esi
push edi
push ebp
push ebx
dec eax
sub esp, 000000A8h
dec esp
mov edi, eax
dec eax
mov esi, ecx
dec eax
mov dword ptr [esp+30h], 00000000h
mov dword ptr [esp+2Ch], 00000000h
dec eax
mov eax, dword ptr [edx]
dec eax
lea ecx, dword ptr [esp+2Ch]
dec eax
mov dword ptr [esp+20h], ecx
dec esp
lea ecx, dword ptr [esp+30h]
dec eax
mov ecx, edx
mov edx, FFFFFFFFh
inc ecx
mov eax, 00000001h
call dword ptr [eax+20h]
mov ebx, eax
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x1d1e0000x1fe8.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1d190000x1794.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x1d220000x190.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x1d17d400x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x1d1e7e80x630.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x5bd280x5be00bfb4382a5e7bcde055e9ff9583de025cFalse0.49288903061224487data6.413404924008895IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x5d0000x1d00x200ce3e17351d1d3b499ab9333305532ec8False0.25data1.988519753064259IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rdata0x5e0000x1cba2000x1cba20053e785aebf4b732705f43c991cf8ca72unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.pdata0x1d190000x17940x1800f0b995c0b3e96002c47d36674443f70fFalse0.53466796875data5.783188408459832IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.xdata0x1d1b0000x1ee80x2000cf3ea1763cd1f9e45839c89b1af4ab48False0.27197265625data4.757134924705069IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.bss0x1d1d0000x2400x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x1d1e0000x1fe80x20006d685613f45298a11aed0aef9e200218False0.3179931640625COM executable for DOS4.898223466425682IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.CRT0x1d200000x680x2004be18360b3dbcc1279765669684d6708False0.076171875data0.40665232183492983IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.tls0x1d210000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.reloc0x1d220000x1900x200c557b26b24530363429c5527c700861aFalse0.619140625data4.319290283426142IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
DLLImport
KERNEL32.dllAddVectoredExceptionHandler, CheckRemoteDebuggerPresent, CloseHandle, CompareStringOrdinal, CreateDirectoryW, CreateFileW, CreateNamedPipeW, CreateProcessW, CreateThread, CreateWaitableTimerExW, DeleteCriticalSection, DeleteProcThreadAttributeList, DuplicateHandle, EnterCriticalSection, ExitProcess, FindClose, FindFirstFileW, FreeEnvironmentStringsW, GetComputerNameExW, GetConsoleMode, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetEnvironmentStringsW, GetEnvironmentVariableW, GetExitCodeProcess, GetFileAttributesW, GetFileInformationByHandle, GetFileInformationByHandleEx, GetFullPathNameW, GetLastError, GetModuleFileNameW, GetModuleHandleA, GetProcAddress, GetProcessHeap, GetProcessIoCounters, GetProcessTimes, GetStdHandle, GetSystemDirectoryW, GetSystemInfo, GetSystemTimePreciseAsFileTime, GetSystemTimes, GetTickCount64, GetWindowsDirectoryW, GlobalMemoryStatusEx, HeapAlloc, HeapFree, HeapReAlloc, InitOnceBeginInitialize, InitOnceComplete, InitializeCriticalSection, InitializeProcThreadAttributeList, IsDebuggerPresent, K32GetPerformanceInfo, LeaveCriticalSection, LocalFree, MultiByteToWideChar, OpenProcess, QueryPerformanceCounter, QueryPerformanceFrequency, RaiseException, ReadFileEx, ReadProcessMemory, RtlCaptureContext, RtlLookupFunctionEntry, RtlUnwindEx, RtlVirtualUnwind, SetFileInformationByHandle, SetFilePointerEx, SetLastError, SetThreadExecutionState, SetThreadStackGuarantee, SetUnhandledExceptionFilter, SetWaitableTimer, Sleep, SleepEx, SwitchToThread, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UpdateProcThreadAttribute, VirtualProtect, VirtualQuery, VirtualQueryEx, WaitForSingleObject, WriteConsoleW, WriteFileEx, __C_specific_handler
api-ms-win-crt-environment-l1-1-0.dll__p__environ, __p__wenviron
api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, calloc, free, malloc
api-ms-win-crt-math-l1-1-0.dll__setusermatherr
api-ms-win-crt-private-l1-1-0.dllmemcmp, memcpy, memmove
api-ms-win-crt-runtime-l1-1-0.dll__p___argc, __p___argv, __p___wargv, _cexit, _configure_narrow_argv, _configure_wide_argv, _crt_at_quick_exit, _crt_atexit, _exit, _fpreset, _initialize_narrow_environment, _initialize_wide_environment, _initterm, _set_app_type, _set_invalid_parameter_handler, abort, exit, signal
api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, __p__commode, __p__fmode, __stdio_common_vfprintf, __stdio_common_vfwprintf, fwrite
api-ms-win-crt-string-l1-1-0.dllmemset, strlen, strncmp, wcslen
api-ms-win-crt-time-l1-1-0.dll__daylight, __timezone, __tzname, _tzset
ADVAPI32.dllCopySid, GetLengthSid, GetTokenInformation, IsValidSid, OpenProcessToken, RegCloseKey, RegCreateKeyExW, RegOpenKeyExW, RegQueryValueExW, RegSetValueExW, SystemFunction036
ntdll.dllNtQueryInformationProcess, NtQuerySystemInformation, NtWriteFile, RtlGetVersion, RtlNtStatusToDosError
bcrypt.dllBCryptGenRandom
ole32.dllCoCreateInstance, CoInitializeEx, CoInitializeSecurity, CoSetProxyBlanket, PropVariantClear
oleaut32.dllGetErrorInfo, SafeArrayAccessData, SafeArrayDestroy, SafeArrayUnaccessData, SysAllocStringLen, SysFreeString, SysStringLen, VariantClear
pdh.dllPdhAddEnglishCounterW, PdhCloseQuery, PdhCollectQueryData, PdhGetFormattedCounterValue, PdhOpenQueryA, PdhRemoveCounter
powrprof.dllCallNtPowerInformation
propsys.dllPropVariantToBSTR, VariantToPropVariant
psapi.dllGetModuleFileNameExW
shell32.dllCommandLineToArgvW, ShellExecuteExW
api-ms-win-core-synch-l1-2-0.dllWaitOnAddress, WakeByAddressAll, WakeByAddressSingle
bcryptprimitives.dllProcessPrng
No network behavior found

Click to jump to process

Click to jump to process

Target ID:0
Start time:22:45:04
Start date:13/10/2024
Path:C:\Users\user\Desktop\CSh#U0430rk F1 x.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\CSh#U0430rk F1 x.exe"
Imagebase:0x7ff68c920000
File size:30'524'416 bytes
MD5 hash:152025C926EDF53603411541F0F259C0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:5.8%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:58.3%
    Total number of Nodes:1274
    Total number of Limit Nodes:32
    execution_graph 26189 7ff68c959fe9 129 API calls 26190 7ff68c9541eb RtlReAllocateHeap memcmp HeapAlloc 26191 7ff68c95a33a 11 API calls 26293 7ff68c959fe9 39 API calls 26194 7ff68c9339f0 53 API calls 26295 7ff68c922a80 HeapFree HeapFree 26296 7ff68c930210 220 API calls 26199 7ff68c9211b9 SetUnhandledExceptionFilter malloc __acrt_iob_func __stdio_common_vfprintf 26201 7ff68c9219c0 HeapFree HeapFree HeapFree 26014 7ff68c92c3c7 26015 7ff68c92c41a 26014->26015 26016 7ff68c922c70 8 API calls 26015->26016 26017 7ff68c92c4a4 26016->26017 26018 7ff68c92c930 HeapFree 26017->26018 26020 7ff68c961800 21 API calls 26017->26020 26021 7ff68c92ca5d 26018->26021 26039 7ff68c92c4cb 26020->26039 26023 7ff68c956580 48 API calls 26021->26023 26022 7ff68c92c831 26024 7ff68c92c83c HeapFree 26022->26024 26029 7ff68c92c852 26022->26029 26040 7ff68c92cb5f 26023->26040 26024->26029 26027 7ff68c92c8fd 26027->26018 26028 7ff68c92c91a HeapFree 26027->26028 26028->26018 26029->26018 26029->26027 26031 7ff68c92c8e5 HeapFree 26029->26031 26031->26029 26032 7ff68c960a50 HeapAlloc 26032->26039 26033 7ff68c92c658 memcpy 26033->26039 26034 7ff68c92d3d5 26035 7ff68c9609e0 95 API calls 26034->26035 26037 7ff68c92d3da 26035->26037 26036 7ff68c956580 48 API calls 26036->26040 26038 7ff68c92c7e1 26038->26022 26046 7ff68c9246a0 HeapFree 26038->26046 26039->26018 26039->26022 26039->26032 26039->26033 26039->26038 26042 7ff68c92c766 memcmp 26039->26042 26043 7ff68c92c7a5 HeapFree 26039->26043 26044 7ff68c9246a0 HeapFree 26039->26044 26045 7ff68c928a40 memcmp 26039->26045 26040->26034 26040->26036 26041 7ff68c9609e0 95 API calls 26040->26041 26041->26040 26042->26039 26043->26039 26044->26039 26045->26039 26046->26038 24999 7ff68c94ce20 25000 7ff68c94ce4e 24999->25000 25001 7ff68c94ce6e 25000->25001 25079 7ff68c95f4a0 7 API calls 25000->25079 25003 7ff68c94ce9a 25001->25003 25080 7ff68c956220 23 API calls 25001->25080 25004 7ff68c94ced2 25003->25004 25082 7ff68c956220 23 API calls 25003->25082 25007 7ff68c950180 33 API calls 25004->25007 25009 7ff68c94cede 25007->25009 25008 7ff68c94ce83 25010 7ff68c94d1ca 25008->25010 25012 7ff68c94ceb3 25008->25012 25081 7ff68c94cbc0 HeapFree 25008->25081 25046 7ff68c94c5f0 25009->25046 25089 7ff68c952710 WaitOnAddress GetLastError 25010->25089 25012->25004 25012->25010 25083 7ff68c94cbc0 HeapFree 25012->25083 25018 7ff68c94d1d4 25020 7ff68c94d19b 25088 7ff68c952710 WaitOnAddress GetLastError 25020->25088 25021 7ff68c94cf54 WakeByAddressAll 25022 7ff68c94cf6f WakeByAddressSingle 25021->25022 25024 7ff68c94cf77 25021->25024 25022->25024 25024->25010 25025 7ff68c94cfc9 25024->25025 25063 7ff68c94ac60 25024->25063 25025->25010 25027 7ff68c94cffe WakeByAddressAll 25025->25027 25028 7ff68c94d019 WakeByAddressSingle 25027->25028 25029 7ff68c94d021 25027->25029 25028->25029 25030 7ff68c94c850 20 API calls 25029->25030 25031 7ff68c94d041 25030->25031 25031->25010 25032 7ff68c94d053 25031->25032 25033 7ff68c94d075 25032->25033 25084 7ff68c94c900 HeapFree HeapFree 25032->25084 25035 7ff68c94d090 25033->25035 25085 7ff68c94c900 HeapFree HeapFree 25033->25085 25037 7ff68c94d0b9 HeapFree 25035->25037 25039 7ff68c94d185 HeapFree 25035->25039 25038 7ff68c94d0d5 25037->25038 25045 7ff68c94d0e2 25037->25045 25086 7ff68c94c970 10 API calls 25038->25086 25039->25035 25041 7ff68c94d12a 25042 7ff68c94d155 25041->25042 25087 7ff68c94cc10 HeapFree WakeByAddressSingle HeapFree HeapFree 25041->25087 25044 7ff68c94d119 HeapFree 25044->25041 25045->25041 25045->25044 25047 7ff68c960a50 HeapAlloc 25046->25047 25048 7ff68c94c62a 25047->25048 25049 7ff68c94c690 25048->25049 25050 7ff68c94c633 memset 25048->25050 25051 7ff68c94c850 25049->25051 25050->25049 25052 7ff68c94c8d3 25051->25052 25053 7ff68c94c861 TlsGetValue 25051->25053 25090 7ff68c951460 14 API calls 25052->25090 25055 7ff68c94c870 25053->25055 25062 7ff68c94c8c4 25053->25062 25057 7ff68c960a50 HeapAlloc 25055->25057 25055->25062 25056 7ff68c94c8df TlsGetValue 25056->25055 25056->25062 25058 7ff68c94c885 25057->25058 25059 7ff68c94c88a TlsGetValue TlsSetValue 25058->25059 25060 7ff68c94c8f0 25058->25060 25061 7ff68c94c8b3 HeapFree 25059->25061 25059->25062 25061->25062 25062->25010 25062->25020 25062->25021 25071 7ff68c94ac7d 25063->25071 25074 7ff68c94b31c 25063->25074 25065 7ff68c94b32d 25066 7ff68c94b540 4 API calls 25065->25066 25066->25074 25069 7ff68c94b020 SwitchToThread 25069->25071 25070 7ff68c94b0b9 SwitchToThread 25070->25071 25071->25065 25071->25069 25071->25070 25073 7ff68c94b180 SwitchToThread 25071->25073 25071->25074 25075 7ff68c94b210 SwitchToThread 25071->25075 25076 7ff68c94b110 SwitchToThread 25071->25076 25077 7ff68c94b278 HeapFree 25071->25077 25078 7ff68c94b850 122 API calls 25071->25078 25091 7ff68c94b380 25071->25091 25097 7ff68c94b540 25071->25097 25103 7ff68c94b640 WakeByAddressSingle WaitOnAddress GetLastError WaitOnAddress GetLastError 25071->25103 25104 7ff68c94bfa0 126 API calls 25071->25104 25073->25071 25074->25025 25075->25071 25076->25071 25077->25071 25078->25071 25079->25001 25080->25008 25081->25003 25082->25012 25083->25004 25084->25033 25085->25035 25086->25045 25087->25042 25088->25024 25089->25018 25090->25056 25092 7ff68c94b40e 25091->25092 25095 7ff68c94b3ae 25091->25095 25094 7ff68c94b4f6 25092->25094 25105 7ff68c94b850 122 API calls 25092->25105 25094->25071 25095->25092 25106 7ff68c94bfa0 126 API calls 25095->25106 25098 7ff68c94b625 25097->25098 25099 7ff68c94b558 25097->25099 25098->25071 25099->25098 25100 7ff68c94b5e0 WakeByAddressSingle 25099->25100 25102 7ff68c94b606 WakeByAddressSingle 25099->25102 25107 7ff68c952710 WaitOnAddress GetLastError 25099->25107 25100->25099 25100->25102 25102->25099 25103->25071 25104->25071 25105->25092 25106->25092 25107->25099 26300 7ff68c94ac20 TlsSetValue HeapFree 26207 7ff68c965e20 13 API calls 26301 7ff68c958d3e 41 API calls 26302 7ff68c926c32 GetErrorInfo 26303 7ff68c951030 10 API calls 26213 7ff68c9219d0 HeapFree HeapFree HeapFree HeapFree HeapFree 26214 7ff68c9579f0 72 API calls 26304 7ff68c958404 44 API calls 26216 7ff68c9555ff 28 API calls 26217 7ff68c950500 13 API calls 26306 7ff68c921010 _set_app_type __p__fmode __p__commode 26311 7ff68c958761 47 API calls 26223 7ff68c92856c 7 API calls 26224 7ff68c9587f5 46 API calls 26315 7ff68c954f73 36 API calls 26316 7ff68c95b772 36 API calls 26225 7ff68c968970 memcmp PdhGetFormattedCounterValue 26317 7ff68c94ff70 34 API calls 26318 7ff68c954f42 38 API calls 24815 7ff68c93293f 24816 7ff68c932956 24815->24816 24818 7ff68c932960 24816->24818 24905 7ff68c9259d0 HeapFree memcmp memcmp HeapAlloc 24816->24905 24819 7ff68c932a57 24818->24819 24820 7ff68c9329be 24818->24820 24821 7ff68c960a50 HeapAlloc 24819->24821 24822 7ff68c960a50 HeapAlloc 24820->24822 24823 7ff68c932a23 24821->24823 24822->24823 24824 7ff68c932a2c 24823->24824 24826 7ff68c933314 24823->24826 24906 7ff68c931a60 122 API calls 24824->24906 24828 7ff68c933374 GetLastError 24826->24828 24827 7ff68c932b2c 24907 7ff68c931a60 122 API calls 24827->24907 24830 7ff68c933380 24828->24830 24833 7ff68c93338f AddVectoredExceptionHandler SetThreadStackGuarantee GetCurrentThread SetThreadDescription 24830->24833 24831 7ff68c932b3f 24832 7ff68c960a50 HeapAlloc 24831->24832 24834 7ff68c932b60 24832->24834 24835 7ff68c960a50 HeapAlloc 24833->24835 24834->24826 24836 7ff68c932b69 memcpy 24834->24836 24839 7ff68c9333d9 24835->24839 24837 7ff68c932baf 24836->24837 24838 7ff68c932bd2 HeapFree 24837->24838 24841 7ff68c932be3 24837->24841 24838->24841 24892 7ff68c950180 24839->24892 24841->24826 24842 7ff68c960a50 HeapAlloc 24841->24842 24844 7ff68c932c2b 24842->24844 24843 7ff68c933432 24845 7ff68c932c3e memcpy 24844->24845 24846 7ff68c932c33 24844->24846 24847 7ff68c932c7f 24845->24847 24846->24826 24848 7ff68c932caa HeapFree 24847->24848 24849 7ff68c932cbb 24847->24849 24848->24849 24849->24826 24850 7ff68c960a50 HeapAlloc 24849->24850 24851 7ff68c932ceb 24850->24851 24851->24846 24852 7ff68c932cfe memcpy 24851->24852 24853 7ff68c932d48 24852->24853 24908 7ff68c9532f0 22 API calls 24853->24908 24855 7ff68c932dc2 24855->24826 24909 7ff68c953580 GetLastError 24855->24909 24857 7ff68c932ee2 CloseHandle 24857->24826 24858 7ff68c932ef3 24857->24858 24860 7ff68c932f3e memcpy 24858->24860 24861 7ff68c932ef5 24858->24861 24859 7ff68c932e23 24859->24826 24859->24828 24859->24857 24862 7ff68c932e84 memset 24859->24862 24863 7ff68c932f59 memcpy 24860->24863 24864 7ff68c960a50 HeapAlloc 24861->24864 24865 7ff68c932eb0 24862->24865 24866 7ff68c93303c HeapFree 24863->24866 24871 7ff68c93304d 24863->24871 24867 7ff68c932f06 24864->24867 24865->24826 24865->24857 24866->24871 24867->24826 24868 7ff68c932f0f memcpy 24867->24868 24869 7ff68c960a50 HeapAlloc 24868->24869 24870 7ff68c932f31 24869->24870 24870->24846 24870->24863 24871->24826 24872 7ff68c933145 CloseHandle CloseHandle 24871->24872 24873 7ff68c93315a CloseHandle 24872->24873 24874 7ff68c933162 24872->24874 24873->24874 24875 7ff68c93318a 24874->24875 24876 7ff68c933180 CloseHandle 24874->24876 24877 7ff68c93319a 24875->24877 24878 7ff68c933190 CloseHandle 24875->24878 24876->24875 24910 7ff68c924830 17 API calls 24877->24910 24878->24877 24880 7ff68c9331a7 24881 7ff68c9331bf HeapFree 24880->24881 24882 7ff68c9331d2 24880->24882 24881->24882 24883 7ff68c9331da HeapFree 24882->24883 24884 7ff68c9331eb 24882->24884 24883->24884 24885 7ff68c933209 24884->24885 24886 7ff68c9331f6 HeapFree 24884->24886 24887 7ff68c933229 HeapFree 24885->24887 24888 7ff68c933216 HeapFree 24885->24888 24886->24885 24889 7ff68c933246 24887->24889 24890 7ff68c93325a 9 API calls 24887->24890 24888->24887 24889->24890 24891 7ff68c93324c HeapFree 24889->24891 24891->24890 24911 7ff68c9508e0 24892->24911 24895 7ff68c950197 24897 7ff68c95019d 24895->24897 24901 7ff68c9501e1 24895->24901 24896 7ff68c9501d3 24904 7ff68c9501b8 24896->24904 24950 7ff68c94fe90 HeapFree 24896->24950 24925 7ff68c950810 24897->24925 24951 7ff68c950f00 HeapFree HeapFree 24901->24951 24902 7ff68c950226 24952 7ff68c955dc0 HeapFree 24902->24952 24904->24843 24905->24818 24906->24827 24907->24831 24908->24855 24909->24859 24910->24880 24912 7ff68c9508f5 TlsGetValue 24911->24912 24913 7ff68c950981 24911->24913 24914 7ff68c950904 24912->24914 24916 7ff68c950192 24912->24916 24954 7ff68c951460 14 API calls 24913->24954 24914->24916 24918 7ff68c960a50 HeapAlloc 24914->24918 24916->24895 24916->24896 24917 7ff68c95098d TlsGetValue 24917->24914 24917->24916 24919 7ff68c950919 24918->24919 24920 7ff68c9509a2 24919->24920 24921 7ff68c950922 TlsGetValue TlsSetValue 24919->24921 24921->24916 24922 7ff68c95094b 24921->24922 24923 7ff68c950961 HeapFree 24922->24923 24953 7ff68c94fe90 HeapFree 24922->24953 24923->24916 24926 7ff68c950828 TlsGetValue 24925->24926 24927 7ff68c9508b2 24925->24927 24929 7ff68c950853 24926->24929 24931 7ff68c950837 24926->24931 24955 7ff68c951460 14 API calls 24927->24955 24929->24904 24930 7ff68c9508be TlsGetValue 24930->24929 24930->24931 24931->24929 24932 7ff68c960a50 HeapAlloc 24931->24932 24933 7ff68c95086c 24932->24933 24934 7ff68c9508d3 24933->24934 24935 7ff68c950871 TlsGetValue TlsSetValue 24933->24935 24937 7ff68c9508f5 TlsGetValue 24934->24937 24938 7ff68c950981 24934->24938 24935->24929 24936 7ff68c950896 HeapFree 24935->24936 24936->24929 24939 7ff68c950972 24937->24939 24940 7ff68c950904 24937->24940 24957 7ff68c951460 14 API calls 24938->24957 24939->24904 24940->24939 24943 7ff68c960a50 HeapAlloc 24940->24943 24942 7ff68c95098d TlsGetValue 24942->24939 24942->24940 24944 7ff68c950919 24943->24944 24945 7ff68c9509a2 24944->24945 24946 7ff68c950922 TlsGetValue TlsSetValue 24944->24946 24946->24939 24947 7ff68c95094b 24946->24947 24948 7ff68c950961 HeapFree 24947->24948 24956 7ff68c94fe90 HeapFree 24947->24956 24948->24939 24950->24901 24951->24902 24952->24904 24953->24923 24954->24917 24955->24930 24956->24948 24957->24942 26228 7ff68c94cd40 13 API calls 26319 7ff68c951340 8 API calls 25110 7ff68c92c546 25111 7ff68c92a1e5 25110->25111 25112 7ff68c92c555 25110->25112 25248 7ff68c96a140 25111->25248 25115 7ff68c92c9e5 HeapFree 25118 7ff68c92ca5d 25115->25118 25117 7ff68c960a50 HeapAlloc 25120 7ff68c92a233 25117->25120 25360 7ff68c956580 25118->25360 25120->25115 25121 7ff68c960a50 HeapAlloc 25120->25121 25122 7ff68c92a2b0 25121->25122 25122->25115 25123 7ff68c960a50 HeapAlloc 25122->25123 25126 7ff68c92a372 25123->25126 25124 7ff68c92d3d5 25393 7ff68c9609e0 25124->25393 25126->25115 25129 7ff68c960a50 HeapAlloc 25126->25129 25128 7ff68c956580 48 API calls 25130 7ff68c92cb5f 25128->25130 25132 7ff68c92a421 25129->25132 25130->25124 25130->25128 25131 7ff68c9609e0 95 API calls 25130->25131 25131->25130 25132->25115 25133 7ff68c960a50 HeapAlloc 25132->25133 25134 7ff68c92a500 25133->25134 25134->25115 25135 7ff68c960a50 HeapAlloc 25134->25135 25136 7ff68c92a5be 25135->25136 25136->25115 25137 7ff68c960a50 HeapAlloc 25136->25137 25138 7ff68c92a681 25137->25138 25138->25115 25139 7ff68c960a50 HeapAlloc 25138->25139 25140 7ff68c92a755 25139->25140 25140->25115 25141 7ff68c960a50 HeapAlloc 25140->25141 25142 7ff68c92a812 25141->25142 25142->25115 25143 7ff68c960a50 HeapAlloc 25142->25143 25157 7ff68c92a8e0 25143->25157 25144 7ff68c92b243 25145 7ff68c92b24f HeapFree 25144->25145 25146 7ff68c92c3b4 HeapFree 25144->25146 25184 7ff68c92b270 25145->25184 25146->25144 25147 7ff68c92ab15 memcpy 25263 7ff68c969af0 25147->25263 25149 7ff68c96a140 9 API calls 25151 7ff68c92b40d 25149->25151 25150 7ff68c969af0 3 API calls 25150->25157 25151->25115 25275 7ff68c922c70 25151->25275 25152 7ff68c92c9a8 GetErrorInfo 25154 7ff68c92c9d0 25152->25154 25155 7ff68c92c9e7 SysFreeString 25154->25155 25156 7ff68c92c9db 25154->25156 25159 7ff68c92c9e0 25155->25159 25160 7ff68c92c9f4 SysFreeString 25155->25160 25156->25159 25156->25160 25157->25115 25157->25144 25157->25145 25157->25147 25157->25150 25157->25152 25157->25154 25158 7ff68c92ab9e SysFreeString 25157->25158 25161 7ff68c92abab SysFreeString 25157->25161 25164 7ff68c92abb8 HeapFree 25157->25164 25167 7ff68c92ca14 25157->25167 25168 7ff68c92b275 GetErrorInfo 25157->25168 25170 7ff68c92b2a4 25157->25170 25175 7ff68c960a50 HeapAlloc 25157->25175 25185 7ff68c92ae00 GetErrorInfo 25157->25185 25199 7ff68c92b31e 25157->25199 25203 7ff68c92b063 HeapFree 25157->25203 25204 7ff68c92b08b HeapFree 25157->25204 25206 7ff68c92b0d5 HeapFree 25157->25206 25208 7ff68c92b018 HeapFree 25157->25208 25396 7ff68c926ae0 RtlReAllocateHeap HeapAlloc 25157->25396 25158->25157 25159->25115 25163 7ff68c92ca01 HeapFree 25159->25163 25160->25115 25160->25163 25161->25157 25162 7ff68c92b681 25165 7ff68c92b698 HeapFree 25162->25165 25166 7ff68c92b6a9 25162->25166 25163->25167 25164->25157 25165->25166 25169 7ff68c96a140 9 API calls 25166->25169 25167->25115 25406 7ff68c9246a0 HeapFree 25167->25406 25168->25170 25174 7ff68c92b6d1 25169->25174 25170->25115 25178 7ff68c92b38a HeapFree 25170->25178 25179 7ff68c92b3a0 25170->25179 25173 7ff68c92b53e 25173->25115 25173->25162 25397 7ff68c9246a0 HeapFree 25173->25397 25174->25115 25176 7ff68c922c70 8 API calls 25174->25176 25175->25157 25177 7ff68c92b7b5 25176->25177 25177->25115 25292 7ff68c921660 25177->25292 25178->25179 25181 7ff68c92b3d1 HeapFree 25179->25181 25183 7ff68c92c234 HeapFree 25179->25183 25181->25184 25182 7ff68c92b820 25186 7ff68c960a50 HeapAlloc 25182->25186 25191 7ff68c92b827 25182->25191 25183->25179 25184->25149 25185->25157 25201 7ff68c92b84a 25186->25201 25187 7ff68c92ba05 25189 7ff68c92ba0a HeapFree 25187->25189 25190 7ff68c92ba1b 25187->25190 25188 7ff68c921660 5 API calls 25188->25201 25189->25190 25193 7ff68c92ba41 25190->25193 25399 7ff68c9246a0 HeapFree 25190->25399 25191->25187 25192 7ff68c92b9f1 HeapFree 25191->25192 25192->25191 25194 7ff68c92ba49 HeapFree 25193->25194 25195 7ff68c92ba5a 25193->25195 25194->25195 25202 7ff68c96a140 9 API calls 25195->25202 25199->25170 25200 7ff68c92b323 HeapFree 25199->25200 25200->25170 25201->25115 25201->25188 25201->25191 25398 7ff68c926ae0 RtlReAllocateHeap HeapAlloc 25201->25398 25205 7ff68c92ba82 25202->25205 25203->25157 25204->25157 25205->25115 25207 7ff68c922c70 8 API calls 25205->25207 25206->25157 25210 7ff68c92bb75 25207->25210 25208->25157 25209 7ff68c92bbc1 25211 7ff68c92bbc6 HeapFree 25209->25211 25212 7ff68c92bbd7 25209->25212 25210->25115 25210->25209 25400 7ff68c9246a0 HeapFree 25210->25400 25211->25212 25302 7ff68c969300 25212->25302 25215 7ff68c92bbf5 25316 7ff68c969530 25215->25316 25220 7ff68c969300 265 API calls 25221 7ff68c92bc22 25220->25221 25222 7ff68c969530 256 API calls 25221->25222 25223 7ff68c92bc2a GetTickCount64 25222->25223 25224 7ff68c925060 26 API calls 25223->25224 25225 7ff68c92bc3f 25224->25225 25226 7ff68c96a140 9 API calls 25225->25226 25227 7ff68c92bc59 25226->25227 25227->25115 25228 7ff68c922c70 8 API calls 25227->25228 25229 7ff68c92bd75 25228->25229 25229->25115 25246 7ff68c92bd80 25229->25246 25230 7ff68c92c247 25231 7ff68c92c1d1 25230->25231 25405 7ff68c9246a0 HeapFree 25230->25405 25232 7ff68c92c1e6 25231->25232 25233 7ff68c92c293 HeapFree 25231->25233 25232->25118 25237 7ff68c92c317 25232->25237 25233->25232 25238 7ff68c92c343 25237->25238 25239 7ff68c92c33e HeapFree 25237->25239 25240 7ff68c925060 26 API calls 25238->25240 25239->25238 25242 7ff68c92c350 25240->25242 25241 7ff68c92c191 25403 7ff68c9246a0 HeapFree 25241->25403 25244 7ff68c92c19e 25244->25231 25404 7ff68c9246a0 HeapFree 25244->25404 25246->25230 25246->25231 25246->25241 25247 7ff68c925b20 memcmp memcmp 25246->25247 25401 7ff68c9246a0 HeapFree 25246->25401 25402 7ff68c928a40 memcmp 25246->25402 25247->25246 25249 7ff68c96a188 25248->25249 25250 7ff68c96a250 GetErrorInfo 25249->25250 25251 7ff68c96a190 25249->25251 25262 7ff68c92a202 25250->25262 25252 7ff68c969af0 3 API calls 25251->25252 25251->25262 25253 7ff68c96a1a9 25252->25253 25254 7ff68c96a283 GetErrorInfo 25253->25254 25255 7ff68c96a1f0 25253->25255 25256 7ff68c96a2a4 25254->25256 25255->25256 25257 7ff68c96a1fe 25255->25257 25258 7ff68c96a2b2 SysFreeString 25256->25258 25256->25262 25259 7ff68c96a20b CoSetProxyBlanket 25257->25259 25260 7ff68c96a203 SysFreeString 25257->25260 25258->25262 25261 7ff68c96a2da GetErrorInfo 25259->25261 25259->25262 25260->25259 25261->25262 25262->25115 25262->25117 25264 7ff68c969b20 25263->25264 25265 7ff68c969b05 25263->25265 25264->25157 25266 7ff68c960a50 HeapAlloc 25265->25266 25268 7ff68c969db9 25265->25268 25273 7ff68c969c04 25266->25273 25267 7ff68c969e45 25267->25157 25268->25267 25408 7ff68c969e70 HeapAlloc HeapReAlloc 25268->25408 25271 7ff68c969d86 25271->25264 25272 7ff68c969d8b HeapFree 25271->25272 25272->25264 25273->25268 25274 7ff68c969d50 25273->25274 25407 7ff68c969dd0 HeapAlloc HeapReAlloc 25273->25407 25274->25268 25274->25271 25276 7ff68c922ca0 25275->25276 25277 7ff68c969af0 3 API calls 25275->25277 25278 7ff68c969af0 3 API calls 25276->25278 25277->25276 25279 7ff68c922cae 25278->25279 25280 7ff68c922d08 25279->25280 25281 7ff68c922d00 SysFreeString 25279->25281 25282 7ff68c922d0d SysFreeString 25280->25282 25283 7ff68c922d15 25280->25283 25281->25280 25282->25283 25284 7ff68c960a50 HeapAlloc 25283->25284 25285 7ff68c922d4b 25284->25285 25288 7ff68c922e82 25285->25288 25409 7ff68c926ae0 RtlReAllocateHeap HeapAlloc 25285->25409 25287 7ff68c922f00 25287->25173 25288->25287 25289 7ff68c922ec1 25288->25289 25410 7ff68c9246a0 HeapFree 25288->25410 25289->25287 25290 7ff68c922ec6 HeapFree 25289->25290 25290->25287 25295 7ff68c92167a 25292->25295 25293 7ff68c9217ba 25293->25182 25294 7ff68c92196f 25297 7ff68c9219e7 25294->25297 25411 7ff68c950c30 HeapFree HeapFree HeapFree 25294->25411 25295->25293 25295->25294 25298 7ff68c960a50 HeapAlloc 25295->25298 25301 7ff68c921909 memcpy 25295->25301 25297->25182 25300 7ff68c921904 25298->25300 25300->25294 25300->25301 25301->25293 25412 7ff68c961800 25302->25412 25305 7ff68c969529 25306 7ff68c960a50 HeapAlloc 25307 7ff68c969343 25306->25307 25307->25305 25308 7ff68c96934c memset GlobalMemoryStatusEx 25307->25308 25309 7ff68c96942c GetLastError 25308->25309 25310 7ff68c969431 K32GetPerformanceInfo 25308->25310 25309->25310 25311 7ff68c96947b 25310->25311 25425 7ff68c9618d0 25311->25425 25313 7ff68c9694dd 25314 7ff68c961cd0 253 API calls 25313->25314 25315 7ff68c9694fe memcpy 25314->25315 25315->25215 25317 7ff68c96956c 25316->25317 25318 7ff68c969575 K32GetPerformanceInfo 25317->25318 25319 7ff68c969570 GetLastError 25317->25319 25320 7ff68c9695bb 25318->25320 25319->25318 25321 7ff68c9618d0 39 API calls 25320->25321 25322 7ff68c969613 25321->25322 25489 7ff68c961cd0 25322->25489 25325 7ff68c925060 25326 7ff68c925352 25325->25326 25351 7ff68c925080 25325->25351 25327 7ff68c925370 HeapFree 25326->25327 25346 7ff68c92535e 25326->25346 25329 7ff68c92536b 25327->25329 25327->25346 25328 7ff68c92531e 25328->25326 25330 7ff68c92533d HeapFree 25328->25330 25331 7ff68c925422 HeapFree 25329->25331 25337 7ff68c925433 25329->25337 25330->25326 25331->25337 25332 7ff68c925501 25332->25220 25333 7ff68c9253b0 HeapFree 25333->25346 25334 7ff68c92511f HeapFree 25334->25351 25335 7ff68c9254ca 25339 7ff68c9254db CloseHandle 25335->25339 25340 7ff68c9254e4 25335->25340 25336 7ff68c9253c9 HeapFree 25336->25346 25337->25332 25337->25335 25348 7ff68c925475 PdhRemoveCounter 25337->25348 25338 7ff68c92518a HeapFree 25338->25351 25339->25340 25344 7ff68c925506 GetLastError 25339->25344 25347 7ff68c92551c PdhCloseQuery 25340->25347 25350 7ff68c9254f5 25340->25350 25341 7ff68c9253f0 HeapFree 25345 7ff68c925408 HeapFree 25341->25345 25341->25346 25342 7ff68c925160 HeapFree RtlFreeHeap 25342->25351 25343 7ff68c9251e0 HeapFree 25349 7ff68c925204 HeapFree 25343->25349 25343->25351 25344->25347 25344->25350 25345->25346 25346->25329 25346->25333 25346->25336 25346->25341 25346->25345 25347->25332 25347->25350 25348->25335 25348->25337 25349->25351 25350->25332 25356 7ff68c9255a6 HeapFree 25350->25356 25351->25328 25351->25334 25351->25338 25351->25342 25351->25343 25351->25349 25352 7ff68c92527a HeapFree 25351->25352 25353 7ff68c925250 HeapFree RtlFreeHeap 25351->25353 25354 7ff68c9252c0 HeapFree 25351->25354 25355 7ff68c9252e4 HeapFree 25351->25355 25357 7ff68c925310 25351->25357 25352->25351 25353->25351 25354->25351 25354->25355 25355->25351 25356->25350 26000 7ff68c9269e0 CloseHandle 25357->26000 25361 7ff68c95659b 25360->25361 25362 7ff68c95660c 25360->25362 26003 7ff68c956220 23 API calls 25361->26003 25363 7ff68c950810 25 API calls 25362->25363 25365 7ff68c956613 25363->25365 25368 7ff68c9508e0 20 API calls 25365->25368 25374 7ff68c956629 25365->25374 25385 7ff68c956607 25365->25385 25366 7ff68c9565a0 25366->25362 25370 7ff68c9565b7 25366->25370 25368->25374 25369 7ff68c9568b8 25369->25369 25372 7ff68c95677a 25370->25372 25373 7ff68c9565fe 25370->25373 25370->25385 25375 7ff68c9567d5 25372->25375 25378 7ff68c9567c2 HeapFree 25372->25378 25380 7ff68c9567b1 HeapFree 25372->25380 25373->25375 25373->25385 25374->25385 25390 7ff68c95666c 25374->25390 26004 7ff68c94fe90 HeapFree 25374->26004 26006 7ff68c952710 WaitOnAddress GetLastError 25374->26006 26007 7ff68c9509b0 25 API calls 25374->26007 25377 7ff68c9567df 25375->25377 25386 7ff68c956841 HeapFree 25375->25386 25389 7ff68c956830 HeapFree 25375->25389 25379 7ff68c95685a WakeByAddressSingle 25377->25379 25383 7ff68c9567e7 25377->25383 25378->25375 25382 7ff68c95676c 25379->25382 25379->25383 25380->25378 25382->25130 25383->25382 26005 7ff68c94cbc0 HeapFree 25383->26005 25384 7ff68c9566e1 25384->25385 25388 7ff68c95675b WakeByAddressSingle 25384->25388 25385->25382 26008 7ff68c952710 WaitOnAddress GetLastError 25385->26008 25386->25379 25386->25383 25387 7ff68c956730 HeapFree 25387->25384 25388->25385 25389->25386 25390->25384 25390->25385 25390->25387 25391 7ff68c95671f HeapFree 25390->25391 25391->25387 26009 7ff68c9609f0 25393->26009 25395 7ff68c9609e9 25396->25157 25397->25173 25398->25201 25399->25190 25400->25210 25401->25246 25402->25246 25403->25244 25404->25244 25405->25230 25406->25167 25407->25273 25408->25267 25409->25285 25410->25288 25411->25297 25413 7ff68c96181a TlsGetValue 25412->25413 25414 7ff68c9618a9 25412->25414 25416 7ff68c961829 25413->25416 25423 7ff68c961895 25413->25423 25429 7ff68c951460 14 API calls 25414->25429 25418 7ff68c96182b ProcessPrng 25416->25418 25416->25423 25417 7ff68c9618b5 TlsGetValue 25417->25416 25417->25423 25419 7ff68c960a50 HeapAlloc 25418->25419 25420 7ff68c96185a 25419->25420 25421 7ff68c9618ca 25420->25421 25422 7ff68c96185f TlsGetValue TlsSetValue 25420->25422 25422->25423 25424 7ff68c961884 HeapFree 25422->25424 25423->25305 25423->25306 25424->25423 25426 7ff68c961b6b PdhCollectQueryData 25425->25426 25427 7ff68c961ba9 25426->25427 25430 7ff68c962880 25427->25430 25429->25417 25431 7ff68c96311e 25430->25431 25432 7ff68c96289e GetSystemInfo 25430->25432 25433 7ff68c9628fb 25432->25433 25434 7ff68c962a97 25432->25434 25435 7ff68c960a50 HeapAlloc 25433->25435 25436 7ff68c960a50 HeapAlloc 25434->25436 25439 7ff68c96291a 25435->25439 25438 7ff68c962b7c 25436->25438 25437 7ff68c963161 25438->25437 25475 7ff68c967db0 17 API calls 25438->25475 25439->25437 25443 7ff68c9629cc 25439->25443 25471 7ff68c967e60 RtlReAllocateHeap HeapAlloc HeapFree 25439->25471 25442 7ff68c962bab 25476 7ff68c967db0 17 API calls 25442->25476 25445 7ff68c960a50 HeapAlloc 25443->25445 25447 7ff68c9629df 25445->25447 25446 7ff68c962bb5 25477 7ff68c967db0 17 API calls 25446->25477 25447->25437 25472 7ff68c967db0 17 API calls 25447->25472 25450 7ff68c962a2c 25473 7ff68c967db0 17 API calls 25450->25473 25452 7ff68c962a38 25474 7ff68c967db0 17 API calls 25452->25474 25454 7ff68c962bbf 25455 7ff68c960a50 HeapAlloc 25454->25455 25456 7ff68c962ccf 25455->25456 25456->25437 25457 7ff68c962ce3 memcpy 25456->25457 25458 7ff68c962d0a 25457->25458 25459 7ff68c962cf9 HeapFree 25457->25459 25478 7ff68c967f10 HeapAlloc HeapFree 25458->25478 25459->25458 25460 7ff68c962a44 25462 7ff68c967db0 17 API calls 25460->25462 25462->25460 25463 7ff68c962d26 25464 7ff68c960a50 HeapAlloc 25463->25464 25465 7ff68c962d87 25464->25465 25465->25437 25467 7ff68c962f02 memcpy 25465->25467 25468 7ff68c960a50 HeapAlloc 25465->25468 25469 7ff68c962f51 memcpy 25465->25469 25479 7ff68c933590 25465->25479 25487 7ff68c968100 17 API calls 25465->25487 25467->25465 25467->25469 25468->25465 25469->25465 25471->25439 25472->25450 25473->25452 25474->25460 25475->25442 25476->25446 25477->25454 25478->25463 25480 7ff68c9335c1 25479->25480 25482 7ff68c9335af 25479->25482 25484 7ff68c9336e6 25480->25484 25486 7ff68c93369a memcpy 25480->25486 25488 7ff68c9334a0 HeapReAlloc HeapAlloc 25480->25488 25482->25480 25485 7ff68c960a50 HeapAlloc 25482->25485 25484->25465 25485->25480 25486->25484 25487->25465 25488->25486 25490 7ff68c960a50 HeapAlloc 25489->25490 25497 7ff68c961d0a 25490->25497 25491 7ff68c9627c4 25492 7ff68c961d6d NtQuerySystemInformation 25493 7ff68c961e0c 25492->25493 25494 7ff68c961d88 GetErrorInfo 25492->25494 25496 7ff68c960a50 HeapAlloc 25493->25496 25494->25497 25522 7ff68c961ebb 25494->25522 25500 7ff68c961e30 25496->25500 25497->25491 25497->25492 25570 7ff68c926ae0 RtlReAllocateHeap HeapAlloc 25497->25570 25498 7ff68c92bbfd 25498->25325 25499 7ff68c96276e HeapFree 25499->25498 25500->25491 25501 7ff68c961e92 25500->25501 25571 7ff68c9627d0 RtlReAllocateHeap HeapAlloc 25500->25571 25503 7ff68c961eb5 GetSystemTimePreciseAsFileTime 25501->25503 25505 7ff68c962880 38 API calls 25501->25505 25506 7ff68c961f1d 25503->25506 25505->25503 25506->25491 25507 7ff68c94c850 20 API calls 25506->25507 25508 7ff68c961fed 25507->25508 25508->25491 25509 7ff68c962006 25508->25509 25543 7ff68c94d1e0 25508->25543 25554 7ff68c963170 25509->25554 25513 7ff68c96205d HeapFree 25514 7ff68c96206e 25513->25514 25525 7ff68c9620bc 25514->25525 25578 7ff68c926ae0 RtlReAllocateHeap HeapAlloc 25514->25578 25515 7ff68c9625d1 25516 7ff68c9625cc 25515->25516 25517 7ff68c962604 25515->25517 25516->25515 25516->25517 25576 7ff68c963c60 11 API calls 25516->25576 25521 7ff68c96260f HeapFree 25517->25521 25532 7ff68c962622 25517->25532 25518 7ff68c9620fd HeapFree 25518->25525 25530 7ff68c9621a6 25518->25530 25519 7ff68c962360 memcpy 25537 7ff68c9621af 25519->25537 25521->25532 25522->25498 25522->25499 25524 7ff68c962137 memcpy 25524->25525 25527 7ff68c962169 HeapFree 25524->25527 25525->25518 25525->25524 25525->25537 25572 7ff68c926ae0 RtlReAllocateHeap HeapAlloc 25525->25572 25527->25525 25528 7ff68c9625b7 25575 7ff68c963fb0 8 API calls 25528->25575 25529 7ff68c96224b 25529->25530 25573 7ff68c963c60 11 API calls 25529->25573 25530->25529 25533 7ff68c96226a HeapFree 25530->25533 25534 7ff68c962210 HeapFree 25530->25534 25530->25537 25532->25522 25538 7ff68c962660 25532->25538 25533->25534 25534->25530 25534->25537 25536 7ff68c9624d0 memcpy memcpy 25536->25537 25539 7ff68c96257d 25536->25539 25537->25515 25537->25517 25537->25519 25537->25528 25537->25536 25541 7ff68c96227d memcpy 25537->25541 25577 7ff68c963c60 11 API calls 25538->25577 25539->25537 25574 7ff68c963c60 11 API calls 25539->25574 25541->25537 25544 7ff68c94d1fd 25543->25544 25545 7ff68c94d215 25543->25545 25547 7ff68c94d20d 25544->25547 25548 7ff68c94d2d0 25544->25548 25551 7ff68c94d25d 25544->25551 25579 7ff68c950240 25545->25579 25547->25509 25588 7ff68c94d300 25548->25588 25551->25547 25552 7ff68c94d2b2 HeapFree 25551->25552 25553 7ff68c94d2a1 HeapFree 25551->25553 25552->25547 25553->25552 25567 7ff68c9631d3 25554->25567 25555 7ff68c963919 25556 7ff68c960a50 HeapAlloc 25555->25556 25557 7ff68c962058 25555->25557 25556->25557 25557->25513 25557->25514 25558 7ff68c9519c0 3 API calls 25558->25567 25559 7ff68c960a50 HeapAlloc 25559->25567 25560 7ff68c9635e3 OpenProcess 25561 7ff68c963608 GetLastError OpenProcess 25560->25561 25563 7ff68c9636de GetLastError 25561->25563 25562 7ff68c963402 GetProcessTimes 25562->25567 25563->25567 25565 7ff68c9660b0 176 API calls 25566 7ff68c963840 memcpy 25565->25566 25566->25567 25567->25555 25567->25557 25567->25558 25567->25559 25567->25560 25567->25562 25567->25565 25568 7ff68c9638a0 memcpy 25567->25568 25783 7ff68c9660b0 25567->25783 25947 7ff68c9649a0 25567->25947 25568->25567 25570->25497 25571->25500 25572->25525 25573->25529 25574->25539 25575->25516 25576->25516 25577->25532 25578->25525 25580 7ff68c9502cf 25579->25580 25582 7ff68c95025a 25579->25582 25587 7ff68c94d300 92 API calls 25580->25587 25581 7ff68c950382 25581->25544 25582->25580 25582->25581 25583 7ff68c9502a6 WaitOnAddress 25582->25583 25583->25582 25584 7ff68c9502c6 GetLastError 25583->25584 25584->25582 25585 7ff68c950370 25585->25581 25586 7ff68c95037a WakeByAddressAll 25585->25586 25586->25581 25587->25585 25589 7ff68c94d326 25588->25589 25590 7ff68c94d5d8 25588->25590 25598 7ff68c94d5e0 25589->25598 25593 7ff68c94d2f6 25593->25509 25595 7ff68c94d3cc 25595->25593 25596 7ff68c94d471 HeapFree 25595->25596 25597 7ff68c94d460 HeapFree 25595->25597 25596->25593 25597->25596 25599 7ff68c94da48 25598->25599 25600 7ff68c94d62e 25598->25600 25728 7ff68c94f170 25599->25728 25694 7ff68c9527c0 25600->25694 25604 7ff68c94d6c0 25606 7ff68c9527c0 17 API calls 25604->25606 25605 7ff68c94f170 2 API calls 25613 7ff68c94dad2 25605->25613 25617 7ff68c94d6da 25606->25617 25607 7ff68c94da04 GetSystemInfo 25607->25599 25608 7ff68c94d648 25608->25604 25609 7ff68c94d6b2 HeapFree 25608->25609 25614 7ff68c94d9a6 25608->25614 25609->25604 25610 7ff68c94d743 25610->25607 25611 7ff68c94d74c HeapFree 25610->25611 25611->25607 25612 7ff68c94e5ce 25613->25612 25618 7ff68c960a50 HeapAlloc 25613->25618 25619 7ff68c94dcaa 25613->25619 25615 7ff68c94d9eb HeapFree 25614->25615 25616 7ff68c94d9ff 25614->25616 25615->25616 25616->25599 25616->25607 25617->25607 25617->25610 25617->25614 25618->25613 25620 7ff68c94f170 2 API calls 25619->25620 25621 7ff68c94dd35 25620->25621 25622 7ff68c94f170 2 API calls 25621->25622 25624 7ff68c94dd46 25622->25624 25623 7ff68c960a50 HeapAlloc 25623->25624 25624->25612 25624->25623 25625 7ff68c94de6e 25624->25625 25625->25612 25626 7ff68c960a50 HeapAlloc 25625->25626 25627 7ff68c94def4 25625->25627 25626->25627 25627->25612 25628 7ff68c94df66 HeapFree 25627->25628 25629 7ff68c94df77 25627->25629 25628->25629 25630 7ff68c960a50 HeapAlloc 25629->25630 25631 7ff68c94df90 25630->25631 25631->25612 25632 7ff68c960a50 HeapAlloc 25631->25632 25633 7ff68c94e054 25632->25633 25633->25612 25634 7ff68c94e05d memset 25633->25634 25635 7ff68c960a50 HeapAlloc 25634->25635 25667 7ff68c94e0fb 25635->25667 25637 7ff68c94ed93 25676 7ff68c94e572 25637->25676 25753 7ff68c94c900 HeapFree HeapFree 25637->25753 25639 7ff68c94edbb 25641 7ff68c94ee13 25639->25641 25642 7ff68c94ee02 HeapFree 25639->25642 25640 7ff68c94d36e 25640->25595 25693 7ff68c94c970 10 API calls 25640->25693 25643 7ff68c94ee3f HeapFree 25641->25643 25644 7ff68c94ee50 25641->25644 25642->25641 25643->25644 25646 7ff68c94ee8d 25644->25646 25647 7ff68c94ee7c HeapFree 25644->25647 25645 7ff68c94c850 20 API calls 25645->25667 25646->25640 25648 7ff68c94eeb9 HeapFree 25646->25648 25647->25646 25648->25640 25649 7ff68c9527c0 17 API calls 25649->25667 25650 7ff68c94e5d9 memcpy 25650->25667 25651 7ff68c94f083 25653 7ff68c94f09a 25651->25653 25654 7ff68c94f0f0 HeapFree 25651->25654 25652 7ff68c94c5f0 2 API calls 25652->25667 25655 7ff68c94f0b5 25653->25655 25760 7ff68c94c900 HeapFree HeapFree 25653->25760 25654->25653 25654->25655 25656 7ff68c94f0c3 25655->25656 25762 7ff68c94c900 HeapFree HeapFree 25655->25762 25666 7ff68c94ef1e 25656->25666 25761 7ff68c94c970 10 API calls 25656->25761 25657 7ff68c94ea4d HeapReAlloc 25657->25612 25657->25667 25658 7ff68c94ed3f HeapFree 25658->25667 25663 7ff68c94e4b5 memcpy 25668 7ff68c94c850 20 API calls 25663->25668 25757 7ff68c94f210 HeapFree HeapFree HeapFree 25666->25757 25667->25612 25667->25637 25667->25645 25667->25649 25667->25650 25667->25651 25667->25652 25667->25657 25667->25658 25667->25663 25669 7ff68c94e91d HeapFree 25667->25669 25673 7ff68c94e526 WakeByAddressAll 25667->25673 25675 7ff68c956220 23 API calls 25667->25675 25667->25676 25679 7ff68c960a50 HeapAlloc 25667->25679 25681 7ff68c94f14f 25667->25681 25685 7ff68c94ecc3 CloseHandle 25667->25685 25686 7ff68c94eef4 25667->25686 25732 7ff68c95ede0 25667->25732 25748 7ff68c952710 WaitOnAddress GetLastError 25667->25748 25749 7ff68c933520 HeapReAlloc HeapAlloc 25667->25749 25750 7ff68c94cbc0 HeapFree 25667->25750 25668->25667 25669->25667 25670 7ff68c94f04e 25670->25639 25759 7ff68c94c970 10 API calls 25670->25759 25671 7ff68c94ef41 25671->25612 25671->25670 25677 7ff68c94efe0 WakeByAddressSingle 25671->25677 25680 7ff68c94f03c WakeByAddressSingle 25671->25680 25758 7ff68c952710 WaitOnAddress GetLastError 25671->25758 25673->25667 25674 7ff68c94e541 WakeByAddressSingle 25673->25674 25674->25667 25675->25667 25754 7ff68c94f210 HeapFree HeapFree HeapFree 25676->25754 25677->25671 25679->25667 25680->25671 25681->25612 25763 7ff68c94cbc0 HeapFree 25681->25763 25687 7ff68c94e290 25685->25687 25688 7ff68c94ef0a 25686->25688 25755 7ff68c94cc10 HeapFree WakeByAddressSingle HeapFree HeapFree 25686->25755 25687->25667 25687->25676 25751 7ff68c94fe90 HeapFree 25687->25751 25752 7ff68c94cc10 HeapFree WakeByAddressSingle HeapFree HeapFree 25687->25752 25688->25666 25756 7ff68c94fe90 HeapFree 25688->25756 25693->25595 25764 7ff68c952b00 RtlReAllocateHeap HeapFree HeapAlloc 25694->25764 25696 7ff68c9527ea 25698 7ff68c9527ff 25696->25698 25704 7ff68c95285d 25696->25704 25697 7ff68c952855 25697->25608 25698->25697 25699 7ff68c952844 HeapFree 25698->25699 25703 7ff68c952833 HeapFree 25698->25703 25699->25697 25701 7ff68c952914 SetLastError GetEnvironmentVariableW 25702 7ff68c952932 GetLastError 25701->25702 25701->25704 25702->25704 25705 7ff68c952a0d GetLastError 25702->25705 25703->25699 25704->25701 25706 7ff68c95294b GetLastError 25704->25706 25708 7ff68c9529b6 25704->25708 25765 7ff68c926ae0 RtlReAllocateHeap HeapAlloc 25704->25765 25707 7ff68c952a29 HeapFree 25705->25707 25713 7ff68c9529fb 25705->25713 25706->25704 25714 7ff68c952aef 25706->25714 25707->25713 25710 7ff68c9529bf 25708->25710 25708->25714 25709 7ff68c952b46 25773 7ff68c952c80 RtlReAllocateHeap HeapAlloc 25709->25773 25766 7ff68c9519c0 25710->25766 25711 7ff68c952aac 25711->25697 25716 7ff68c952ab1 HeapFree 25711->25716 25713->25711 25717 7ff68c952a9b HeapFree 25713->25717 25721 7ff68c952a8a HeapFree 25713->25721 25714->25709 25718 7ff68c960a50 HeapAlloc 25714->25718 25716->25697 25717->25711 25718->25709 25719 7ff68c9529e8 HeapFree 25719->25713 25721->25717 25722 7ff68c952b8b 25723 7ff68c952c10 25722->25723 25724 7ff68c952c3a 25722->25724 25725 7ff68c952c4b 25723->25725 25726 7ff68c952c2a HeapFree 25723->25726 25724->25725 25774 7ff68c952e20 RtlReAllocateHeap HeapAlloc 25724->25774 25725->25608 25726->25725 25729 7ff68c94f1a1 25728->25729 25731 7ff68c94dabc 25728->25731 25729->25731 25776 7ff68c94f2d0 25729->25776 25731->25605 25733 7ff68c960a50 HeapAlloc 25732->25733 25734 7ff68c95ee05 25733->25734 25741 7ff68c95eeb0 25734->25741 25744 7ff68c95ee0e 25734->25744 25735 7ff68c95efb8 25735->25667 25736 7ff68c95eea3 25736->25667 25737 7ff68c95ef1f 25737->25735 25738 7ff68c95ef5e 25737->25738 25740 7ff68c95ef55 WakeByAddressSingle 25737->25740 25747 7ff68c95ef74 25738->25747 25782 7ff68c95eff0 HeapFree 25738->25782 25739 7ff68c95ee7e HeapFree GetLastError 25739->25736 25740->25738 25741->25737 25742 7ff68c95ef0e HeapFree 25741->25742 25742->25737 25743 7ff68c95ee6d HeapFree 25743->25739 25744->25736 25744->25739 25744->25743 25746 7ff68c95efa7 HeapFree 25746->25735 25747->25735 25747->25746 25748->25667 25749->25667 25750->25667 25751->25687 25752->25687 25753->25676 25754->25639 25755->25688 25756->25666 25757->25671 25758->25671 25759->25639 25760->25655 25761->25666 25762->25656 25763->25612 25764->25696 25765->25704 25767 7ff68c9519d5 25766->25767 25772 7ff68c9519f3 25766->25772 25768 7ff68c960a50 HeapAlloc 25767->25768 25767->25772 25768->25772 25769 7ff68c951bfb 25769->25713 25769->25719 25770 7ff68c951b7a memcpy 25770->25772 25772->25769 25772->25770 25775 7ff68c926ae0 RtlReAllocateHeap HeapAlloc 25772->25775 25773->25722 25774->25725 25775->25772 25777 7ff68c94f2e3 25776->25777 25778 7ff68c94f300 25776->25778 25777->25778 25779 7ff68c94f2ea HeapReAlloc 25777->25779 25780 7ff68c94f316 25778->25780 25781 7ff68c960a50 HeapAlloc 25778->25781 25779->25780 25780->25731 25781->25780 25782->25747 25784 7ff68c9660d5 25783->25784 25792 7ff68c96617e 25783->25792 25785 7ff68c96615b GetSystemTimes 25784->25785 25789 7ff68c966156 GetLastError 25784->25789 25787 7ff68c966179 GetLastError 25785->25787 25785->25792 25786 7ff68c9662e2 GetProcessIoCounters 25788 7ff68c966481 GetLastError 25786->25788 25790 7ff68c966237 25786->25790 25787->25792 25788->25790 25789->25785 25791 7ff68c966378 OpenProcessToken 25790->25791 25793 7ff68c9664ab 25790->25793 25796 7ff68c9664a6 GetLastError 25791->25796 25797 7ff68c96639e 25791->25797 25792->25786 25792->25790 25794 7ff68c96651d NtQueryInformationProcess 25793->25794 25795 7ff68c9667e0 25793->25795 25794->25795 25799 7ff68c966554 25794->25799 25798 7ff68c966903 25795->25798 25805 7ff68c96680b memset GetModuleFileNameExW 25795->25805 25806 7ff68c966886 25795->25806 25796->25793 25797->25793 25800 7ff68c9663b4 GetTokenInformation 25797->25800 25798->25567 25801 7ff68c966688 NtQueryInformationProcess 25799->25801 25802 7ff68c966565 ReadProcessMemory 25799->25802 25803 7ff68c9663dd GetLastError 25800->25803 25804 7ff68c9663fc GetProcessHeap 25800->25804 25801->25795 25812 7ff68c9666b9 25801->25812 25807 7ff68c9667db GetLastError 25802->25807 25808 7ff68c96658c ReadProcessMemory 25802->25808 25803->25804 25809 7ff68c96649a CloseHandle 25803->25809 25810 7ff68c966495 GetLastError 25804->25810 25811 7ff68c966414 HeapAlloc 25804->25811 25813 7ff68c966850 25805->25813 25806->25798 25815 7ff68c96689a HeapFree 25806->25815 25807->25795 25808->25807 25823 7ff68c9665ba 25808->25823 25809->25793 25809->25796 25810->25809 25811->25809 25814 7ff68c966429 GetTokenInformation 25811->25814 25812->25807 25819 7ff68c9666ff ReadProcessMemory 25812->25819 25822 7ff68c9519c0 3 API calls 25813->25822 25817 7ff68c96697e GetLastError 25814->25817 25818 7ff68c96644e 25814->25818 25815->25798 25816 7ff68c966b31 25826 7ff68c966b64 VirtualQueryEx 25816->25826 25837 7ff68c966cec 25816->25837 25980 7ff68c967650 GetProcessHeap HeapFree 25817->25980 25977 7ff68c967690 HeapAlloc CopySid GetLastError GetLastError 25818->25977 25819->25807 25844 7ff68c96672e 25819->25844 25822->25806 25823->25816 25824 7ff68c966621 25823->25824 25983 7ff68c96777b 95 API calls 25823->25983 25830 7ff68c966637 25824->25830 25831 7ff68c966a23 25824->25831 25825 7ff68c96645e 25832 7ff68c96646f 25825->25832 25833 7ff68c9669a0 25825->25833 25835 7ff68c966b92 25826->25835 25836 7ff68c966c91 25826->25836 25827 7ff68c96698b CloseHandle 25827->25793 25834 7ff68c96699b 25827->25834 25829 7ff68c96696b 25847 7ff68c96717f VirtualQueryEx 25829->25847 25872 7ff68c967247 25829->25872 25951 7ff68c9679f0 NtQueryInformationProcess 25830->25951 25840 7ff68c960a50 HeapAlloc 25831->25840 25978 7ff68c967650 GetProcessHeap HeapFree 25832->25978 25838 7ff68c9669d4 25833->25838 25839 7ff68c9669bf HeapFree 25833->25839 25834->25796 25856 7ff68c960a50 HeapAlloc 25835->25856 25924 7ff68c967028 25835->25924 25843 7ff68c966cd4 25836->25843 25864 7ff68c966cc0 HeapFree 25836->25864 25837->25795 25846 7ff68c960a50 HeapAlloc 25837->25846 25981 7ff68c967650 GetProcessHeap HeapFree 25838->25981 25839->25838 25849 7ff68c966a3b 25840->25849 25843->25837 25852 7ff68c966cdb HeapFree 25843->25852 25844->25829 25845 7ff68c966794 25844->25845 25990 7ff68c96777b 95 API calls 25844->25990 25853 7ff68c9667aa 25845->25853 25854 7ff68c967074 25845->25854 25855 7ff68c966dad 25846->25855 25857 7ff68c9671d6 25847->25857 25858 7ff68c9671a3 25847->25858 25861 7ff68c966a44 ReadProcessMemory 25849->25861 25849->25924 25850 7ff68c966644 25862 7ff68c966b14 25850->25862 25886 7ff68c966674 HeapFree 25850->25886 25851 7ff68c966477 25979 7ff68c967760 CloseHandle 25851->25979 25852->25837 25866 7ff68c9679f0 9 API calls 25853->25866 25875 7ff68c9677d0 4 API calls 25854->25875 25867 7ff68c966db6 ReadProcessMemory 25855->25867 25855->25924 25868 7ff68c966bed 25856->25868 25871 7ff68c967224 25857->25871 25892 7ff68c967210 HeapFree 25857->25892 25967 7ff68c9677d0 25858->25967 25859 7ff68c9669f1 25982 7ff68c967760 CloseHandle 25859->25982 25873 7ff68c966a6f 25861->25873 25874 7ff68c966aa0 GetLastError 25861->25874 25862->25816 25865 7ff68c966b20 HeapFree 25862->25865 25864->25836 25865->25816 25877 7ff68c9667b7 25866->25877 25878 7ff68c966ec7 GetLastError 25867->25878 25879 7ff68c966de7 25867->25879 25880 7ff68c966bf6 ReadProcessMemory 25868->25880 25868->25924 25871->25872 25882 7ff68c967234 HeapFree 25871->25882 25894 7ff68c960a50 HeapAlloc 25872->25894 25872->25924 25883 7ff68c966a76 25873->25883 25884 7ff68c966aa5 HeapFree 25873->25884 25874->25884 25885 7ff68c967081 25875->25885 25876 7ff68c96647f 25876->25793 25887 7ff68c96694d 25877->25887 25904 7ff68c9668c2 HeapFree 25877->25904 25888 7ff68c966ecc HeapFree 25878->25888 25879->25888 25910 7ff68c966df2 25879->25910 25889 7ff68c966c76 GetLastError 25880->25889 25890 7ff68c966c21 25880->25890 25882->25872 25984 7ff68c9678d0 25883->25984 25895 7ff68c966ad1 25884->25895 25901 7ff68c9678d0 4 API calls 25885->25901 25908 7ff68c96708b 25885->25908 25886->25850 25887->25829 25896 7ff68c966958 HeapFree 25887->25896 25888->25795 25900 7ff68c966ef0 HeapFree 25888->25900 25897 7ff68c966c7b HeapFree 25889->25897 25890->25897 25898 7ff68c966c28 25890->25898 25891 7ff68c96726e 25912 7ff68c9672cb HeapFree 25891->25912 25927 7ff68c9672df 25891->25927 25892->25857 25902 7ff68c96749c 25894->25902 25895->25862 25907 7ff68c966b00 HeapFree 25895->25907 25896->25829 25897->25836 25921 7ff68c966c62 HeapFree 25898->25921 25934 7ff68c966f49 25898->25934 25899 7ff68c966a8d HeapFree 25899->25895 25900->25795 25905 7ff68c9670c6 25901->25905 25906 7ff68c9674a5 ReadProcessMemory 25902->25906 25902->25924 25903 7ff68c96711d 25903->25829 25909 7ff68c967128 HeapFree 25903->25909 25904->25877 25905->25908 25914 7ff68c9670cb HeapFree 25905->25914 25915 7ff68c9675ad GetLastError 25906->25915 25916 7ff68c9674d8 25906->25916 25907->25895 25908->25903 25918 7ff68c967109 HeapFree 25908->25918 25909->25829 25911 7ff68c9519c0 3 API calls 25910->25911 25922 7ff68c966e34 25911->25922 25912->25891 25913 7ff68c96732f 25913->25872 25920 7ff68c967408 HeapFree 25913->25920 25914->25908 25917 7ff68c9675b2 HeapFree 25915->25917 25916->25917 25925 7ff68c9674e8 25916->25925 25923 7ff68c9675d8 HeapFree 25917->25923 25917->25924 25918->25908 25919 7ff68c96702d HeapFree RtlFreeHeap 25919->25844 25920->25872 25921->25898 25929 7ff68c966f17 25922->25929 25930 7ff68c966e75 25922->25930 25923->25924 25926 7ff68c9519c0 3 API calls 25925->25926 25933 7ff68c967524 25926->25933 25927->25913 25927->25924 25937 7ff68c9519c0 3 API calls 25927->25937 25945 7ff68c926a30 2 API calls 25927->25945 25928 7ff68c966f94 25928->25919 25931 7ff68c966f33 HeapFree 25929->25931 25932 7ff68c966f22 HeapFree 25929->25932 25935 7ff68c966e9b HeapFree 25930->25935 25936 7ff68c966eb0 25930->25936 25931->25795 25932->25931 25938 7ff68c967556 25933->25938 25939 7ff68c967601 25933->25939 25934->25919 25934->25924 25934->25928 25940 7ff68c9519c0 3 API calls 25934->25940 25963 7ff68c926a30 25934->25963 25935->25936 25936->25931 25937->25927 25941 7ff68c96759a 25938->25941 25942 7ff68c967580 HeapFree 25938->25942 25943 7ff68c96760c HeapFree 25939->25943 25944 7ff68c96761f HeapFree 25939->25944 25940->25934 25941->25944 25942->25941 25943->25944 25944->25924 25945->25927 25948 7ff68c9649b6 25947->25948 25950 7ff68c964a2d 25947->25950 25949 7ff68c94fdd0 2 API calls 25948->25949 25948->25950 25949->25950 25950->25568 25952 7ff68c967a4a 25951->25952 25953 7ff68c967a20 GetErrorInfo 25951->25953 25954 7ff68c960a50 HeapAlloc 25952->25954 25958 7ff68c967af2 25952->25958 25953->25952 25955 7ff68c967a8b 25954->25955 25956 7ff68c967a94 NtQueryInformationProcess 25955->25956 25957 7ff68c967b20 25955->25957 25959 7ff68c967ab8 25956->25959 25960 7ff68c967ae1 HeapFree 25956->25960 25958->25850 25961 7ff68c9678d0 4 API calls 25959->25961 25960->25958 25962 7ff68c967ace HeapFree 25961->25962 25962->25958 25964 7ff68c926a43 25963->25964 25966 7ff68c926ab7 25963->25966 25964->25966 25991 7ff68c94fdd0 25964->25991 25966->25934 25968 7ff68c9678c6 25967->25968 25969 7ff68c9677f2 25967->25969 25969->25968 25970 7ff68c960a50 HeapAlloc 25969->25970 25971 7ff68c967827 25970->25971 25971->25968 25972 7ff68c967830 ReadProcessMemory 25971->25972 25973 7ff68c96785b 25972->25973 25974 7ff68c967875 GetLastError 25972->25974 25975 7ff68c9671c5 25973->25975 25976 7ff68c967894 HeapFree 25973->25976 25974->25976 25975->25857 25975->25891 25976->25975 25977->25825 25978->25851 25979->25876 25980->25827 25981->25859 25982->25876 25983->25824 25988 7ff68c9678f3 25984->25988 25985 7ff68c967978 wcslen 25987 7ff68c9519c0 3 API calls 25985->25987 25986 7ff68c9679a8 25986->25899 25987->25988 25988->25985 25988->25986 25989 7ff68c926a30 2 API calls 25988->25989 25989->25988 25990->25845 25992 7ff68c94fde7 25991->25992 25995 7ff68c94fe04 25991->25995 25992->25995 25998 7ff68c94fe02 RtlReAllocateHeap 25992->25998 25993 7ff68c94fe16 25996 7ff68c960a50 HeapAlloc 25993->25996 25994 7ff68c94fe34 25997 7ff68c960a50 HeapAlloc 25994->25997 25995->25993 25995->25994 25999 7ff68c94fe20 25995->25999 25996->25999 25997->25999 25998->25995 25999->25966 26001 7ff68c9269fd GetLastError 26000->26001 26002 7ff68c925319 RtlFreeHeap 26000->26002 26001->26002 26002->25328 26003->25366 26004->25374 26005->25382 26006->25374 26007->25374 26008->25369 26010 7ff68c960a04 26009->26010 26011 7ff68c9609ff 26009->26011 26012 7ff68c950240 95 API calls 26010->26012 26011->25395 26013 7ff68c960a2d 26012->26013 26013->25395 26326 7ff68c94d39d 96 API calls 26233 7ff68c950500 15 API calls 24998 7ff68c921ba3 11 API calls 26329 7ff68c92e7aa 225 API calls 26330 7ff68c958bb3 55 API calls 26048 7ff68c9221b0 26049 7ff68c922200 26048->26049 26050 7ff68c922317 GetErrorInfo 26049->26050 26051 7ff68c922225 26049->26051 26056 7ff68c922344 26050->26056 26052 7ff68c92228d 26051->26052 26053 7ff68c92237f GetErrorInfo 26051->26053 26054 7ff68c9223a8 PropVariantClear 26052->26054 26053->26054 26055 7ff68c9223a0 SysFreeString 26053->26055 26054->26056 26055->26054 26057 7ff68c922465 SysFreeString 26056->26057 26089 7ff68c921d76 26056->26089 26057->26089 26058 7ff68c921e43 26059 7ff68c969af0 3 API calls 26058->26059 26060 7ff68c922ca0 26059->26060 26062 7ff68c969af0 3 API calls 26060->26062 26066 7ff68c922cae 26062->26066 26063 7ff68c92260c VariantClear 26063->26089 26064 7ff68c92257a VariantClear 26065 7ff68c922607 26064->26065 26064->26089 26068 7ff68c92298c HeapFree 26065->26068 26069 7ff68c9229a2 26065->26069 26070 7ff68c922d08 26066->26070 26071 7ff68c922d00 SysFreeString 26066->26071 26068->26069 26118 7ff68c9246a0 HeapFree 26069->26118 26073 7ff68c922d0d SysFreeString 26070->26073 26079 7ff68c922d15 26070->26079 26071->26070 26073->26079 26074 7ff68c9225db GetProcessHeap HeapFree 26074->26065 26074->26089 26075 7ff68c9229af 26076 7ff68c922b8b 26075->26076 26080 7ff68c9229e4 HeapFree 26075->26080 26077 7ff68c922b96 HeapFree 26076->26077 26078 7ff68c922ba9 26076->26078 26077->26078 26081 7ff68c960a50 HeapAlloc 26079->26081 26080->26075 26084 7ff68c922d4b 26081->26084 26082 7ff68c922802 memcmp 26082->26089 26083 7ff68c922860 HeapFree 26083->26089 26090 7ff68c922e82 26084->26090 26119 7ff68c926ae0 RtlReAllocateHeap HeapAlloc 26084->26119 26086 7ff68c960a50 HeapAlloc 26086->26089 26087 7ff68c921e55 memcpy 26087->26089 26088 7ff68c922f00 26089->26058 26089->26063 26089->26064 26089->26065 26089->26074 26089->26075 26089->26082 26089->26083 26089->26086 26089->26087 26093 7ff68c921e85 GetProcessHeap HeapAlloc 26089->26093 26095 7ff68c922090 GetErrorInfo 26089->26095 26097 7ff68c96b260 26089->26097 26112 7ff68c928530 26089->26112 26090->26088 26091 7ff68c922ec1 26090->26091 26120 7ff68c9246a0 HeapFree 26090->26120 26091->26088 26092 7ff68c922ec6 HeapFree 26091->26092 26092->26088 26093->26058 26096 7ff68c921eac 26093->26096 26095->26064 26096->26089 26099 7ff68c96b27d 26097->26099 26098 7ff68c96b2c1 26098->26089 26099->26098 26100 7ff68c96b335 26099->26100 26101 7ff68c96b3d0 26099->26101 26102 7ff68c96b260 HeapAlloc 26100->26102 26103 7ff68c960a50 HeapAlloc 26101->26103 26102->26098 26104 7ff68c96b3e9 26103->26104 26105 7ff68c96b3f2 26104->26105 26110 7ff68c96c7c9 26104->26110 26106 7ff68c96b260 HeapAlloc 26105->26106 26107 7ff68c96b406 26106->26107 26107->26098 26109 7ff68c96b421 HeapFree 26107->26109 26108 7ff68c96b260 HeapAlloc 26108->26110 26109->26098 26110->26108 26111 7ff68c96c88d 26110->26111 26111->26089 26113 7ff68c928553 26112->26113 26114 7ff68c933590 3 API calls 26113->26114 26117 7ff68c9287d6 26114->26117 26115 7ff68c9288d4 26115->26089 26116 7ff68c928a36 HeapFree 26116->26115 26117->26115 26117->26116 26118->26075 26119->26084 26120->26090 26241 7ff68c921d76 25 API calls 26242 7ff68c95057c memcpy HeapFree WakeByAddressSingle HeapFree HeapFree 26338 7ff68c9585ad 158 API calls 26247 7ff68c93a530 memcpy memset 26339 7ff68c933790 30 API calls 26341 7ff68c950390 123 API calls 24798 7ff68c928ce1 24801 7ff68c928d27 24798->24801 24802 7ff68c928d59 24798->24802 24799 7ff68c9290b0 memcpy 24806 7ff68c9290c4 24799->24806 24800 7ff68c9295da 24801->24799 24801->24801 24801->24806 24802->24800 24809 7ff68c960a50 24802->24809 24804 7ff68c928e15 24804->24800 24805 7ff68c928e1e memset 24804->24805 24808 7ff68c928e62 24805->24808 24807 7ff68c92902d HeapFree 24807->24806 24808->24806 24808->24807 24810 7ff68c96dc60 HeapAlloc 24809->24810 24812 7ff68c960a65 24809->24812 24810->24804 24811 7ff68e63e950 24810->24811 24813 7ff68c960a85 24812->24813 24814 7ff68c960a9f 24812->24814 24813->24810 24814->24804 25108 7ff68c9502e0 93 API calls 26346 7ff68c9548e0 6 API calls 26254 7ff68c95a2ef 9 API calls 26351 7ff68c954cc3 17 API calls 26262 7ff68c952ed0 9 API calls 26355 7ff68c9544d0 7 API calls 26264 7ff68c959320 14 API calls 26266 7ff68c933730 HeapReAlloc memcpy HeapAlloc 26356 7ff68c93f130 memset memset memcpy 26357 7ff68c956935 100 API calls 26358 7ff68c9230fd memset memset memset memset 26268 7ff68c943300 HeapAlloc 25109 7ff68c9502eb 95 API calls 26270 7ff68c9541cd RtlReAllocateHeap memcpy HeapAlloc 26361 7ff68c959d06 62 API calls 26363 7ff68c935d10 memcpy 26365 7ff68c96dc60 HeapAlloc 26366 7ff68c952434 memcmp memcmp 26271 7ff68c965a60 15 API calls 26121 7ff68c92dc75 26122 7ff68c92dc85 26121->26122 26123 7ff68c92de03 HeapFree 26122->26123 26127 7ff68c92ddef HeapFree 26122->26127 26124 7ff68c92de11 QueryPerformanceCounter 26123->26124 26125 7ff68c92de2c 26124->26125 26126 7ff68c92e240 GetLastError 26124->26126 26129 7ff68c92de3d QueryPerformanceFrequency 26125->26129 26133 7ff68c92de58 26125->26133 26128 7ff68c92e250 26126->26128 26127->26123 26130 7ff68c951910 3 API calls 26128->26130 26129->26126 26129->26133 26131 7ff68c92e26d 26130->26131 26135 7ff68c960a50 HeapAlloc 26131->26135 26132 7ff68c92e239 26134 7ff68c9609e0 95 API calls 26132->26134 26133->26132 26158 7ff68c951910 26133->26158 26134->26126 26137 7ff68c92e2c6 26135->26137 26141 7ff68c9609e0 95 API calls 26137->26141 26139 7ff68c92def2 26140 7ff68c92df03 QueryPerformanceFrequency 26139->26140 26143 7ff68c92df1e 26139->26143 26140->26126 26140->26143 26142 7ff68c931932 26141->26142 26144 7ff68c956580 48 API calls 26142->26144 26143->26132 26145 7ff68c92df95 QueryPerformanceFrequency 26143->26145 26149 7ff68c92dfb0 26143->26149 26146 7ff68c931a4f 26144->26146 26145->26126 26145->26149 26147 7ff68c9609e0 95 API calls 26146->26147 26148 7ff68c931a54 26147->26148 26149->26132 26164 7ff68c96a080 26149->26164 26161 7ff68c95192f 26158->26161 26159 7ff68c951991 Sleep 26160 7ff68c92ded7 QueryPerformanceCounter 26159->26160 26160->26126 26160->26139 26161->26159 26162 7ff68c95196b WaitForSingleObject CloseHandle 26161->26162 26163 7ff68c951987 26161->26163 26162->26160 26162->26163 26163->26159 26165 7ff68c96a092 26164->26165 26166 7ff68c96a10a GetErrorInfo 26165->26166 26167 7ff68c96a096 26165->26167 26168 7ff68c92e131 26166->26168 26167->26168 26169 7ff68c96a0d6 GetErrorInfo 26167->26169 26168->26132 26170 7ff68c929e90 26168->26170 26169->26168 26171 7ff68c969300 265 API calls 26170->26171 26172 7ff68c929ecf 26171->26172 26173 7ff68c969530 256 API calls 26172->26173 26174 7ff68c929ed7 GetComputerNameExW 26173->26174 26175 7ff68c929f29 GetLastError 26174->26175 26176 7ff68c929f06 26174->26176 26175->26176 26178 7ff68c92ca4b HeapFree 26175->26178 26176->26175 26177 7ff68c960a50 HeapAlloc 26176->26177 26176->26178 26177->26176 26180 7ff68c92ca5d 26178->26180 26181 7ff68c956580 48 API calls 26180->26181 26182 7ff68c92cb5f 26181->26182 26183 7ff68c956580 48 API calls 26182->26183 26184 7ff68c92d3d5 26182->26184 26187 7ff68c9609e0 95 API calls 26182->26187 26183->26182 26185 7ff68c9609e0 95 API calls 26184->26185 26186 7ff68c92d3da 26185->26186 26187->26182 26369 7ff68c959c3a 65 API calls 26273 7ff68c958636 45 API calls 24958 7ff68c968240 24959 7ff68c9682b4 24958->24959 24961 7ff68c968296 24958->24961 24973 7ff68c96853d 24959->24973 24996 7ff68c952e20 RtlReAllocateHeap HeapAlloc 24959->24996 24962 7ff68c960a50 HeapAlloc 24961->24962 24970 7ff68c96895d 24961->24970 24969 7ff68c9683c2 24962->24969 24963 7ff68c96862e PdhAddEnglishCounterW 24964 7ff68c96865a 24963->24964 24965 7ff68c9686e1 24963->24965 24966 7ff68c968678 24964->24966 24967 7ff68c968665 HeapFree 24964->24967 24965->24970 24972 7ff68c960a50 HeapAlloc 24965->24972 24976 7ff68c96870f 24965->24976 24968 7ff68c96868b HeapFree 24966->24968 24992 7ff68c96869d 24966->24992 24967->24966 24968->24992 24969->24959 24969->24970 24995 7ff68c926ae0 RtlReAllocateHeap HeapAlloc 24969->24995 24975 7ff68c968a48 memcmp 24970->24975 24983 7ff68c968a75 24970->24983 24971 7ff68c9686a3 HeapFree 24994 7ff68c9686b4 24971->24994 24972->24976 24973->24963 24980 7ff68c968619 memcmp 24973->24980 24974 7ff68c968722 memcpy 24977 7ff68c96874d 24974->24977 24975->24970 24979 7ff68c968a5b PdhGetFormattedCounterValue 24975->24979 24976->24970 24976->24974 24982 7ff68c968951 24977->24982 24985 7ff68c96875b 24977->24985 24979->24983 24980->24973 24981 7ff68c96862c 24980->24981 24981->24963 24981->24964 24997 7ff68c968ab0 HeapAlloc memset HeapFree memcpy 24982->24997 24986 7ff68c968834 memcmp 24985->24986 24987 7ff68c968866 24985->24987 24986->24985 24988 7ff68c968847 24986->24988 24990 7ff68c968899 24987->24990 24991 7ff68c968886 HeapFree 24987->24991 24988->24987 24989 7ff68c968855 HeapFree 24988->24989 24989->24987 24990->24992 24993 7ff68c9688a9 HeapFree 24990->24993 24991->24990 24992->24971 24992->24994 24993->24992 24995->24969 24996->24973 24997->24970 26370 7ff68c95cc4b 13 API calls 26371 7ff68c92e849 224 API calls 26274 7ff68c9585ad 150 API calls 26275 7ff68c921615 HeapFree 26276 7ff68c959a46 42 API calls 26372 7ff68c958846 45 API calls 26278 7ff68c964a50 36 API calls 26374 7ff68c9518a0 SetLastError 26375 7ff68c926ca7 memcmp 26376 7ff68c9424a6 22 API calls 26283 7ff68c9592af 13 API calls 26381 7ff68c958479 131 API calls 26286 7ff68c956e7e 98 API calls 26289 7ff68c953e93 RtlReAllocateHeap HeapAlloc 26291 7ff68c931a93 172 API calls

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 7ff68c928ce1-7ff68c928d25 1 7ff68c928d59-7ff68c928d64 0->1 2 7ff68c928d27-7ff68c928d42 0->2 5 7ff68c928d79-7ff68c928d86 1->5 6 7ff68c928d66-7ff68c928d77 1->6 3 7ff68c928d48-7ff68c928d4c 2->3 4 7ff68c9290aa-7ff68c9290ae 2->4 7 7ff68c929048-7ff68c92905f 3->7 8 7ff68c928d52-7ff68c928d54 3->8 10 7ff68c9290cb-7ff68c9290cf 4->10 11 7ff68c9290b0-7ff68c9290c2 memcpy 4->11 12 7ff68c928d8c-7ff68c928dc4 5->12 13 7ff68c9295da-7ff68c929e8a 5->13 9 7ff68c928dc7-7ff68c928dd2 6->9 15 7ff68c929060-7ff68c92908e 7->15 16 7ff68c929094-7ff68c9290a5 8->16 9->13 19 7ff68c928dd8-7ff68c928ddf 9->19 18 7ff68c9290d5-7ff68c92912c 10->18 17 7ff68c9290c4-7ff68c9290c6 11->17 11->18 12->9 15->15 20 7ff68c929090-7ff68c929092 15->20 16->4 21 7ff68c9295aa-7ff68c9295b8 17->21 23 7ff68c929159-7ff68c92915d 18->23 19->13 22 7ff68c928de5-7ff68c928df8 19->22 20->4 20->16 25 7ff68c9295c2-7ff68c9295d9 21->25 22->13 28 7ff68c928dfe-7ff68c928e01 22->28 26 7ff68c92915f-7ff68c929194 23->26 27 7ff68c929145-7ff68c929153 23->27 29 7ff68c9291f9-7ff68c92920d 26->29 27->23 31 7ff68c92959d-7ff68c9295a6 27->31 28->13 30 7ff68c928e07-7ff68c928e10 call 7ff68c960a50 28->30 32 7ff68c9292a0-7ff68c9292be 29->32 33 7ff68c929213-7ff68c929228 29->33 38 7ff68c928e15-7ff68c928e18 30->38 31->21 36 7ff68c9292c0-7ff68c9292cc 32->36 37 7ff68c92927e-7ff68c92928e 32->37 35 7ff68c929230-7ff68c929271 33->35 35->35 40 7ff68c929273-7ff68c92927c 35->40 42 7ff68c9292ce-7ff68c9292ef 36->42 43 7ff68c9292f3-7ff68c9292f5 36->43 41 7ff68c929290 37->41 37->42 38->13 39 7ff68c928e1e-7ff68c928e5c memset 38->39 44 7ff68c928fd8-7ff68c928fe0 39->44 45 7ff68c928e62-7ff68c928ea1 39->45 40->36 40->37 41->43 42->43 46 7ff68c9292f7-7ff68c92930a 43->46 47 7ff68c929310-7ff68c929313 43->47 48 7ff68c928fe5-7ff68c929007 44->48 49 7ff68c928f16-7ff68c928f19 45->49 50 7ff68c929315-7ff68c92932b 46->50 47->50 51 7ff68c929367-7ff68c92936c 47->51 48->25 52 7ff68c92900d-7ff68c929027 48->52 54 7ff68c928f3d-7ff68c928f7e call 7ff68c925710 49->54 55 7ff68c928f1b 49->55 53 7ff68c929370-7ff68c929469 50->53 56 7ff68c92932d-7ff68c929365 50->56 51->53 52->25 57 7ff68c92902d-7ff68c929043 HeapFree 52->57 58 7ff68c929498-7ff68c9294a6 53->58 59 7ff68c92946b-7ff68c929474 53->59 69 7ff68c928fa7-7ff68c928fb5 54->69 70 7ff68c928f80-7ff68c928f86 54->70 60 7ff68c928f20-7ff68c928f39 55->60 56->53 57->25 63 7ff68c9294a8-7ff68c9294b0 58->63 64 7ff68c9294b4-7ff68c9294ca 58->64 62 7ff68c929480-7ff68c929496 59->62 60->60 65 7ff68c928f3b 60->65 62->58 62->62 63->64 67 7ff68c929130-7ff68c92913f 64->67 68 7ff68c9294d0-7ff68c9294f9 64->68 65->54 74 7ff68c929143 67->74 71 7ff68c9294fb-7ff68c929507 68->71 72 7ff68c929560-7ff68c929598 68->72 75 7ff68c928fbb-7ff68c928fc7 69->75 76 7ff68c928eb0-7ff68c928f10 69->76 73 7ff68c928f90-7ff68c928fa5 70->73 78 7ff68c92950d-7ff68c929512 71->78 79 7ff68c9291a0-7ff68c9291f5 71->79 72->74 73->69 73->73 74->27 75->76 76->49 77 7ff68c928fcc-7ff68c928fd6 76->77 77->48 78->79 80 7ff68c929518-7ff68c92951f 78->80 79->29 81 7ff68c929520-7ff68c92954a 80->81 81->81 82 7ff68c92954c 81->82 82->29
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: memcpymemset
    • String ID: !$#$&$*$0$?$ROOT\CIMV2$arenegyl$arenegyl$modnarod$modnarod$runas$setybdet$setybdet$uespemos$uespemos
    • API String ID: 1297977491-439218697
    • Opcode ID: c2f00b2d3f898928e690ef62f754f2acd97ef3a179b70cea7742a88de37be139
    • Instruction ID: c036ff571c81f66e979beb7880b23a15d6b4bccf2208a05cb794aa3b8379f540
    • Opcode Fuzzy Hash: c2f00b2d3f898928e690ef62f754f2acd97ef3a179b70cea7742a88de37be139
    • Instruction Fuzzy Hash: 2DA3A172608BC2C1EB608B15E4507AAB7A5FB89B90F504279DEED83B9ADF3CD145C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Process$ErrorLast$Information$HeapToken$MemoryQueryRead$AllocCloseCountersFreeHandleOpenSystemTimes
    • String ID:
    • API String ID: 4058153894-0
    • Opcode ID: 72d162fd76748bdbc76d18bc7c16b29b6e8c184996938e4a4253b3f542c6b095
    • Instruction ID: 81e61644cd5fddfd84982950fa675cdfe3d7046757f104b60e6cdc2f4822a0f0
    • Opcode Fuzzy Hash: 72d162fd76748bdbc76d18bc7c16b29b6e8c184996938e4a4253b3f542c6b095
    • Instruction Fuzzy Hash: B3C27062A0CFC6C1EA648B25A044BBA67A4FF85784F444179DB9E837D6DF3CE494C780

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 410 7ff68c93293f-7ff68c932954 411 7ff68c932956-7ff68c93295e 410->411 412 7ff68c932974 call 7ff68c9259d0 410->412 411->412 413 7ff68c932960-7ff68c932972 call 7ff68c9489a0 411->413 416 7ff68c932979-7ff68c9329b8 412->416 413->416 419 7ff68c932a57-7ff68c932ac7 call 7ff68c927770 call 7ff68c960a50 416->419 420 7ff68c9329be-7ff68c932a26 call 7ff68c9271d0 call 7ff68c960a50 416->420 429 7ff68c932acd-7ff68c932b10 419->429 430 7ff68c933314 419->430 420->430 431 7ff68c932a2c-7ff68c932a52 420->431 433 7ff68c932b14-7ff68c932b63 call 7ff68c931a60 * 2 call 7ff68c960a50 429->433 432 7ff68c933316-7ff68c933372 call 7ff68c9272d0 430->432 431->433 438 7ff68c933374-7ff68c933403 GetLastError call 7ff68c97bc80 AddVectoredExceptionHandler SetThreadStackGuarantee GetCurrentThread SetThreadDescription call 7ff68c960a50 432->438 433->430 447 7ff68c932b69-7ff68c932bd0 memcpy call 7ff68c953e10 433->447 452 7ff68c933410-7ff68c933423 438->452 453 7ff68c932bd2-7ff68c932bde HeapFree 447->453 454 7ff68c932be3-7ff68c932bf1 call 7ff68c954c70 447->454 457 7ff68c933425-7ff68c933432 call 7ff68c950180 call 7ff68c92d3e0 452->457 453->454 454->430 460 7ff68c932bf7-7ff68c932bfa 454->460 465 7ff68c933437-7ff68c933449 457->465 460->430 462 7ff68c932c00-7ff68c932c31 call 7ff68c960a50 460->462 469 7ff68c932c3e-7ff68c932ca8 memcpy call 7ff68c953e10 462->469 470 7ff68c932c33 462->470 473 7ff68c932caa-7ff68c932cb6 HeapFree 469->473 474 7ff68c932cbb-7ff68c932cc9 call 7ff68c954c70 469->474 470->430 473->474 474->430 477 7ff68c932ccf-7ff68c932cd2 474->477 477->430 478 7ff68c932cd8-7ff68c932cf1 call 7ff68c960a50 477->478 482 7ff68c932cfe-7ff68c932dc5 memcpy call 7ff68c953e10 call 7ff68c9532f0 478->482 483 7ff68c932cf3 478->483 482->430 488 7ff68c932dcb-7ff68c932de3 482->488 483->430 488->432 489 7ff68c932de9-7ff68c932e03 call 7ff68c921980 488->489 489->430 492 7ff68c932e09-7ff68c932e2b call 7ff68c953580 489->492 492->430 495 7ff68c932e31-7ff68c932e4d 492->495 496 7ff68c932ee2-7ff68c932eed CloseHandle 495->496 497 7ff68c932e53-7ff68c932e7e call 7ff68c96dbe0 495->497 496->430 498 7ff68c932ef3 496->498 497->438 503 7ff68c932e84-7ff68c932eaa memset 497->503 501 7ff68c932f3e-7ff68c932f54 memcpy 498->501 502 7ff68c932ef5-7ff68c932f09 call 7ff68c960a50 498->502 504 7ff68c932f59-7ff68c93303a memcpy 501->504 502->430 512 7ff68c932f0f-7ff68c932f37 memcpy call 7ff68c960a50 502->512 506 7ff68c932eb0-7ff68c932ed2 call 7ff68c921980 503->506 507 7ff68c93303c-7ff68c933048 HeapFree 504->507 508 7ff68c93304d-7ff68c933097 call 7ff68c956bc0 504->508 506->430 516 7ff68c932ed8-7ff68c932edb 506->516 507->508 517 7ff68c933099-7ff68c93309c 508->517 518 7ff68c93309e-7ff68c9330de 508->518 512->504 522 7ff68c932f39 512->522 516->506 520 7ff68c932edd 516->520 521 7ff68c9330e2-7ff68c93313f call 7ff68c927370 517->521 518->521 520->496 521->430 525 7ff68c933145-7ff68c933158 CloseHandle * 2 521->525 522->430 526 7ff68c93315a-7ff68c93315d CloseHandle 525->526 527 7ff68c933162-7ff68c93317e 525->527 526->527 528 7ff68c93318a-7ff68c93318e 527->528 529 7ff68c933180-7ff68c933185 CloseHandle 527->529 530 7ff68c93319a-7ff68c9331bd call 7ff68c924830 528->530 531 7ff68c933190-7ff68c933195 CloseHandle 528->531 529->528 534 7ff68c9331bf-7ff68c9331cd HeapFree 530->534 535 7ff68c9331d2-7ff68c9331d8 530->535 531->530 534->535 536 7ff68c9331da-7ff68c9331e6 HeapFree 535->536 537 7ff68c9331eb-7ff68c9331f4 535->537 536->537 538 7ff68c933209-7ff68c933214 537->538 539 7ff68c9331f6-7ff68c933204 HeapFree 537->539 540 7ff68c933229-7ff68c933244 HeapFree 538->540 541 7ff68c933216-7ff68c933224 HeapFree 538->541 539->538 542 7ff68c933246-7ff68c93324a 540->542 543 7ff68c93325a-7ff68c933313 HeapFree * 9 540->543 541->540 542->543 544 7ff68c93324c-7ff68c933255 HeapFree 542->544 544->543
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeapmemcpy
    • String ID: main
    • API String ID: 673829100-3207122276
    • Opcode ID: 90af126ca1d7c1501d5ff128086fc056b4161cf3c28cf52c8b4b9a717152444e
    • Instruction ID: 940ce780fe53171846ccb5c4b6c5037c92931654164e67d45993b47e2f474049
    • Opcode Fuzzy Hash: 90af126ca1d7c1501d5ff128086fc056b4161cf3c28cf52c8b4b9a717152444e
    • Instruction Fuzzy Hash: 39423D32A0CAC2C0EA609B12E4547EEA7A4FF89B84F444479DE9D87B9ADF3CD145C740

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 545 7ff68c92c3c7-7ff68c92c4a9 call 7ff68c926e50 call 7ff68c922c70 550 7ff68c92ca4b-7ff68c92cb62 HeapFree call 7ff68c927a10 call 7ff68c956580 545->550 551 7ff68c92c4af-7ff68c92c4ce call 7ff68c961800 545->551 572 7ff68c92cb76-7ff68c92cb7b 550->572 573 7ff68c92ccb4-7ff68c92cdb1 call 7ff68c9270c0 call 7ff68c956580 550->573 551->550 557 7ff68c92c4d4-7ff68c92c515 551->557 559 7ff68c92c7f8-7ff68c92c80e 557->559 560 7ff68c92c51b-7ff68c92c541 557->560 561 7ff68c92c810-7ff68c92c817 559->561 562 7ff68c92c831-7ff68c92c83a 559->562 564 7ff68c92c5d1-7ff68c92c5de 560->564 566 7ff68c92c820-7ff68c92c82f call 7ff68c9246a0 561->566 568 7ff68c92c83c-7ff68c92c84d HeapFree 562->568 569 7ff68c92c852-7ff68c92c866 562->569 564->559 565 7ff68c92c5e4-7ff68c92c619 call 7ff68c928a40 564->565 584 7ff68c92c61b-7ff68c92c61f 565->584 585 7ff68c92c5c0-7ff68c92c5cb call 7ff68c9246a0 565->585 566->562 568->569 574 7ff68c92c86c-7ff68c92c86f 569->574 575 7ff68c92c930-7ff68c92c935 569->575 579 7ff68c92ce97-7ff68c92cf94 call 7ff68c927cc0 call 7ff68c956580 572->579 580 7ff68c92cb81-7ff68c92cb89 572->580 573->572 616 7ff68c92cdb7-7ff68c92ce91 call 7ff68c927150 call 7ff68c956580 573->616 581 7ff68c92c8fd-7ff68c92c918 574->581 582 7ff68c92c875-7ff68c92c88a 574->582 587 7ff68c92c93b 575->587 588 7ff68c92cf9a-7ff68c92d0b6 call 7ff68c927a70 call 7ff68c956580 579->588 589 7ff68c92cb8f-7ff68c92cb98 579->589 580->588 580->589 581->575 583 7ff68c92c91a-7ff68c92c92b HeapFree 581->583 590 7ff68c92c89f-7ff68c92c8a3 582->590 583->575 584->585 593 7ff68c92c621-7ff68c92c628 584->593 585->562 585->564 587->550 595 7ff68c92d0bc-7ff68c92d1c5 call 7ff68c927210 call 7ff68c956580 588->595 596 7ff68c92cb9e-7ff68c92cba3 588->596 589->595 589->596 597 7ff68c92c8d1-7ff68c92c8e3 590->597 598 7ff68c92c8a5 590->598 593->550 604 7ff68c92c62e-7ff68c92c632 593->604 607 7ff68c92cba9-7ff68c92cbb1 595->607 608 7ff68c92d1cb-7ff68c92d2c2 call 7ff68c927480 call 7ff68c956580 595->608 596->607 596->608 601 7ff68c92c890-7ff68c92c89d 597->601 602 7ff68c92c8e5-7ff68c92c8fb HeapFree 597->602 609 7ff68c92c8b0-7ff68c92c8cc 598->609 601->581 601->590 602->601 614 7ff68c92c634-7ff68c92c648 call 7ff68c960a50 604->614 615 7ff68c92c653 604->615 618 7ff68c92d2c8-7ff68c92d3cf call 7ff68c926f40 call 7ff68c956580 607->618 619 7ff68c92cbb7-7ff68c92cbba 607->619 608->618 608->619 609->609 621 7ff68c92c8ce 609->621 614->550 641 7ff68c92c64e-7ff68c92c651 614->641 627 7ff68c92c658-7ff68c92c68a memcpy call 7ff68c925710 615->627 616->579 616->580 628 7ff68c92cbc0-7ff68c92ccaf call 7ff68c927450 call 7ff68c956580 call 7ff68c9609e0 618->628 629 7ff68c92d3d5 call 7ff68c9609e0 618->629 619->628 619->629 621->597 648 7ff68c92c690-7ff68c92c6bd 627->648 649 7ff68c92c7e1-7ff68c92c7f3 call 7ff68c9295e0 627->649 628->573 640 7ff68c92d3da-7ff68c92d3db 629->640 641->627 651 7ff68c92c6c0-7ff68c92c6df 648->651 649->559 654 7ff68c92c74d-7ff68c92c764 651->654 655 7ff68c92c6e1-7ff68c92c6eb 651->655 660 7ff68c92c766-7ff68c92c77b memcmp 654->660 661 7ff68c92c740-7ff68c92c74b 654->661 658 7ff68c92c6ed-7ff68c92c705 655->658 659 7ff68c92c70a-7ff68c92c71b 655->659 658->659 662 7ff68c92c7bb-7ff68c92c7c6 659->662 663 7ff68c92c721-7ff68c92c72f 659->663 660->661 664 7ff68c92c77d-7ff68c92c79f 660->664 661->654 661->655 666 7ff68c92c7cc-7ff68c92c7dc 662->666 667 7ff68c92c562-7ff68c92c5bc 662->667 663->651 664->585 665 7ff68c92c7a5-7ff68c92c7b6 HeapFree 664->665 665->585 666->667 667->585
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Free$Heap$Value$String$PrngProcessmemcpy
    • String ID: -$displayName
    • API String ID: 2959858373-3971571706
    • Opcode ID: f6f9939959358322cbda09bdb7fa19cdad173ea95716748bf130ed501295fef3
    • Instruction ID: 92e30b097c0107cbda89579789d489f6ad697eca6dc52cb9e909993231b4e79e
    • Opcode Fuzzy Hash: f6f9939959358322cbda09bdb7fa19cdad173ea95716748bf130ed501295fef3
    • Instruction Fuzzy Hash: 4DB24A32609BC2C5EB708B15E4507AAB7A4FB88780F50417ADADD83B9AEF7CD145DB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap$InfoSystem
    • String ID: RAYON_NUM_THREADSRAYON_RS_NUM_CPUSrunas$RUST_MIN_STACKmain
    • API String ID: 738346042-1352447344
    • Opcode ID: ec33e4587758eaf02b3d2a3673f09fceae4b5a54935b90e45ba5d341cf886638
    • Instruction ID: 985b02df175a62f9afaad14858971d3b6cbc3dcbea2248ea230724d30986031f
    • Opcode Fuzzy Hash: ec33e4587758eaf02b3d2a3673f09fceae4b5a54935b90e45ba5d341cf886638
    • Instruction Fuzzy Hash: 02E28D22A09AC2C1EE758B15E4443BAB3A4FF94794F04867ADAAD837D6DF3CD595C300

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1077 7ff68c925060-7ff68c92507a 1078 7ff68c925080-7ff68c925091 1077->1078 1079 7ff68c925352-7ff68c92535c 1077->1079 1082 7ff68c925097-7ff68c9250af 1078->1082 1083 7ff68c92531e-7ff68c92533b 1078->1083 1080 7ff68c92535e-7ff68c925369 1079->1080 1081 7ff68c925370-7ff68c92538d HeapFree 1079->1081 1084 7ff68c92536b 1080->1084 1085 7ff68c925393-7ff68c925397 1080->1085 1081->1085 1086 7ff68c92541c-7ff68c925420 1081->1086 1087 7ff68c9250d0-7ff68c9250d3 1082->1087 1083->1079 1088 7ff68c92533d-7ff68c92534d HeapFree 1083->1088 1084->1086 1089 7ff68c9253a9-7ff68c9253ae 1085->1089 1092 7ff68c925433-7ff68c92543d 1086->1092 1093 7ff68c925422-7ff68c92542e HeapFree 1086->1093 1090 7ff68c9250fe-7ff68c92511d 1087->1090 1091 7ff68c9250d5 1087->1091 1088->1079 1096 7ff68c9253b0-7ff68c9253bd HeapFree 1089->1096 1097 7ff68c9253c2-7ff68c9253c7 1089->1097 1099 7ff68c92511f-7ff68c92512f HeapFree 1090->1099 1100 7ff68c925134-7ff68c925145 1090->1100 1098 7ff68c9250e0-7ff68c9250fa 1091->1098 1094 7ff68c9255c9-7ff68c9255d9 1092->1094 1095 7ff68c925443-7ff68c92544d 1092->1095 1093->1092 1103 7ff68c9254ca-7ff68c9254d9 1095->1103 1104 7ff68c92544f-7ff68c925463 1095->1104 1096->1097 1105 7ff68c9253c9-7ff68c9253d6 HeapFree 1097->1105 1106 7ff68c9253db-7ff68c9253e5 1097->1106 1098->1098 1107 7ff68c9250fc 1098->1107 1099->1100 1101 7ff68c925147-7ff68c92514b 1100->1101 1102 7ff68c925180-7ff68c925188 1100->1102 1108 7ff68c925159-7ff68c92515e 1101->1108 1110 7ff68c92519b-7ff68c9251a8 1102->1110 1111 7ff68c92518a-7ff68c925196 HeapFree 1102->1111 1112 7ff68c9254db-7ff68c9254e2 CloseHandle 1103->1112 1113 7ff68c9254e4-7ff68c9254f3 1103->1113 1109 7ff68c925492-7ff68c925495 1104->1109 1105->1106 1114 7ff68c9253e7-7ff68c9253ec 1106->1114 1115 7ff68c9253f0-7ff68c925406 HeapFree 1106->1115 1107->1090 1116 7ff68c925150-7ff68c925157 1108->1116 1117 7ff68c925160-7ff68c925171 HeapFree RtlFreeHeap 1108->1117 1118 7ff68c925497 1109->1118 1119 7ff68c925470-7ff68c925473 1109->1119 1120 7ff68c9251aa-7ff68c9251b7 1110->1120 1121 7ff68c9251e0-7ff68c925202 HeapFree 1110->1121 1111->1110 1112->1113 1122 7ff68c925506-7ff68c92551a GetLastError 1112->1122 1125 7ff68c92551c-7ff68c92552b PdhCloseQuery 1113->1125 1126 7ff68c9254f5-7ff68c9254ff 1113->1126 1123 7ff68c925408-7ff68c92541a HeapFree 1114->1123 1124 7ff68c9253ee 1114->1124 1115->1123 1127 7ff68c9253a0-7ff68c9253a7 1115->1127 1116->1102 1116->1108 1117->1102 1130 7ff68c9254a0-7ff68c9254b9 1118->1130 1129 7ff68c925475-7ff68c925490 PdhRemoveCounter 1119->1129 1131 7ff68c9251b9-7ff68c9251ca 1120->1131 1132 7ff68c925204-7ff68c92522a HeapFree 1120->1132 1121->1131 1121->1132 1122->1125 1122->1126 1123->1127 1124->1127 1125->1094 1128 7ff68c925531-7ff68c925534 1125->1128 1126->1128 1133 7ff68c925501 1126->1133 1127->1086 1127->1089 1134 7ff68c9255ba-7ff68c9255c7 1128->1134 1135 7ff68c92553a-7ff68c92554a 1128->1135 1129->1103 1129->1109 1130->1130 1136 7ff68c9254bb-7ff68c9254c8 1130->1136 1137 7ff68c92522c-7ff68c925230 1131->1137 1138 7ff68c9251cc 1131->1138 1132->1137 1139 7ff68c925270-7ff68c925278 1132->1139 1133->1094 1134->1094 1143 7ff68c9255da-7ff68c925607 1134->1143 1140 7ff68c925560-7ff68c925564 1135->1140 1136->1129 1144 7ff68c925249-7ff68c92524e 1137->1144 1138->1139 1141 7ff68c92528b-7ff68c925298 1139->1141 1142 7ff68c92527a-7ff68c925286 HeapFree 1139->1142 1147 7ff68c925566 1140->1147 1148 7ff68c925591-7ff68c9255a4 1140->1148 1149 7ff68c92529a-7ff68c9252a7 1141->1149 1150 7ff68c9252c0-7ff68c9252e2 HeapFree 1141->1150 1142->1141 1145 7ff68c925240-7ff68c925247 1144->1145 1146 7ff68c925250-7ff68c925261 HeapFree RtlFreeHeap 1144->1146 1145->1139 1145->1144 1146->1139 1151 7ff68c925570-7ff68c92558c 1147->1151 1154 7ff68c9255a6-7ff68c9255b8 HeapFree 1148->1154 1155 7ff68c925550-7ff68c92555e 1148->1155 1152 7ff68c9252a9-7ff68c9252b0 1149->1152 1153 7ff68c9252e4-7ff68c925300 HeapFree 1149->1153 1150->1152 1150->1153 1151->1151 1156 7ff68c92558e 1151->1156 1157 7ff68c925306-7ff68c92530a 1152->1157 1158 7ff68c9252b2 1152->1158 1153->1157 1159 7ff68c9250c0-7ff68c9250ca 1153->1159 1154->1155 1155->1134 1155->1140 1156->1148 1157->1159 1160 7ff68c925310-7ff68c925314 call 7ff68c9269e0 1157->1160 1158->1159 1159->1083 1159->1087 1162 7ff68c925319 RtlFreeHeap 1160->1162 1162->1083
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap$CloseCounterHandleRemove
    • String ID:
    • API String ID: 1366079419-0
    • Opcode ID: 4827f3a5fb5b7dacc80f42c388b2e12bd98189e7dd688a3d2695921db36c4424
    • Instruction ID: 7794c6b8ff6a5a27665d9f1587534b9bac26393ce46efd3e5132f64fd26f337a
    • Opcode Fuzzy Hash: 4827f3a5fb5b7dacc80f42c388b2e12bd98189e7dd688a3d2695921db36c4424
    • Instruction Fuzzy Hash: C3E1B222A09AC6C1FF248B6594547B853A1BF48B54F4841BAEABD977D2DF7CE481C340

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1163 7ff68c961cd0-7ff68c961d0d call 7ff68c960a50 1166 7ff68c961d13-7ff68c961d4a 1163->1166 1167 7ff68c9627c4-7ff68c9627c6 1163->1167 1168 7ff68c961d5a-7ff68c961d6b 1166->1168 1169 7ff68c961d6d-7ff68c961d82 NtQuerySystemInformation 1168->1169 1170 7ff68c961de8-7ff68c961e07 call 7ff68c926ae0 1168->1170 1171 7ff68c961e0c-7ff68c961e33 call 7ff68c960a50 1169->1171 1172 7ff68c961d88-7ff68c961db4 GetErrorInfo 1169->1172 1170->1169 1171->1167 1185 7ff68c961e39-7ff68c961e5b 1171->1185 1175 7ff68c961ebb-7ff68c961ebe 1172->1175 1176 7ff68c961dba-7ff68c961dd7 1172->1176 1181 7ff68c961ec6-7ff68c961ecc 1175->1181 1182 7ff68c961ec0 1175->1182 1179 7ff68c961ddd-7ff68c961de3 1176->1179 1180 7ff68c961d50-7ff68c961d55 1176->1180 1179->1180 1180->1168 1183 7ff68c962773-7ff68c96278e 1181->1183 1184 7ff68c961ed2-7ff68c961ede 1181->1184 1182->1181 1186 7ff68c96276e HeapFree 1184->1186 1187 7ff68c961e78-7ff68c961e81 1185->1187 1186->1183 1189 7ff68c961e83-7ff68c961e90 call 7ff68c9627d0 1187->1189 1190 7ff68c961e60-7ff68c961e76 1187->1190 1189->1190 1190->1187 1191 7ff68c961e92-7ff68c961ea9 1190->1191 1194 7ff68c961eab-7ff68c961eb9 call 7ff68c962880 1191->1194 1195 7ff68c961ee3 1191->1195 1196 7ff68c961ee5-7ff68c961f1b GetSystemTimePreciseAsFileTime 1194->1196 1195->1196 1198 7ff68c961f1d-7ff68c961f1f 1196->1198 1199 7ff68c961f21-7ff68c961f3b 1196->1199 1201 7ff68c961f3f-7ff68c961fda 1198->1201 1199->1201 1201->1167 1202 7ff68c961fe0-7ff68c961ff0 call 7ff68c94c850 1201->1202 1202->1167 1205 7ff68c961ff6-7ff68c962004 1202->1205 1206 7ff68c962006-7ff68c96200c 1205->1206 1207 7ff68c96200e call 7ff68c94d1e0 1205->1207 1208 7ff68c962013-7ff68c96205b call 7ff68c963170 1206->1208 1207->1208 1212 7ff68c96205d-7ff68c962069 HeapFree 1208->1212 1213 7ff68c96206e-7ff68c96208c 1208->1213 1212->1213 1214 7ff68c9620bc-7ff68c9620bf 1213->1214 1215 7ff68c96208e-7ff68c962096 1213->1215 1217 7ff68c9620c5-7ff68c9620d7 1214->1217 1218 7ff68c9621af-7ff68c9621e1 1214->1218 1216 7ff68c9620a0-7ff68c9620a8 1215->1216 1219 7ff68c9620aa-7ff68c9620b1 1216->1219 1220 7ff68c9620b3-7ff68c9620b6 1216->1220 1223 7ff68c9620ec-7ff68c9620f3 1217->1223 1221 7ff68c9621e7-7ff68c962204 1218->1221 1222 7ff68c9625d1-7ff68c9625e7 1218->1222 1219->1216 1219->1220 1220->1214 1225 7ff68c96278f-7ff68c9627b9 call 7ff68c926ae0 1220->1225 1224 7ff68c962349-7ff68c96235a 1221->1224 1226 7ff68c9625e9-7ff68c9625ec 1222->1226 1227 7ff68c962604-7ff68c96260d 1222->1227 1228 7ff68c9620fd-7ff68c962119 HeapFree 1223->1228 1229 7ff68c9620f5 1223->1229 1224->1222 1230 7ff68c962360-7ff68c9623fa memcpy call 7ff68c963e30 1224->1230 1225->1217 1249 7ff68c9627bf 1225->1249 1232 7ff68c9625f0-7ff68c962602 call 7ff68c963c60 1226->1232 1235 7ff68c962622-7ff68c962629 1227->1235 1236 7ff68c96260f-7ff68c96261d HeapFree 1227->1236 1233 7ff68c9621a6-7ff68c9621a9 1228->1233 1234 7ff68c96211f-7ff68c962135 1228->1234 1229->1228 1258 7ff68c9625b7-7ff68c9625cc call 7ff68c963fb0 1230->1258 1259 7ff68c962400-7ff68c962424 1230->1259 1232->1227 1233->1218 1240 7ff68c96222d-7ff68c962234 1233->1240 1243 7ff68c962137-7ff68c962163 memcpy 1234->1243 1244 7ff68c96217f-7ff68c9621a4 call 7ff68c926ae0 1234->1244 1237 7ff68c962758-7ff68c96275e 1235->1237 1238 7ff68c96262f-7ff68c96265a 1235->1238 1236->1235 1237->1183 1245 7ff68c962760-7ff68c96276c 1237->1245 1247 7ff68c962693-7ff68c962697 1238->1247 1250 7ff68c962236 1240->1250 1251 7ff68c96223e-7ff68c962249 1240->1251 1253 7ff68c962169-7ff68c96217a HeapFree 1243->1253 1254 7ff68c9620e0-7ff68c9620e6 1243->1254 1244->1243 1245->1186 1256 7ff68c962699 1247->1256 1257 7ff68c9626c1-7ff68c9626da 1247->1257 1249->1218 1250->1251 1260 7ff68c96224b-7ff68c96224e 1251->1260 1261 7ff68c962264-7ff68c962268 1251->1261 1253->1254 1254->1218 1254->1223 1263 7ff68c9626a0-7ff68c9626bc 1256->1263 1265 7ff68c9626dc-7ff68c962710 1257->1265 1266 7ff68c962680-7ff68c96268d 1257->1266 1258->1222 1264 7ff68c962427-7ff68c962441 1259->1264 1267 7ff68c962250-7ff68c962262 call 7ff68c963c60 1260->1267 1268 7ff68c96226a-7ff68c96227b HeapFree 1261->1268 1269 7ff68c962210-7ff68c962227 HeapFree 1261->1269 1263->1263 1271 7ff68c9626be 1263->1271 1272 7ff68c96247c-7ff68c962486 1264->1272 1273 7ff68c962443 1264->1273 1274 7ff68c96271b 1265->1274 1275 7ff68c962712-7ff68c962719 1265->1275 1266->1237 1266->1247 1267->1261 1268->1269 1269->1218 1269->1240 1271->1257 1278 7ff68c962488-7ff68c96249c 1272->1278 1279 7ff68c96249f-7ff68c9624ab 1272->1279 1277 7ff68c962450-7ff68c96246d 1273->1277 1280 7ff68c96271f-7ff68c962743 1274->1280 1275->1280 1282 7ff68c96246f-7ff68c96247a 1277->1282 1283 7ff68c9624d0-7ff68c962577 memcpy * 2 1277->1283 1278->1279 1284 7ff68c96258f-7ff68c962598 1279->1284 1285 7ff68c9624b1-7ff68c9624bc 1279->1285 1286 7ff68c962749-7ff68c962753 1280->1286 1287 7ff68c962660-7ff68c96267b call 7ff68c963c60 1280->1287 1282->1272 1282->1277 1288 7ff68c96257d-7ff68c96258a call 7ff68c963c60 1283->1288 1289 7ff68c962340-7ff68c962343 1283->1289 1291 7ff68c96227d-7ff68c96233e memcpy 1284->1291 1292 7ff68c96259e-7ff68c9625b2 1284->1292 1285->1264 1286->1287 1287->1266 1288->1289 1289->1224 1289->1227 1291->1289 1292->1291
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: SystemTime$ErrorFileInfoInformationPreciseQuery
    • String ID: 0$unknownARM x64CPU
    • API String ID: 158570166-152856199
    • Opcode ID: 94f9efa7abc8a8c3ead84d508a0ffa3114447b49c959072b847552d122f56c88
    • Instruction ID: 935c5bf172671f9f0ba9b22348804a90832841a086a6ce64fea8aec391df58c6
    • Opcode Fuzzy Hash: 94f9efa7abc8a8c3ead84d508a0ffa3114447b49c959072b847552d122f56c88
    • Instruction Fuzzy Hash: 3142C132A08FC5C1EA658B25A404BFAA3A4FF95784F448239DF9D96AD6DF3CD184C740

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1295 7ff68c921e2d-7ff68c921e41 call 7ff68c960a50 1298 7ff68c921e43 1295->1298 1299 7ff68c921e55-7ff68c921e72 memcpy 1295->1299 1300 7ff68c922c62-7ff68c922cfe call 7ff68c969af0 * 2 1298->1300 1301 7ff68c921e78-7ff68c921e7f 1299->1301 1302 7ff68c921ff0-7ff68c92200f 1299->1302 1351 7ff68c922d08-7ff68c922d0b 1300->1351 1352 7ff68c922d00-7ff68c922d03 SysFreeString 1300->1352 1301->1300 1303 7ff68c921e85-7ff68c921ea6 GetProcessHeap HeapAlloc 1301->1303 1305 7ff68c922016-7ff68c922040 1302->1305 1303->1300 1306 7ff68c921eac-7ff68c921ed7 1303->1306 1311 7ff68c922090-7ff68c9220b2 GetErrorInfo 1305->1311 1312 7ff68c922042-7ff68c922052 1305->1312 1308 7ff68c921f04-7ff68c921f07 1306->1308 1313 7ff68c921ee6 1308->1313 1314 7ff68c921f09-7ff68c921f0c 1308->1314 1316 7ff68c92257a-7ff68c92258a VariantClear 1311->1316 1317 7ff68c9220d0-7ff68c9220f2 call 7ff68c96a320 1312->1317 1318 7ff68c922054-7ff68c92205b 1312->1318 1319 7ff68c921ee9-7ff68c921f01 1313->1319 1320 7ff68c921fc0-7ff68c921fec 1314->1320 1321 7ff68c921f12-7ff68c921f19 1314->1321 1323 7ff68c922919-7ff68c92292b 1316->1323 1324 7ff68c922590-7ff68c922594 1316->1324 1337 7ff68c92215a-7ff68c92256f call 7ff68c96b260 1317->1337 1338 7ff68c9220f4-7ff68c922114 1317->1338 1325 7ff68c92230c-7ff68c92237a 1318->1325 1326 7ff68c922061-7ff68c922076 1318->1326 1319->1308 1320->1305 1328 7ff68c921f1b-7ff68c921f2e 1321->1328 1329 7ff68c921ee0-7ff68c921ee3 1321->1329 1332 7ff68c922930-7ff68c92298a 1323->1332 1324->1323 1333 7ff68c92259a-7ff68c9225b6 1324->1333 1344 7ff68c92211c-7ff68c922155 1325->1344 1326->1317 1335 7ff68c921f71-7ff68c921f7b 1328->1335 1336 7ff68c921f30-7ff68c921f44 1328->1336 1329->1313 1342 7ff68c92298c-7ff68c92299d HeapFree 1332->1342 1343 7ff68c9229a2-7ff68c9229b5 call 7ff68c9246a0 1332->1343 1345 7ff68c9225b8-7ff68c9225be 1333->1345 1346 7ff68c9225d0-7ff68c9225d5 1333->1346 1335->1313 1339 7ff68c921f46-7ff68c921f69 1336->1339 1340 7ff68c921f80-7ff68c921f90 1336->1340 1348 7ff68c922575 1337->1348 1367 7ff68c92260c-7ff68c92261c VariantClear 1337->1367 1338->1344 1339->1313 1347 7ff68c921f6f 1339->1347 1340->1313 1350 7ff68c921f96-7ff68c921fba 1340->1350 1342->1343 1363 7ff68c922b8b-7ff68c922b94 1343->1363 1364 7ff68c9229bb-7ff68c9229c4 1343->1364 1344->1348 1345->1346 1354 7ff68c9225c0 1345->1354 1346->1323 1355 7ff68c9225db-7ff68c922605 GetProcessHeap HeapFree 1346->1355 1347->1350 1348->1316 1350->1319 1359 7ff68c922d0d-7ff68c922d10 SysFreeString 1351->1359 1360 7ff68c922d15-7ff68c922da8 call 7ff68c921450 call 7ff68c960a50 1351->1360 1352->1351 1354->1300 1356 7ff68c922607 1355->1356 1357 7ff68c92266a-7ff68c9226ca call 7ff68c928530 1355->1357 1356->1332 1377 7ff68c922b1a-7ff68c922b42 1357->1377 1378 7ff68c9226d0-7ff68c922734 call 7ff68c925710 1357->1378 1359->1360 1397 7ff68c922de2-7ff68c922df9 call 7ff68c921450 1360->1397 1368 7ff68c922b96-7ff68c922ba4 HeapFree 1363->1368 1369 7ff68c922ba9-7ff68c922bd8 1363->1369 1370 7ff68c9229dd-7ff68c9229e2 1364->1370 1373 7ff68c92265a-7ff68c922662 1367->1373 1374 7ff68c92261e-7ff68c922622 1367->1374 1368->1369 1375 7ff68c9229d0-7ff68c9229d7 1370->1375 1376 7ff68c9229e4-7ff68c9229f5 HeapFree 1370->1376 1373->1357 1374->1373 1380 7ff68c922624-7ff68c922640 1374->1380 1375->1363 1375->1370 1376->1375 1377->1342 1381 7ff68c922b48 1377->1381 1392 7ff68c92273a-7ff68c92276e 1378->1392 1393 7ff68c9228ce-7ff68c9228de call 7ff68c928cc0 1378->1393 1385 7ff68c922646-7ff68c92264c 1380->1385 1386 7ff68c9228e8-7ff68c9228ea 1380->1386 1381->1343 1385->1300 1391 7ff68c922652-7ff68c922654 1385->1391 1386->1373 1390 7ff68c9228f0-7ff68c9228f5 1386->1390 1390->1332 1391->1373 1391->1390 1396 7ff68c922771-7ff68c92278a 1392->1396 1393->1323 1399 7ff68c9227ea-7ff68c922800 1396->1399 1400 7ff68c92278c-7ff68c922796 1396->1400 1408 7ff68c922dff-7ff68c922e04 1397->1408 1409 7ff68c922e82-7ff68c922e95 1397->1409 1404 7ff68c9227e0-7ff68c9227e8 1399->1404 1405 7ff68c922802-7ff68c92281b memcmp 1399->1405 1401 7ff68c9227b8-7ff68c9227c4 1400->1401 1402 7ff68c922798-7ff68c9227b0 1400->1402 1406 7ff68c9227ca-7ff68c9227d5 1401->1406 1407 7ff68c9228a5-7ff68c9228b3 1401->1407 1402->1401 1404->1399 1404->1400 1405->1404 1410 7ff68c92281d-7ff68c92285e 1405->1410 1406->1396 1415 7ff68c921d76-7ff68c921dfd 1407->1415 1416 7ff68c9228b9-7ff68c9228c5 1407->1416 1411 7ff68c922e06-7ff68c922e2b call 7ff68c926ae0 1408->1411 1412 7ff68c922db0-7ff68c922dde 1408->1412 1425 7ff68c922e97-7ff68c922eab 1409->1425 1426 7ff68c922f00-7ff68c922f0f 1409->1426 1413 7ff68c922876-7ff68c922890 1410->1413 1414 7ff68c922860-7ff68c922871 HeapFree 1410->1414 1411->1412 1412->1397 1418 7ff68c922896-7ff68c9228a0 call 7ff68c924fb0 1413->1418 1419 7ff68c921e00-7ff68c921e08 1413->1419 1414->1413 1415->1419 1416->1386 1418->1419 1423 7ff68c922b4d-7ff68c922b85 1419->1423 1424 7ff68c921e0e-7ff68c921e19 1419->1424 1423->1363 1423->1364 1424->1300 1429 7ff68c921e1f-7ff68c921e2b 1424->1429 1430 7ff68c922ead 1425->1430 1431 7ff68c922ec1-7ff68c922ec4 1425->1431 1427 7ff68c922f22-7ff68c922f35 1426->1427 1429->1295 1432 7ff68c921e50 1429->1432 1433 7ff68c922eb0-7ff68c922ebf call 7ff68c9246a0 1430->1433 1431->1427 1434 7ff68c922ec6-7ff68c922ed7 HeapFree 1431->1434 1432->1299 1433->1431 1434->1427
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeString$memcpy
    • String ID: 0
    • API String ID: 533883584-4108050209
    • Opcode ID: 50b96330b10b7d47c9f5546d11b14d233ea469d038f212d2914e309df0be2ac2
    • Instruction ID: fe77f8c1799e7075c4d741bf5813689562022d24dca34a2a8fa51a9d43356fe8
    • Opcode Fuzzy Hash: 50b96330b10b7d47c9f5546d11b14d233ea469d038f212d2914e309df0be2ac2
    • Instruction Fuzzy Hash: 8C429132A0CBC1C1EA318B15A4507FAA7A0FF99794F404179DAEC93A9AEF3CD555CB40

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1437 7ff68c92dc75-7ff68c92dc83 1438 7ff68c92dc8d-7ff68c92dc95 1437->1438 1439 7ff68c92dc85-7ff68c92dc8a 1437->1439 1440 7ff68c92dc9b-7ff68c92dca0 1438->1440 1441 7ff68c92de03-7ff68c92de26 HeapFree QueryPerformanceCounter 1438->1441 1439->1438 1443 7ff68c92dde8-7ff68c92ddeb 1440->1443 1444 7ff68c92dca6-7ff68c92dca9 1440->1444 1446 7ff68c92de2c-7ff68c92de3b 1441->1446 1447 7ff68c92e240-7ff68c931a55 GetLastError call 7ff68c951910 call 7ff68c926fc0 call 7ff68c960a50 call 7ff68c9609e0 call 7ff68c927c30 call 7ff68c956580 call 7ff68c9609e0 1441->1447 1448 7ff68c92ddef-7ff68c92de00 HeapFree 1443->1448 1444->1448 1450 7ff68c92de6d-7ff68c92de77 1446->1450 1451 7ff68c92de3d-7ff68c92de52 QueryPerformanceFrequency 1446->1451 1448->1441 1454 7ff68c92de79-7ff68c92de81 1450->1454 1455 7ff68c92de83-7ff68c92de87 1450->1455 1451->1447 1453 7ff68c92de58-7ff68c92de67 1451->1453 1453->1450 1457 7ff68c92e239 1453->1457 1458 7ff68c92de89-7ff68c92dea1 1454->1458 1455->1458 1462 7ff68c92e23b call 7ff68c9609e0 1457->1462 1460 7ff68c92dead-7ff68c92deb1 1458->1460 1461 7ff68c92dea3-7ff68c92deab 1458->1461 1464 7ff68c92deb3-7ff68c92deec call 7ff68c951910 QueryPerformanceCounter 1460->1464 1461->1464 1462->1447 1464->1447 1471 7ff68c92def2-7ff68c92df01 1464->1471 1472 7ff68c92df33-7ff68c92df3d 1471->1472 1473 7ff68c92df03-7ff68c92df18 QueryPerformanceFrequency 1471->1473 1476 7ff68c92df49-7ff68c92df4d 1472->1476 1477 7ff68c92df3f-7ff68c92df47 1472->1477 1473->1447 1475 7ff68c92df1e-7ff68c92df2d 1473->1475 1475->1457 1475->1472 1479 7ff68c92df4f-7ff68c92df67 1476->1479 1477->1479 1481 7ff68c92df69-7ff68c92df71 1479->1481 1482 7ff68c92df73-7ff68c92df77 1479->1482 1485 7ff68c92df79-7ff68c92df93 1481->1485 1482->1485 1487 7ff68c92dfc5-7ff68c92dfe8 1485->1487 1488 7ff68c92df95-7ff68c92dfaa QueryPerformanceFrequency 1485->1488 1491 7ff68c92dff6 1487->1491 1492 7ff68c92dfea-7ff68c92dff4 1487->1492 1488->1447 1490 7ff68c92dfb0-7ff68c92dfbf 1488->1490 1490->1457 1490->1487 1493 7ff68c92dff8-7ff68c92e025 1491->1493 1492->1493 1496 7ff68c92e027-7ff68c92e02e 1493->1496 1497 7ff68c92e034-7ff68c92e038 1493->1497 1496->1497 1498 7ff68c92e0dc-7ff68c92e0df 1496->1498 1497->1498 1499 7ff68c92e03e-7ff68c92e041 1497->1499 1498->1462 1500 7ff68c92e0e5-7ff68c92e0e8 1498->1500 1499->1457 1501 7ff68c92e047-7ff68c92e050 1499->1501 1504 7ff68c92e0fc-7ff68c92e104 1500->1504 1505 7ff68c92e0ea-7ff68c92e0ed 1500->1505 1502 7ff68c92e052-7ff68c92e055 1501->1502 1503 7ff68c92e073-7ff68c92e080 1501->1503 1502->1457 1506 7ff68c92e05b-7ff68c92e06f 1502->1506 1508 7ff68c92e0a7-7ff68c92e0d6 1503->1508 1509 7ff68c92e082-7ff68c92e097 1503->1509 1510 7ff68c92e106-7ff68c92e117 1504->1510 1511 7ff68c92e11d-7ff68c92e121 1504->1511 1505->1462 1507 7ff68c92e0f3-7ff68c92e0f6 1505->1507 1506->1509 1512 7ff68c92e071 1506->1512 1507->1504 1508->1462 1508->1498 1509->1457 1513 7ff68c92e09d-7ff68c92e0a4 1509->1513 1510->1457 1510->1511 1511->1462 1514 7ff68c92e127-7ff68c92e136 call 7ff68c96a080 1511->1514 1512->1508 1513->1508 1514->1457 1517 7ff68c92e13c call 7ff68c929e90 1514->1517 1519 7ff68c92e141-7ff68c92e1f5 GetCurrentProcess CheckRemoteDebuggerPresent GetCurrentProcess NtQueryInformationProcess GetCurrentProcess NtQueryInformationProcess GetCurrentProcess NtQueryInformationProcess 1517->1519 1519->1462 1520 7ff68c92e1f7-7ff68c92e1fd 1519->1520 1520->1462 1521 7ff68c92e1ff-7ff68c92e204 1520->1521 1521->1462 1522 7ff68c92e206-7ff68c92e20c 1521->1522 1522->1462 1523 7ff68c92e20e-7ff68c92e238 SetThreadExecutionState call 7ff68c92e250 1522->1523
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: PerformanceQuery$CounterFreeFrequencyHeap
    • String ID:
    • API String ID: 3102513981-0
    • Opcode ID: ad587353745b02789d553ddf97c86c22643eacc695827c5e987124cabeee557f
    • Instruction ID: 8a86c0a1df6d4cf35d7a441f500b1e2c6df730ec275dd1d3131b2fe94a5402d5
    • Opcode Fuzzy Hash: ad587353745b02789d553ddf97c86c22643eacc695827c5e987124cabeee557f
    • Instruction Fuzzy Hash: AAA1F922F0D6C2C2FE24DA59A4647B96295BF98780F044079DE9E86BD7CF7CE542C740

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1526 7ff68c9681b0-7ff68c9681bd 1527 7ff68c968235-7ff68c968294 1526->1527 1528 7ff68c9681bf-7ff68c9681e1 1526->1528 1529 7ff68c968296-7ff68c9682a4 1527->1529 1530 7ff68c9682b4-7ff68c9682d4 1527->1530 1528->1527 1531 7ff68c9681e3-7ff68c9681e6 1528->1531 1532 7ff68c9682d9-7ff68c9682e9 1529->1532 1533 7ff68c9682a6-7ff68c9682af 1529->1533 1534 7ff68c968533-7ff68c96853d call 7ff68c952e20 1530->1534 1535 7ff68c9681fd 1531->1535 1536 7ff68c9681e8-7ff68c9681fb 1531->1536 1537 7ff68c9682eb-7ff68c9682fc 1532->1537 1538 7ff68c968328-7ff68c968335 1532->1538 1539 7ff68c96836f-7ff68c9683aa 1533->1539 1550 7ff68c968542-7ff68c96855f 1534->1550 1541 7ff68c9681ff-7ff68c968220 call 7ff68c94fdd0 1535->1541 1536->1541 1542 7ff68c968337-7ff68c968349 1537->1542 1543 7ff68c9682fe-7ff68c968322 1537->1543 1538->1539 1545 7ff68c968962-7ff68c968998 1539->1545 1546 7ff68c9683b0-7ff68c9683c5 call 7ff68c960a50 1539->1546 1541->1527 1560 7ff68c968222-7ff68c968234 1541->1560 1548 7ff68c96834b-7ff68c96836c 1542->1548 1549 7ff68c968324-7ff68c968326 1542->1549 1543->1548 1543->1549 1552 7ff68c968a7b-7ff68c968a7d 1545->1552 1553 7ff68c96899e-7ff68c9689e3 call 7ff68c925710 1545->1553 1546->1545 1562 7ff68c9683cb-7ff68c9683ed 1546->1562 1548->1539 1549->1539 1556 7ff68c968565-7ff68c9685b0 call 7ff68c925710 1550->1556 1557 7ff68c96862e-7ff68c968654 PdhAddEnglishCounterW 1550->1557 1555 7ff68c968a8e-7ff68c968aae 1552->1555 1569 7ff68c9689e7-7ff68c9689fe 1553->1569 1576 7ff68c9685b4-7ff68c9685cb 1556->1576 1564 7ff68c96865a-7ff68c968663 1557->1564 1565 7ff68c9686e1-7ff68c9686f2 1557->1565 1568 7ff68c968400-7ff68c968403 1562->1568 1570 7ff68c968678-7ff68c968689 1564->1570 1571 7ff68c968665-7ff68c968673 HeapFree 1564->1571 1565->1545 1566 7ff68c9686f8-7ff68c9686fc 1565->1566 1574 7ff68c96871d 1566->1574 1575 7ff68c9686fe-7ff68c968712 call 7ff68c960a50 1566->1575 1577 7ff68c968405-7ff68c968408 1568->1577 1578 7ff68c968480-7ff68c968488 1568->1578 1579 7ff68c968a2d-7ff68c968a46 1569->1579 1580 7ff68c968a00-7ff68c968a0c 1569->1580 1572 7ff68c96869d-7ff68c9686a1 1570->1572 1573 7ff68c96868b-7ff68c968698 HeapFree 1570->1573 1571->1570 1583 7ff68c9686b4-7ff68c9686e0 1572->1583 1584 7ff68c9686a3-7ff68c9686af HeapFree 1572->1584 1573->1572 1588 7ff68c968722-7ff68c968755 memcpy call 7ff68c925710 1574->1588 1575->1545 1607 7ff68c968718-7ff68c96871b 1575->1607 1586 7ff68c9685cd-7ff68c9685d9 1576->1586 1587 7ff68c9685fe-7ff68c968617 1576->1587 1589 7ff68c968509-7ff68c968531 1577->1589 1590 7ff68c96840e-7ff68c968414 1577->1590 1581 7ff68c9683f0-7ff68c9683fd 1578->1581 1582 7ff68c96848e-7ff68c9684c6 call 7ff68c926ae0 1578->1582 1592 7ff68c968a48-7ff68c968a59 memcmp 1579->1592 1593 7ff68c968a20-7ff68c968a2b 1579->1593 1580->1552 1591 7ff68c968a0e-7ff68c968a1c 1580->1591 1581->1568 1582->1581 1584->1583 1586->1557 1602 7ff68c9685db-7ff68c9685e9 1586->1602 1600 7ff68c968619-7ff68c96862a memcmp 1587->1600 1601 7ff68c9685f0-7ff68c9685fc 1587->1601 1612 7ff68c96875b-7ff68c968789 1588->1612 1613 7ff68c968951-7ff68c96895d call 7ff68c968ab0 1588->1613 1589->1534 1589->1550 1596 7ff68c968416-7ff68c968423 1590->1596 1597 7ff68c968427-7ff68c968438 1590->1597 1591->1569 1592->1593 1599 7ff68c968a5b-7ff68c968a73 PdhGetFormattedCounterValue 1592->1599 1593->1579 1593->1580 1596->1581 1611 7ff68c968425 1596->1611 1608 7ff68c96843a-7ff68c96844c 1597->1608 1609 7ff68c968471-7ff68c96847b 1597->1609 1604 7ff68c968a75-7ff68c968a79 1599->1604 1605 7ff68c968a7f-7ff68c968a85 1599->1605 1600->1601 1606 7ff68c96862c 1600->1606 1601->1586 1601->1587 1602->1576 1614 7ff68c968a89 1604->1614 1605->1614 1606->1557 1606->1564 1607->1588 1615 7ff68c9684cb-7ff68c9684da 1608->1615 1616 7ff68c96844e-7ff68c96846d 1608->1616 1609->1578 1611->1582 1620 7ff68c96878c-7ff68c9687ac 1612->1620 1613->1545 1614->1555 1615->1578 1618 7ff68c9684dc-7ff68c968501 1615->1618 1616->1578 1619 7ff68c96846f 1616->1619 1618->1581 1622 7ff68c968507 1618->1622 1619->1618 1623 7ff68c96881a-7ff68c968832 1620->1623 1624 7ff68c9687ae-7ff68c9687b8 1620->1624 1622->1582 1627 7ff68c968834-7ff68c968845 memcmp 1623->1627 1628 7ff68c968810-7ff68c968818 1623->1628 1625 7ff68c9687da-7ff68c9687ee 1624->1625 1626 7ff68c9687ba-7ff68c9687d2 1624->1626 1629 7ff68c9688da-7ff68c9688e9 1625->1629 1630 7ff68c9687f4-7ff68c968802 1625->1630 1626->1625 1627->1628 1631 7ff68c968847-7ff68c968853 1627->1631 1628->1623 1628->1624 1632 7ff68c9688eb-7ff68c9688fa 1629->1632 1633 7ff68c9688ff-7ff68c96894c 1629->1633 1630->1620 1634 7ff68c968866-7ff68c968884 1631->1634 1635 7ff68c968855-7ff68c968861 HeapFree 1631->1635 1632->1633 1633->1634 1636 7ff68c968899-7ff68c9688a7 1634->1636 1637 7ff68c968886-7ff68c968894 HeapFree 1634->1637 1635->1634 1638 7ff68c9688bb-7ff68c9688cf 1636->1638 1639 7ff68c9688a9-7ff68c9688b6 HeapFree 1636->1639 1637->1636 1638->1584 1640 7ff68c9688d5 1638->1640 1639->1638 1640->1583
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 010ce4dc0debaf448ef07b04937072c59ac8582eff4e42d97f0964fba0fdaa43
    • Instruction ID: 2b3ffb553646563f04b4ccc01941c1a4ad161cb65882d1019756048c7e68dd51
    • Opcode Fuzzy Hash: 010ce4dc0debaf448ef07b04937072c59ac8582eff4e42d97f0964fba0fdaa43
    • Instruction Fuzzy Hash: EA12D622A18FC5C1EA218B25A40076AA7A0FF45BD4F55427AEF8D93B96EF3CD181C344

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 2081 7ff68c963170-7ff68c9631cd 2082 7ff68c9631d3-7ff68c9631f1 2081->2082 2083 7ff68c9638e5-7ff68c9638e8 2081->2083 2084 7ff68c963987-7ff68c963998 2082->2084 2085 7ff68c9631f7-7ff68c963248 2082->2085 2086 7ff68c963976-7ff68c963979 2083->2086 2087 7ff68c963919-7ff68c96392b 2083->2087 2091 7ff68c963beb-7ff68c963c0e 2084->2091 2088 7ff68c9632e7-7ff68c96333e 2085->2088 2086->2082 2086->2084 2089 7ff68c96399d-7ff68c9639b5 2087->2089 2090 7ff68c96392d-7ff68c96393b call 7ff68c960a50 2087->2090 2092 7ff68c963344-7ff68c96337e call 7ff68c963e30 2088->2092 2093 7ff68c963471-7ff68c96347c 2088->2093 2089->2091 2095 7ff68c9639bb-7ff68c9639e8 2089->2095 2099 7ff68c963940-7ff68c963948 2090->2099 2107 7ff68c963381-7ff68c963397 2092->2107 2096 7ff68c96347e-7ff68c96349e call 7ff68c9519c0 2093->2096 2097 7ff68c9634b0-7ff68c963508 call 7ff68c960a50 2093->2097 2095->2091 2096->2097 2108 7ff68c9635e3-7ff68c9636de OpenProcess GetLastError OpenProcess GetLastError 2096->2108 2104 7ff68c963c51-7ff68c963c53 2097->2104 2112 7ff68c96350e-7ff68c9635dd 2097->2112 2103 7ff68c96394e-7ff68c963971 2099->2103 2099->2104 2103->2091 2110 7ff68c963399-7ff68c9633b9 2107->2110 2111 7ff68c9633c8-7ff68c9633d4 2107->2111 2122 7ff68c9636e3-7ff68c963867 call 7ff68c9660b0 memcpy 2108->2122 2110->2111 2114 7ff68c9633f0-7ff68c9633fc 2110->2114 2111->2093 2115 7ff68c9633da-7ff68c9633e8 2111->2115 2112->2108 2112->2122 2116 7ff68c963402-7ff68c96343d GetProcessTimes 2114->2116 2117 7ff68c963250-7ff68c9632a5 call 7ff68c9660b0 2114->2117 2115->2107 2120 7ff68c963444-7ff68c96346b 2116->2120 2124 7ff68c9632aa-7ff68c9632bd 2117->2124 2120->2093 2120->2117 2126 7ff68c9632c2-7ff68c9632e1 2122->2126 2127 7ff68c96386d-7ff68c963891 2122->2127 2124->2126 2126->2087 2126->2088 2128 7ff68c963893-7ff68c96389b call 7ff68c9649a0 2127->2128 2129 7ff68c9638a0-7ff68c9638e0 memcpy 2127->2129 2128->2129 2129->2126
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 60b46481683bb0d36841eaf31f2bd210b0632c0c5a82eee86814717a4cbdc2a3
    • Instruction ID: 2970dd379c4e455d1d5f53ba58c339fa4b00609e69b5d7374f58621a2bb9b791
    • Opcode Fuzzy Hash: 60b46481683bb0d36841eaf31f2bd210b0632c0c5a82eee86814717a4cbdc2a3
    • Instruction Fuzzy Hash: 57F16A32A19FC5C1EA618B15E4407AAB3A4FBD9794F40422ADBDD53B9AEF3CD190C740

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 2131 7ff68c962880-7ff68c962898 2132 7ff68c96311e-7ff68c963131 2131->2132 2133 7ff68c96289e-7ff68c9628f5 GetSystemInfo 2131->2133 2134 7ff68c9628fb-7ff68c96291d call 7ff68c960a50 2133->2134 2135 7ff68c962a97-7ff68c962b7f call 7ff68c960a50 2133->2135 2140 7ff68c962923-7ff68c96295b 2134->2140 2141 7ff68c963161-7ff68c963163 2134->2141 2135->2141 2144 7ff68c962b85-7ff68c962bcc call 7ff68c967db0 * 3 2135->2144 2143 7ff68c962960-7ff68c962982 2140->2143 2145 7ff68c962984-7ff68c962996 call 7ff68c967e60 2143->2145 2146 7ff68c96299e-7ff68c9629bf 2143->2146 2162 7ff68c962bec-7ff68c962cd2 call 7ff68c93ddc0 call 7ff68c960a50 2144->2162 2163 7ff68c962bce 2144->2163 2145->2146 2150 7ff68c9629cc-7ff68c9629e2 call 7ff68c960a50 2146->2150 2151 7ff68c9629c1-7ff68c9629ca 2146->2151 2150->2141 2158 7ff68c9629e8-7ff68c962a4a call 7ff68c967db0 * 3 2150->2158 2151->2143 2151->2150 2177 7ff68c962a50-7ff68c962a95 call 7ff68c967db0 * 4 2158->2177 2162->2141 2182 7ff68c962cd8-7ff68c962cf7 memcpy 2162->2182 2166 7ff68c962bd0-7ff68c962bdc 2163->2166 2170 7ff68c962bde 2166->2170 2170->2162 2186 7ff68c962d0a-7ff68c962d8a call 7ff68c967f10 call 7ff68c960a50 2182->2186 2187 7ff68c962cf9-7ff68c962d05 HeapFree 2182->2187 2186->2141 2200 7ff68c962d90-7ff68c962dd1 2186->2200 2187->2186 2202 7ff68c962e52-7ff68c962ee3 call 7ff68c933590 2200->2202 2205 7ff68c962f02-7ff68c962f32 memcpy 2202->2205 2206 7ff68c962ee5-7ff68c962ef9 call 7ff68c960a50 2202->2206 2208 7ff68c962f34-7ff68c962f48 call 7ff68c960a50 2205->2208 2209 7ff68c962f51-7ff68c962fdc memcpy 2205->2209 2206->2141 2216 7ff68c962eff 2206->2216 2208->2141 2217 7ff68c962f4e 2208->2217 2210 7ff68c962fe2-7ff68c962ff1 call 7ff68c968100 2209->2210 2211 7ff68c962de0-7ff68c962e4c 2209->2211 2210->2211 2211->2202 2216->2205 2217->2209
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeapInfoSystemmemcpy
    • String ID: 0
    • API String ID: 3308777956-4108050209
    • Opcode ID: 404353b3a8d039b486dee1d3b9b6aac3da3c49f61fbbb9e39aa0790207e85432
    • Instruction ID: 04f1cf6105b64e716eeb808797c1ee7bf37471e238f94f94a6c4eb970c930628
    • Opcode Fuzzy Hash: 404353b3a8d039b486dee1d3b9b6aac3da3c49f61fbbb9e39aa0790207e85432
    • Instruction Fuzzy Hash: E1E16B32A0CFC185EA618B15A4417EAA7A4FF88784F054179DF8D97B9ADF3CE141C780
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d4f43a0b68f04ca8f2b4c0bf9bf4dbe044ff7a6c630ae721857b81b1962a1ae6
    • Instruction ID: 254b56e7df3f5cebbb01fe9feef8b6dfba930e4e263f46a4298ae03c44c309ee
    • Opcode Fuzzy Hash: d4f43a0b68f04ca8f2b4c0bf9bf4dbe044ff7a6c630ae721857b81b1962a1ae6
    • Instruction Fuzzy Hash: F3029272A09BCAC1EE758A25D4403BE6391FF58BA0F14817ADA7E87796DF2CE451C304
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID: ROOT\CIMV2
    • API String ID: 0-2786109267
    • Opcode ID: 1d8217cd8db557e39bf23c92d629e505a4cac9bec28c7c1899340a9821643011
    • Instruction ID: 10b8b6c590012c46bef13ad0d22bff8f8a5dacfc2e1a0ef1a983fe2cf681a5de
    • Opcode Fuzzy Hash: 1d8217cd8db557e39bf23c92d629e505a4cac9bec28c7c1899340a9821643011
    • Instruction Fuzzy Hash: 5C527E72609BC2C5EB608B15E4503AA77A4FB98B80F04917ADEDD83B9ADF3CD550D780
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: ErrorInfo$FreeString$BlanketProxy
    • String ID:
    • API String ID: 1303109439-0
    • Opcode ID: 664f7aab06423971a46c950386747f7de9d8e0b1d85871583196955750c8c1f6
    • Instruction ID: a8f80e53c6ba411a71b95d1e0fb86c6f5d098e54d3af4e828f14abfc1b066188
    • Opcode Fuzzy Hash: 664f7aab06423971a46c950386747f7de9d8e0b1d85871583196955750c8c1f6
    • Instruction Fuzzy Hash: BD515E22609AC1C2EF549F65E45476BA7A0FF84B94F048079EF8A87B96DFBDD044C740
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 21d6fb625223bc6a466778d85b122ec81e49a204b46f79ff25f746334822ed48
    • Instruction ID: e844f7bcc89e0bccbc195412e415a94faeb2259da0bc92c8392082b8e1f91c8f
    • Opcode Fuzzy Hash: 21d6fb625223bc6a466778d85b122ec81e49a204b46f79ff25f746334822ed48
    • Instruction Fuzzy Hash: 92F11262A18BC181EB208B15E40077AA7A0FF85794F55823AEB9D93FD6EF7CD581C344
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeapInformationProcessQuery$ErrorInfo
    • String ID:
    • API String ID: 2435025923-0
    • Opcode ID: 5c65f84ea6d1147ced56518bcf66d3a2bb71d6ab04ee36ab2beacc505ef9b98c
    • Instruction ID: aabf79091a0f188b12ab757227032b5520e0e6c712f08b0b346e0fbbecda3192
    • Opcode Fuzzy Hash: 5c65f84ea6d1147ced56518bcf66d3a2bb71d6ab04ee36ab2beacc505ef9b98c
    • Instruction Fuzzy Hash: 9B319062B09A82C1FF249B62E540B7E66A0BF88B84F544179DB4EC7BD6DE3DD541C340
    APIs
      • Part of subcall function 00007FF68C969300: memset.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF68C969361
      • Part of subcall function 00007FF68C969300: GlobalMemoryStatusEx.KERNEL32 ref: 00007FF68C969423
      • Part of subcall function 00007FF68C969300: GetLastError.KERNEL32 ref: 00007FF68C96942C
      • Part of subcall function 00007FF68C969300: K32GetPerformanceInfo.KERNEL32 ref: 00007FF68C969472
      • Part of subcall function 00007FF68C969300: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF68C96950A
      • Part of subcall function 00007FF68C969530: GetLastError.KERNEL32 ref: 00007FF68C969570
      • Part of subcall function 00007FF68C969530: K32GetPerformanceInfo.KERNEL32 ref: 00007FF68C9695B2
    • GetComputerNameExW.KERNEL32 ref: 00007FF68C929EF1
    • GetLastError.KERNEL32 ref: 00007FF68C929F29
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: ErrorLast$InfoPerformance$ComputerGlobalMemoryNameStatusmemcpymemset
    • String ID:
    • API String ID: 1427969580-0
    • Opcode ID: c3693956cab937d82499779056128ff5bd833bd7ceab96c91af5f4835c35b8a2
    • Instruction ID: d46ea48dbdbe146842effa96d0200c24116226018ff44dd50fbb379e29434689
    • Opcode Fuzzy Hash: c3693956cab937d82499779056128ff5bd833bd7ceab96c91af5f4835c35b8a2
    • Instruction Fuzzy Hash: 7232C236649BC295EA70CB15F4507AAB7A8FB88740F504129DADC83F6AEF7CC154DB80
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 82e2f1d2d7ec97dde5930c35012a2fffab26fb9b9f91ba01edaa8fd4d8e2d5f8
    • Instruction ID: 8adc2c5634da276786361b969a1bcefa362617498b35aa16efdb15d59ff8728e
    • Opcode Fuzzy Hash: 82e2f1d2d7ec97dde5930c35012a2fffab26fb9b9f91ba01edaa8fd4d8e2d5f8
    • Instruction Fuzzy Hash: 4F916622F18DC2C5EFA88A25D51077A6A91FF44798F054279EB6E87BD6DE3CE140D340
    APIs
    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,FFFFFFFF,00007FF68C953011), ref: 00007FF68C951B84
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: memcpy
    • String ID:
    • API String ID: 3510742995-0
    • Opcode ID: bf0c95b33f9936904ae2765593f19029f3ccad539fe360f583df4964aecb7a38
    • Instruction ID: 2d980ee60e004be5483ee5f260ba960ca516691e4a01964cdd30c3409f1df43a
    • Opcode Fuzzy Hash: bf0c95b33f9936904ae2765593f19029f3ccad539fe360f583df4964aecb7a38
    • Instruction Fuzzy Hash: 67511413A0D6C1C6FB314A29A55037B6B50FB59389F045279EE8E86BDAEE3CD285C740

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1641 7ff68c9221b0-7ff68c92221f call 7ff68c97b0a4 1644 7ff68c922317-7ff68c922349 GetErrorInfo call 7ff68c97b144 1641->1644 1645 7ff68c922225-7ff68c922287 call 7ff68c97b09c 1641->1645 1652 7ff68c9223b5-7ff68c9223d6 1644->1652 1650 7ff68c92228d-7ff68c922292 1645->1650 1651 7ff68c92237f-7ff68c92239e GetErrorInfo 1645->1651 1653 7ff68c9223a8-7ff68c9223b0 PropVariantClear 1650->1653 1651->1653 1654 7ff68c9223a0-7ff68c9223a3 SysFreeString 1651->1654 1655 7ff68c9223d8-7ff68c9223db 1652->1655 1656 7ff68c9223e1-7ff68c922463 call 7ff68c93d700 1652->1656 1653->1652 1654->1653 1655->1656 1659 7ff68c92246a-7ff68c92246d 1656->1659 1660 7ff68c922465 SysFreeString 1656->1660 1661 7ff68c922473-7ff68c9224a8 1659->1661 1662 7ff68c922c62-7ff68c922cfe call 7ff68c969af0 * 2 1659->1662 1660->1659 1665 7ff68c9224b0-7ff68c92256f call 7ff68c96b260 1661->1665 1691 7ff68c922d08-7ff68c922d0b 1662->1691 1692 7ff68c922d00-7ff68c922d03 SysFreeString 1662->1692 1671 7ff68c92260c-7ff68c92261c VariantClear 1665->1671 1672 7ff68c922575 1665->1672 1674 7ff68c92265a-7ff68c922662 1671->1674 1675 7ff68c92261e-7ff68c922622 1671->1675 1676 7ff68c92257a-7ff68c92258a VariantClear 1672->1676 1679 7ff68c92266a-7ff68c9226ca call 7ff68c928530 1674->1679 1675->1674 1678 7ff68c922624-7ff68c922640 1675->1678 1680 7ff68c922919-7ff68c92292b 1676->1680 1681 7ff68c922590-7ff68c922594 1676->1681 1683 7ff68c922646-7ff68c92264c 1678->1683 1684 7ff68c9228e8-7ff68c9228ea 1678->1684 1700 7ff68c922b1a-7ff68c922b42 1679->1700 1701 7ff68c9226d0-7ff68c922734 call 7ff68c925710 1679->1701 1686 7ff68c922930-7ff68c92298a 1680->1686 1681->1680 1687 7ff68c92259a-7ff68c9225b6 1681->1687 1683->1662 1693 7ff68c922652-7ff68c922654 1683->1693 1684->1674 1688 7ff68c9228f0-7ff68c9228f5 1684->1688 1689 7ff68c92298c-7ff68c92299d HeapFree 1686->1689 1690 7ff68c9229a2-7ff68c9229b5 call 7ff68c9246a0 1686->1690 1695 7ff68c9225b8-7ff68c9225be 1687->1695 1696 7ff68c9225d0-7ff68c9225d5 1687->1696 1688->1686 1689->1690 1709 7ff68c922b8b-7ff68c922b94 1690->1709 1710 7ff68c9229bb-7ff68c9229c4 1690->1710 1698 7ff68c922d0d-7ff68c922d10 SysFreeString 1691->1698 1699 7ff68c922d15-7ff68c922da8 call 7ff68c921450 call 7ff68c960a50 1691->1699 1692->1691 1693->1674 1693->1688 1695->1696 1702 7ff68c9225c0 1695->1702 1696->1680 1703 7ff68c9225db-7ff68c922605 GetProcessHeap HeapFree 1696->1703 1698->1699 1737 7ff68c922de2-7ff68c922deb call 7ff68c921450 1699->1737 1700->1689 1705 7ff68c922b48 1700->1705 1717 7ff68c92273a-7ff68c92276e 1701->1717 1718 7ff68c9228ce-7ff68c9228de call 7ff68c928cc0 1701->1718 1702->1662 1703->1679 1704 7ff68c922607 1703->1704 1704->1686 1705->1690 1713 7ff68c922b96-7ff68c922ba4 HeapFree 1709->1713 1714 7ff68c922ba9-7ff68c922bd8 1709->1714 1715 7ff68c9229dd-7ff68c9229e2 1710->1715 1713->1714 1720 7ff68c9229d0-7ff68c9229d7 1715->1720 1721 7ff68c9229e4-7ff68c9229f5 HeapFree 1715->1721 1723 7ff68c922771-7ff68c92278a 1717->1723 1718->1680 1720->1709 1720->1715 1721->1720 1726 7ff68c9227ea-7ff68c922800 1723->1726 1727 7ff68c92278c-7ff68c922796 1723->1727 1730 7ff68c9227e0-7ff68c9227e8 1726->1730 1731 7ff68c922802-7ff68c92281b memcmp 1726->1731 1728 7ff68c9227b8-7ff68c9227c4 1727->1728 1729 7ff68c922798-7ff68c9227b0 1727->1729 1734 7ff68c9227ca-7ff68c9227d5 1728->1734 1735 7ff68c9228a5-7ff68c9228b3 1728->1735 1729->1728 1730->1726 1730->1727 1731->1730 1736 7ff68c92281d-7ff68c92285e 1731->1736 1734->1723 1741 7ff68c921d76-7ff68c921dfd 1735->1741 1742 7ff68c9228b9-7ff68c9228c5 1735->1742 1739 7ff68c922876-7ff68c922890 1736->1739 1740 7ff68c922860-7ff68c922871 HeapFree 1736->1740 1743 7ff68c922df0-7ff68c922df9 1737->1743 1744 7ff68c922896-7ff68c9228a0 call 7ff68c924fb0 1739->1744 1745 7ff68c921e00-7ff68c921e08 1739->1745 1740->1739 1741->1745 1742->1684 1746 7ff68c922dff-7ff68c922e04 1743->1746 1747 7ff68c922e82-7ff68c922e95 1743->1747 1744->1745 1749 7ff68c922b4d-7ff68c922b85 1745->1749 1750 7ff68c921e0e-7ff68c921e19 1745->1750 1751 7ff68c922e06-7ff68c922e2b call 7ff68c926ae0 1746->1751 1752 7ff68c922db0-7ff68c922dde 1746->1752 1762 7ff68c922e97-7ff68c922eab 1747->1762 1763 7ff68c922f00-7ff68c922f0f 1747->1763 1749->1709 1749->1710 1750->1662 1754 7ff68c921e1f-7ff68c921e2b 1750->1754 1751->1752 1752->1737 1755 7ff68c921e2d-7ff68c921e41 call 7ff68c960a50 1754->1755 1756 7ff68c921e50 1754->1756 1761 7ff68c921e55-7ff68c921e72 memcpy 1755->1761 1771 7ff68c921e43 1755->1771 1756->1761 1765 7ff68c921e78-7ff68c921e7f 1761->1765 1766 7ff68c921ff0-7ff68c92200f 1761->1766 1768 7ff68c922ead 1762->1768 1769 7ff68c922ec1-7ff68c922ec4 1762->1769 1767 7ff68c922f22-7ff68c922f35 1763->1767 1765->1662 1773 7ff68c921e85-7ff68c921ea6 GetProcessHeap HeapAlloc 1765->1773 1774 7ff68c922016-7ff68c922040 1766->1774 1770 7ff68c922eb0-7ff68c922ebf call 7ff68c9246a0 1768->1770 1769->1767 1772 7ff68c922ec6-7ff68c922ed7 HeapFree 1769->1772 1770->1769 1771->1662 1772->1767 1773->1662 1776 7ff68c921eac-7ff68c921ed7 1773->1776 1780 7ff68c922090-7ff68c9220b2 GetErrorInfo 1774->1780 1781 7ff68c922042-7ff68c922052 1774->1781 1778 7ff68c921f04-7ff68c921f07 1776->1778 1782 7ff68c921ee6 1778->1782 1783 7ff68c921f09-7ff68c921f0c 1778->1783 1780->1676 1784 7ff68c9220d0-7ff68c9220f2 call 7ff68c96a320 1781->1784 1785 7ff68c922054-7ff68c92205b 1781->1785 1786 7ff68c921ee9-7ff68c921f01 1782->1786 1787 7ff68c921fc0-7ff68c921fec 1783->1787 1788 7ff68c921f12-7ff68c921f19 1783->1788 1798 7ff68c92215a-7ff68c922174 1784->1798 1799 7ff68c9220f4-7ff68c922114 1784->1799 1789 7ff68c92230c-7ff68c92237a 1785->1789 1790 7ff68c922061-7ff68c922076 1785->1790 1786->1778 1787->1774 1792 7ff68c921f1b-7ff68c921f2e 1788->1792 1793 7ff68c921ee0-7ff68c921ee3 1788->1793 1802 7ff68c92211c-7ff68c922155 1789->1802 1790->1784 1796 7ff68c921f71-7ff68c921f7b 1792->1796 1797 7ff68c921f30-7ff68c921f44 1792->1797 1793->1782 1796->1782 1800 7ff68c921f46-7ff68c921f69 1797->1800 1801 7ff68c921f80-7ff68c921f90 1797->1801 1798->1665 1799->1802 1800->1782 1803 7ff68c921f6f 1800->1803 1801->1782 1804 7ff68c921f96-7ff68c921fba 1801->1804 1802->1672 1803->1804 1804->1786
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeString$ClearErrorInfoVariant$Prop
    • String ID: 0
    • API String ID: 2610251959-4108050209
    • Opcode ID: 6eab7ecc527cd6b100ef869782f59566a180efc7fc42f5945f2686aca6c5a658
    • Instruction ID: b34316ab3fa094c0113be7bf790e6c3f4caef8e979cad02a032fd129afd7d817
    • Opcode Fuzzy Hash: 6eab7ecc527cd6b100ef869782f59566a180efc7fc42f5945f2686aca6c5a658
    • Instruction Fuzzy Hash: 99D14C3250CBC1C1EA618B15E4543EEB7A0FF99784F40812ADADD87A9ADF7CD285CB40

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1805 7ff68c94ce20-7ff68c94ce4c 1806 7ff68c94ce5d-7ff68c94ce64 1805->1806 1807 7ff68c94ce4e-7ff68c94ce51 1805->1807 1810 7ff68c94ce69 call 7ff68c95f4a0 1806->1810 1808 7ff68c94ce53-7ff68c94ce5b 1807->1808 1809 7ff68c94ce6e-7ff68c94ce75 1807->1809 1808->1810 1812 7ff68c94ce9c-7ff68c94cea5 1809->1812 1813 7ff68c94ce77-7ff68c94ce86 call 7ff68c956220 1809->1813 1810->1809 1814 7ff68c94cea7-7ff68c94ceb6 call 7ff68c956220 1812->1814 1815 7ff68c94ced2-7ff68c94cef9 call 7ff68c950180 call 7ff68c94c5f0 call 7ff68c94c850 1812->1815 1822 7ff68c94cebc-7ff68c94cec5 1813->1822 1823 7ff68c94ce88-7ff68c94ce8c 1813->1823 1814->1822 1824 7ff68c94d1ca 1814->1824 1815->1824 1838 7ff68c94ceff-7ff68c94cf03 1815->1838 1822->1815 1825 7ff68c94cec7-7ff68c94cecb 1822->1825 1823->1824 1827 7ff68c94ce92-7ff68c94ce9a call 7ff68c94cbc0 1823->1827 1828 7ff68c94d1cc-7ff68c94d1d4 call 7ff68c952710 1824->1828 1825->1815 1829 7ff68c94cecd call 7ff68c94cbc0 1825->1829 1827->1812 1829->1815 1838->1824 1839 7ff68c94cf09-7ff68c94cf24 1838->1839 1839->1824 1840 7ff68c94cf2a-7ff68c94cf4e 1839->1840 1841 7ff68c94d19b-7ff68c94d1a3 call 7ff68c952710 1840->1841 1842 7ff68c94cf54-7ff68c94cf6d WakeByAddressAll 1840->1842 1850 7ff68c94d1a8-7ff68c94d1b8 call 7ff68c94ac60 1841->1850 1843 7ff68c94cf77-7ff68c94cf82 1842->1843 1844 7ff68c94cf6f-7ff68c94cf72 WakeByAddressSingle 1842->1844 1846 7ff68c94cf92-7ff68c94cfa9 1843->1846 1847 7ff68c94cf84-7ff68c94cf8c 1843->1847 1844->1843 1846->1824 1849 7ff68c94cfaf-7ff68c94cfc3 1846->1849 1847->1846 1849->1850 1851 7ff68c94cfc9-7ff68c94cfd0 1849->1851 1854 7ff68c94d1bd-7ff68c94d1c4 1850->1854 1851->1824 1853 7ff68c94cfd6-7ff68c94cff8 1851->1853 1853->1828 1855 7ff68c94cffe-7ff68c94d017 WakeByAddressAll 1853->1855 1854->1824 1854->1853 1856 7ff68c94d019-7ff68c94d01c WakeByAddressSingle 1855->1856 1857 7ff68c94d021-7ff68c94d02c 1855->1857 1856->1857 1858 7ff68c94d03c-7ff68c94d044 call 7ff68c94c850 1857->1858 1859 7ff68c94d02e-7ff68c94d036 1857->1859 1858->1824 1862 7ff68c94d04a-7ff68c94d04d 1858->1862 1859->1858 1862->1824 1863 7ff68c94d053-7ff68c94d066 1862->1863 1864 7ff68c94d068-7ff68c94d070 call 7ff68c94c900 1863->1864 1865 7ff68c94d075-7ff68c94d081 1863->1865 1864->1865 1867 7ff68c94d083-7ff68c94d08b call 7ff68c94c900 1865->1867 1868 7ff68c94d090-7ff68c94d0b3 1865->1868 1867->1868 1870 7ff68c94d17d-7ff68c94d183 1868->1870 1871 7ff68c94d0b9-7ff68c94d0d3 HeapFree 1868->1871 1874 7ff68c94d185-7ff68c94d199 HeapFree 1870->1874 1875 7ff68c94d170-7ff68c94d177 1870->1875 1872 7ff68c94d0e2-7ff68c94d0eb 1871->1872 1873 7ff68c94d0d5-7ff68c94d0dd call 7ff68c94c970 1871->1873 1877 7ff68c94d12a-7ff68c94d146 1872->1877 1878 7ff68c94d0ed-7ff68c94d0f4 1872->1878 1873->1872 1874->1875 1875->1870 1875->1871 1879 7ff68c94d148-7ff68c94d150 call 7ff68c94cc10 1877->1879 1880 7ff68c94d155-7ff68c94d169 1877->1880 1878->1877 1881 7ff68c94d0f6-7ff68c94d100 1878->1881 1879->1880 1882 7ff68c94d107-7ff68c94d10c 1881->1882 1883 7ff68c94d102 1881->1883 1882->1877 1885 7ff68c94d10e-7ff68c94d113 1882->1885 1883->1882 1886 7ff68c94d119-7ff68c94d125 HeapFree 1885->1886 1887 7ff68c94d115 1885->1887 1886->1877 1887->1886
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: AddressWake$FreeHeapSingle
    • String ID: main
    • API String ID: 1649007778-3207122276
    • Opcode ID: 0eee47087b09b15adbed62e8ce99d87e6b254d707d7f10c0f315e2e8a79f985e
    • Instruction ID: 6f4b303b25df76c7e7d9fa2cf107939210193b774a1fb2899ce6c9f17cd24bce
    • Opcode Fuzzy Hash: 0eee47087b09b15adbed62e8ce99d87e6b254d707d7f10c0f315e2e8a79f985e
    • Instruction Fuzzy Hash: D1A18926A09AC2C0EE76DB11D4547BA2364FF84B94F4485BACA6D876D7CF3CE556C300

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1888 7ff68c921ba3-7ff68c921bad 1889 7ff68c921bb0-7ff68c921bb3 1888->1889 1890 7ff68c921bb9-7ff68c921bd8 1889->1890 1891 7ff68c922c62-7ff68c922ca9 call 7ff68c969af0 * 2 1889->1891 1890->1889 1893 7ff68c921bda-7ff68c921be6 1890->1893 1904 7ff68c922cae-7ff68c922cd9 1891->1904 1895 7ff68c921bec-7ff68c921c00 1893->1895 1896 7ff68c922a01-7ff68c922a50 SafeArrayDestroy GetErrorInfo 1893->1896 1895->1896 1897 7ff68c921c06-7ff68c921c09 1895->1897 1902 7ff68c922a58-7ff68c922a79 1896->1902 1903 7ff68c922a52 1896->1903 1900 7ff68c9229f7-7ff68c9229fc 1897->1900 1901 7ff68c921c0f-7ff68c921c28 HeapReAlloc 1897->1901 1900->1896 1901->1896 1905 7ff68c921c2e 1901->1905 1902->1891 1903->1902 1907 7ff68c922ce5-7ff68c922cfe 1904->1907 1905->1891 1910 7ff68c922d08-7ff68c922d0b 1907->1910 1911 7ff68c922d00-7ff68c922d03 SysFreeString 1907->1911 1912 7ff68c922d0d-7ff68c922d10 SysFreeString 1910->1912 1913 7ff68c922d15-7ff68c922d27 call 7ff68c921450 1910->1913 1911->1910 1912->1913 1915 7ff68c922d2c-7ff68c922da8 call 7ff68c960a50 1913->1915 1920 7ff68c922de2-7ff68c922deb call 7ff68c921450 1915->1920 1922 7ff68c922df0-7ff68c922df9 1920->1922 1923 7ff68c922dff-7ff68c922e04 1922->1923 1924 7ff68c922e82-7ff68c922e95 1922->1924 1925 7ff68c922e06-7ff68c922e2b call 7ff68c926ae0 1923->1925 1926 7ff68c922db0-7ff68c922dde 1923->1926 1930 7ff68c922e97-7ff68c922eab 1924->1930 1931 7ff68c922f00-7ff68c922f0f 1924->1931 1925->1926 1926->1920 1933 7ff68c922ead 1930->1933 1934 7ff68c922ec1-7ff68c922ec4 1930->1934 1932 7ff68c922f22-7ff68c922f35 1931->1932 1935 7ff68c922eb0-7ff68c922ebf call 7ff68c9246a0 1933->1935 1934->1932 1936 7ff68c922ec6-7ff68c922ed7 HeapFree 1934->1936 1935->1934 1936->1932
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeString$AllocHeap
    • String ID: 0
    • API String ID: 1043762764-4108050209
    • Opcode ID: 5a6a86b9f585299c8f94c9f7da16dc03b2a7cdd5659d10d2a8e0097ee878783e
    • Instruction ID: 3475293242b491fa271fcc07e0f4f325805c179a6004f5328f14a43b4a5a04a1
    • Opcode Fuzzy Hash: 5a6a86b9f585299c8f94c9f7da16dc03b2a7cdd5659d10d2a8e0097ee878783e
    • Instruction Fuzzy Hash: 5D919022A09BC1C1EA618B15A5103BAA7A0FF99794F448179DFED87B97DF3DE184C700

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1939 7ff68c921d76-7ff68c921dfd 1940 7ff68c921e00-7ff68c921e08 1939->1940 1941 7ff68c922b4d-7ff68c922b85 1940->1941 1942 7ff68c921e0e-7ff68c921e19 1940->1942 1943 7ff68c9229bb-7ff68c9229c4 1941->1943 1944 7ff68c922b8b-7ff68c922b94 1941->1944 1945 7ff68c921e1f-7ff68c921e2b 1942->1945 1946 7ff68c922c62-7ff68c922cfe call 7ff68c969af0 * 2 1942->1946 1949 7ff68c9229dd-7ff68c9229e2 1943->1949 1950 7ff68c922b96-7ff68c922ba4 HeapFree 1944->1950 1951 7ff68c922ba9-7ff68c922bd8 1944->1951 1947 7ff68c921e2d-7ff68c921e41 call 7ff68c960a50 1945->1947 1948 7ff68c921e50 1945->1948 1984 7ff68c922d08-7ff68c922d0b 1946->1984 1985 7ff68c922d00-7ff68c922d03 SysFreeString 1946->1985 1954 7ff68c921e55-7ff68c921e72 memcpy 1947->1954 1963 7ff68c921e43 1947->1963 1948->1954 1955 7ff68c9229d0-7ff68c9229d7 1949->1955 1956 7ff68c9229e4-7ff68c9229f5 HeapFree 1949->1956 1950->1951 1959 7ff68c921e78-7ff68c921e7f 1954->1959 1960 7ff68c921ff0-7ff68c92200f 1954->1960 1955->1944 1955->1949 1956->1955 1959->1946 1964 7ff68c921e85-7ff68c921ea6 GetProcessHeap HeapAlloc 1959->1964 1965 7ff68c922016-7ff68c922040 1960->1965 1963->1946 1964->1946 1968 7ff68c921eac-7ff68c921ed7 1964->1968 1973 7ff68c922090-7ff68c9220b2 GetErrorInfo 1965->1973 1974 7ff68c922042-7ff68c922052 1965->1974 1970 7ff68c921f04-7ff68c921f07 1968->1970 1975 7ff68c921ee6 1970->1975 1976 7ff68c921f09-7ff68c921f0c 1970->1976 1977 7ff68c92257a-7ff68c92258a VariantClear 1973->1977 1979 7ff68c9220d0-7ff68c9220f2 call 7ff68c96a320 1974->1979 1980 7ff68c922054-7ff68c92205b 1974->1980 1981 7ff68c921ee9-7ff68c921f01 1975->1981 1982 7ff68c921fc0-7ff68c921fec 1976->1982 1983 7ff68c921f12-7ff68c921f19 1976->1983 1986 7ff68c922919-7ff68c92292b 1977->1986 1987 7ff68c922590-7ff68c922594 1977->1987 2001 7ff68c92215a-7ff68c92256f call 7ff68c96b260 1979->2001 2002 7ff68c9220f4-7ff68c922114 1979->2002 1988 7ff68c92230c-7ff68c92237a 1980->1988 1989 7ff68c922061-7ff68c922076 1980->1989 1981->1970 1982->1965 1991 7ff68c921f1b-7ff68c921f2e 1983->1991 1992 7ff68c921ee0-7ff68c921ee3 1983->1992 1994 7ff68c922d0d-7ff68c922d10 SysFreeString 1984->1994 1995 7ff68c922d15-7ff68c922da8 call 7ff68c921450 call 7ff68c960a50 1984->1995 1985->1984 1996 7ff68c922930-7ff68c92298a 1986->1996 1987->1986 1997 7ff68c92259a-7ff68c9225b6 1987->1997 2007 7ff68c92211c-7ff68c922155 1988->2007 1989->1979 1999 7ff68c921f71-7ff68c921f7b 1991->1999 2000 7ff68c921f30-7ff68c921f44 1991->2000 1992->1975 1994->1995 2038 7ff68c922de2-7ff68c922df9 call 7ff68c921450 1995->2038 2005 7ff68c92298c-7ff68c92299d HeapFree 1996->2005 2006 7ff68c9229a2-7ff68c9229b5 call 7ff68c9246a0 1996->2006 2009 7ff68c9225b8-7ff68c9225be 1997->2009 2010 7ff68c9225d0-7ff68c9225d5 1997->2010 1999->1975 2003 7ff68c921f46-7ff68c921f69 2000->2003 2004 7ff68c921f80-7ff68c921f90 2000->2004 2012 7ff68c922575 2001->2012 2027 7ff68c92260c-7ff68c92261c VariantClear 2001->2027 2002->2007 2003->1975 2011 7ff68c921f6f 2003->2011 2004->1975 2014 7ff68c921f96-7ff68c921fba 2004->2014 2005->2006 2006->1943 2006->1944 2007->2012 2009->2010 2017 7ff68c9225c0 2009->2017 2010->1986 2018 7ff68c9225db-7ff68c922605 GetProcessHeap HeapFree 2010->2018 2011->2014 2012->1977 2014->1981 2017->1946 2019 7ff68c922607 2018->2019 2020 7ff68c92266a-7ff68c9226ca call 7ff68c928530 2018->2020 2019->1996 2032 7ff68c922b1a-7ff68c922b42 2020->2032 2033 7ff68c9226d0-7ff68c922734 call 7ff68c925710 2020->2033 2030 7ff68c92265a-7ff68c922662 2027->2030 2031 7ff68c92261e-7ff68c922622 2027->2031 2030->2020 2031->2030 2035 7ff68c922624-7ff68c922640 2031->2035 2032->2005 2036 7ff68c922b48 2032->2036 2046 7ff68c92273a-7ff68c92276e 2033->2046 2047 7ff68c9228ce-7ff68c9228de call 7ff68c928cc0 2033->2047 2040 7ff68c922646-7ff68c92264c 2035->2040 2041 7ff68c9228e8-7ff68c9228ea 2035->2041 2036->2006 2048 7ff68c922dff-7ff68c922e04 2038->2048 2049 7ff68c922e82-7ff68c922e95 2038->2049 2040->1946 2045 7ff68c922652-7ff68c922654 2040->2045 2041->2030 2043 7ff68c9228f0-7ff68c9228f5 2041->2043 2043->1996 2045->2030 2045->2043 2051 7ff68c922771-7ff68c92278a 2046->2051 2047->1986 2052 7ff68c922e06-7ff68c922e2b call 7ff68c926ae0 2048->2052 2053 7ff68c922db0-7ff68c922dde 2048->2053 2066 7ff68c922e97-7ff68c922eab 2049->2066 2067 7ff68c922f00-7ff68c922f0f 2049->2067 2054 7ff68c9227ea-7ff68c922800 2051->2054 2055 7ff68c92278c-7ff68c922796 2051->2055 2052->2053 2053->2038 2059 7ff68c9227e0-7ff68c9227e8 2054->2059 2060 7ff68c922802-7ff68c92281b memcmp 2054->2060 2056 7ff68c9227b8-7ff68c9227c4 2055->2056 2057 7ff68c922798-7ff68c9227b0 2055->2057 2062 7ff68c9227ca-7ff68c9227d5 2056->2062 2063 7ff68c9228a5-7ff68c9228b3 2056->2063 2057->2056 2059->2054 2059->2055 2060->2059 2065 7ff68c92281d-7ff68c92285e 2060->2065 2062->2051 2063->1939 2071 7ff68c9228b9-7ff68c9228c5 2063->2071 2069 7ff68c922876-7ff68c922890 2065->2069 2070 7ff68c922860-7ff68c922871 HeapFree 2065->2070 2072 7ff68c922ead 2066->2072 2073 7ff68c922ec1-7ff68c922ec4 2066->2073 2068 7ff68c922f22-7ff68c922f35 2067->2068 2069->1940 2076 7ff68c922896-7ff68c9228a0 call 7ff68c924fb0 2069->2076 2070->2069 2071->2041 2074 7ff68c922eb0-7ff68c922ebf call 7ff68c9246a0 2072->2074 2073->2068 2075 7ff68c922ec6-7ff68c922ed7 HeapFree 2073->2075 2074->2073 2075->2068 2076->1940
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Free$String$Heapmemcpy
    • String ID:
    • API String ID: 3504077463-0
    • Opcode ID: e8567a9c3bf3687e89b2600cf35a55f5b7f8d48fc6451cf66221d7e8e7d28ffe
    • Instruction ID: 800de287362ac7a5afb5eb3e062b25f563dadc4ca6b341b0c85cc507bc408f33
    • Opcode Fuzzy Hash: e8567a9c3bf3687e89b2600cf35a55f5b7f8d48fc6451cf66221d7e8e7d28ffe
    • Instruction Fuzzy Hash: 88B14736608BC2C1EA718B15E4503EAB7A0FB99B50F44816ADAEC93B5ADF7CD055CB40

    Control-flow Graph

    APIs
      • Part of subcall function 00007FF68C961800: TlsGetValue.KERNEL32(?,?,?,00000000,?,00000000), ref: 00007FF68C96181E
      • Part of subcall function 00007FF68C961800: ProcessPrng.BCRYPTPRIMITIVES(?,?,?,00000000,?,00000000), ref: 00007FF68C96183D
      • Part of subcall function 00007FF68C961800: TlsGetValue.KERNEL32(?,?,?,00000000,?,00000000), ref: 00007FF68C96186A
      • Part of subcall function 00007FF68C961800: TlsSetValue.KERNEL32(?,?,?,00000000,?,00000000), ref: 00007FF68C96187A
      • Part of subcall function 00007FF68C961800: HeapFree.KERNEL32(?,?,?,00000000,?,00000000), ref: 00007FF68C961890
    • memset.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF68C969361
    • GlobalMemoryStatusEx.KERNEL32 ref: 00007FF68C969423
    • GetLastError.KERNEL32 ref: 00007FF68C96942C
    • K32GetPerformanceInfo.KERNEL32 ref: 00007FF68C969472
    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF68C96950A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Value$ErrorFreeGlobalHeapInfoLastMemoryPerformancePrngProcessStatusmemcpymemset
    • String ID: @
    • API String ID: 3165673868-2766056989
    • Opcode ID: b76efeba4d025d127e61280de1f7f9ee75442c8425cd8478e6d8daa1e541982f
    • Instruction ID: 4d791216faafcd7d495170a91e6f663414b612a9512fb7cfa56d7c8264542ee5
    • Opcode Fuzzy Hash: b76efeba4d025d127e61280de1f7f9ee75442c8425cd8478e6d8daa1e541982f
    • Instruction Fuzzy Hash: 59515022908BC481E6724B15B5067EBA3A4FFE5398F005225EFC846796DF7DD195CB40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap$AddressErrorLastSingleWake
    • String ID:
    • API String ID: 3127715783-0
    • Opcode ID: 734e49fb8617a3af6298d840acb8ab1c02d29611af1ba24242b38459b2f4e35c
    • Instruction ID: f56d967cb62fe8ed305438970eaec7deef3ec274734852fc934200e28ccf6cd4
    • Opcode Fuzzy Hash: 734e49fb8617a3af6298d840acb8ab1c02d29611af1ba24242b38459b2f4e35c
    • Instruction Fuzzy Hash: 4751DD22B09A81C0EF158B1A954577863A1BF89BD4F4845B9DE2C873D6DF3EE4A2C340
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Value$FreeHeapPrngProcess
    • String ID:
    • API String ID: 388412035-0
    • Opcode ID: 34dcdeee4dee11479e325f0e0622038de2bfec91b8c405699dbc1b2f8ce104e3
    • Instruction ID: 583365a601ee8aa1774a8a3ab6cf41568a9cffeb4426fc22fb44ab66f7b5ed0f
    • Opcode Fuzzy Hash: 34dcdeee4dee11479e325f0e0622038de2bfec91b8c405699dbc1b2f8ce104e3
    • Instruction Fuzzy Hash: 0611D512E1CAD2C2FD516B295401AF95394BF84B84F0945F9EB1DC63D7EE2CA941C2C0
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: ClearFreeStringVariant
    • String ID: 0
    • API String ID: 1438600931-4108050209
    • Opcode ID: 16726975d860eaa7f1254062617b8c724505dedeb5f48dd1b4d932c88057d4fa
    • Instruction ID: 609f48011feb7ee13d38d468b7227091e06966b845516ee60de1949c512b0565
    • Opcode Fuzzy Hash: 16726975d860eaa7f1254062617b8c724505dedeb5f48dd1b4d932c88057d4fa
    • Instruction Fuzzy Hash: F591712290CBC1C1EB618B15A4543FAA7A0FF99794F049169EFDD47A5ADF3CD184DB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeString$ClearVariant
    • String ID: 0
    • API String ID: 3349467263-4108050209
    • Opcode ID: 6147ada7f8d6e25529f485fa3d6e16ace8d939be2c7e5330dccd9f391041c411
    • Instruction ID: 4a50e2c19553aa635ab569557261c8165449a20eb0b8c57c6f5082dae5c3faf9
    • Opcode Fuzzy Hash: 6147ada7f8d6e25529f485fa3d6e16ace8d939be2c7e5330dccd9f391041c411
    • Instruction Fuzzy Hash: 1E81902290CBC1C1EB718B15A4503FAA7A0FF99794F049269EFDC46A9ADF3CD184DB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Free$Heap$ClearStringVariant$Process
    • String ID: 0
    • API String ID: 755876286-4108050209
    • Opcode ID: c6b8a1ce5dd03108380de8e64f0e0fac7cd0ebd15bc6e32e298071760cb54781
    • Instruction ID: cb9b4a7baefddd78d3e29f18498908a58f84a940c4b8c4e43002fdd131bfcb74
    • Opcode Fuzzy Hash: c6b8a1ce5dd03108380de8e64f0e0fac7cd0ebd15bc6e32e298071760cb54781
    • Instruction Fuzzy Hash: BB71922290CBC1C1EA618B15A4543FAA760FF99794F049169EFDD47AAADF3CE184DB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Free$Heap$ClearStringVariant$Process
    • String ID: 0
    • API String ID: 755876286-4108050209
    • Opcode ID: 564480c60182985c9452a61c710d257081c7f7dbaf9c75ac7740f02244e63b6c
    • Instruction ID: 4483e7251ade4a97f13b1f57d809a79a7e7c7fdec70d7d6e47a0e74e8b644e02
    • Opcode Fuzzy Hash: 564480c60182985c9452a61c710d257081c7f7dbaf9c75ac7740f02244e63b6c
    • Instruction Fuzzy Hash: 4371932290CBC1C1EA718B15A4543FAA760FF99794F049169EFDD46A9ADF3CE184DB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Free$Heap$ClearStringVariant$Process
    • String ID: 0
    • API String ID: 755876286-4108050209
    • Opcode ID: 1b796a38eaf38446c701e0270b4a8d1ee555bef9b63cb918b38a30d2e8887200
    • Instruction ID: b8fda85bbec125d371b6e5e65e2bd7063079dbbcee0b4a933aa46e2452c84afd
    • Opcode Fuzzy Hash: 1b796a38eaf38446c701e0270b4a8d1ee555bef9b63cb918b38a30d2e8887200
    • Instruction Fuzzy Hash: 3F71922290CBC1C1EA618B15A4543FAA760FF99794F049169EFDD47A9ADF3CE184DB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Free$Heap$ClearStringVariant$Process
    • String ID: 0
    • API String ID: 755876286-4108050209
    • Opcode ID: beb5654029c2a211afd2580c65c805563ed4fd74d385d7579cb12a079e88c266
    • Instruction ID: e917093f9a25c449bd928ec07eb8cce310f8345f909168ed030e528cb9ddff4f
    • Opcode Fuzzy Hash: beb5654029c2a211afd2580c65c805563ed4fd74d385d7579cb12a079e88c266
    • Instruction Fuzzy Hash: 8A71A22290CBC1C1EA718B15A4543FAA760FF99794F048269EFDD46A9ADF3CE184DB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Free$Heap$ClearStringVariant$Process
    • String ID: 0
    • API String ID: 755876286-4108050209
    • Opcode ID: 8988ad5062aa89244ae3a1d29d4ed7a256133406256190dd49d75299c8a518df
    • Instruction ID: 375bd5fc41f52cdc5b718b7af3ead22fa09b1dddecbe856e631383c2fd165ff5
    • Opcode Fuzzy Hash: 8988ad5062aa89244ae3a1d29d4ed7a256133406256190dd49d75299c8a518df
    • Instruction Fuzzy Hash: 5B71932290CBC1C1EA618B15A4543FAA760FF99794F049169EFDD47A9ADF3CD184DB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Free$Heap$ClearStringVariant$Process
    • String ID: 0
    • API String ID: 755876286-4108050209
    • Opcode ID: 4fd00093b7225960ba2e72bc119ee02ddbe58509c2fe2c93718b981c0bc26b2b
    • Instruction ID: 43552a7694db96b07ae986071cf5c3527814637157b138fa06579f127d4764a7
    • Opcode Fuzzy Hash: 4fd00093b7225960ba2e72bc119ee02ddbe58509c2fe2c93718b981c0bc26b2b
    • Instruction Fuzzy Hash: EF71922290CBC1C1EA618B15A4543FAB760FF99794F049169EFDD47A9ADF3CE184DB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Free$Heap$ClearStringVariant$Process
    • String ID: 0
    • API String ID: 755876286-4108050209
    • Opcode ID: 620cc0f113c21af176d93d5debed8c17721061c8d98184afe3875defacb8c97d
    • Instruction ID: 1761af02239f21cbcee070bb6706bf67e25b826a79dd14bb6da09c4147e91f1a
    • Opcode Fuzzy Hash: 620cc0f113c21af176d93d5debed8c17721061c8d98184afe3875defacb8c97d
    • Instruction Fuzzy Hash: 8E71922290CBC1C1EA618B15A4543FAA760FF99794F049269EFDD46A9ADF3CD184DB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Free$Heap$ClearStringVariant$Process
    • String ID: 0
    • API String ID: 755876286-4108050209
    • Opcode ID: fb0d792b1007b19c6b9899c9fcc4661a454a4c9b08b0c3954f4b19b1b32c6ba6
    • Instruction ID: 1abe416bec05e5fea42bf88a7853c37b724662c498a7d3033595506df45c57bb
    • Opcode Fuzzy Hash: fb0d792b1007b19c6b9899c9fcc4661a454a4c9b08b0c3954f4b19b1b32c6ba6
    • Instruction Fuzzy Hash: 6F71922290CBC1C1EA618B15A4543FAA7A0FF99794F049169EFDD46A9ADF3CD184DB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Free$Heap$ClearStringVariant$Process
    • String ID: 0
    • API String ID: 755876286-4108050209
    • Opcode ID: 1f80f77591d0f520a73befd0e5872e2b69754110f9ce0dd4e19df9bdeb61043a
    • Instruction ID: fa8eabeb9d3c62159cde9a5dff24e91d6b940afc3d1a2167d0d3754322913508
    • Opcode Fuzzy Hash: 1f80f77591d0f520a73befd0e5872e2b69754110f9ce0dd4e19df9bdeb61043a
    • Instruction Fuzzy Hash: 7871922290CBC1C1EA618B15A4543FAA760FF99794F049169EFDD47A9ADF3CD184DB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Free$Heap$ClearStringVariant$Process
    • String ID: 0
    • API String ID: 755876286-4108050209
    • Opcode ID: 0a135da4df8ee1c6b8c5c71998eefddacecb05601b72a300ec0639f51453dfe6
    • Instruction ID: 34f415c1ceb881634f909959037e55fa1ac0393a62208f7234b581e08ebd4a05
    • Opcode Fuzzy Hash: 0a135da4df8ee1c6b8c5c71998eefddacecb05601b72a300ec0639f51453dfe6
    • Instruction Fuzzy Hash: 3E71922290CBC1C1EA618B15A4543FAB7A0FF99794F049169EFDD47A9ADF3CE184DB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Free$Heap$ClearStringVariant$Process
    • String ID: 0
    • API String ID: 755876286-4108050209
    • Opcode ID: f8697c42da3c062860e12baf046b33b2f09704da1171ef1ca60e6057338b5d06
    • Instruction ID: e86eb1536ee6d45b90bec1e23112b169bbe2d2874806c1a62e773505035647ad
    • Opcode Fuzzy Hash: f8697c42da3c062860e12baf046b33b2f09704da1171ef1ca60e6057338b5d06
    • Instruction Fuzzy Hash: CE71942290CBC1C1EB618B15A4543FAA760FF99794F048169EFDD47A9ADF3CD184DB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Free$Heap$ClearStringVariant$Process
    • String ID: 0
    • API String ID: 755876286-4108050209
    • Opcode ID: 9e353414226e72e5f34c286b5d359e5d68590ca7faa4d5afc437f796dfbfa195
    • Instruction ID: 6bc92fda3e154a0e8f2b268a9053f7fca563f77f6c892c076c85242da0fce786
    • Opcode Fuzzy Hash: 9e353414226e72e5f34c286b5d359e5d68590ca7faa4d5afc437f796dfbfa195
    • Instruction Fuzzy Hash: 6A71932290CBC1C1EA618B15A4543FAA760FF99794F049169EFDD47A9ADF3CD184DB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Free$Heap$String$ClearProcessVariant
    • String ID: 0
    • API String ID: 1035934229-4108050209
    • Opcode ID: 9903c134b1e95f4037bfcbe0ef5b3c97beb4909e0bc72f8fc7ff2f9048e1564b
    • Instruction ID: d2842ac2ebb3572961623db9060f03744ed64b4f40b001068e30e4e17371b33a
    • Opcode Fuzzy Hash: 9903c134b1e95f4037bfcbe0ef5b3c97beb4909e0bc72f8fc7ff2f9048e1564b
    • Instruction Fuzzy Hash: CD51C322A0CBC1C1EE608B11A5107BA6760FF99798F058178EEED87A97DF3DE584D700
    APIs
    Strings
    • ReadProcessMemory returned unexpected number of bytes readUnable to read process dataIntel x86MIPSRISC AlphaPPCSHXARMIntel Itanium-based x64RISC Alpha x64MSIL(Intel or AMD) x64Intel Itanium-based x86unknownARM x64CPU , xrefs: 00007FF68C96788D
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: ErrorFreeHeapLastMemoryProcessRead
    • String ID: ReadProcessMemory returned unexpected number of bytes readUnable to read process dataIntel x86MIPSRISC AlphaPPCSHXARMIntel Itanium-based x64RISC Alpha x64MSIL(Intel or AMD) x64Intel Itanium-based x86unknownARM x64CPU
    • API String ID: 2093145822-811746041
    • Opcode ID: 1c78e0e252bebcd70450fce440d472f6a1e3912144bb1b639d284620a718b5bd
    • Instruction ID: 1f1b8ea3f8d5774bf4c22ef4696ea5fb10a9db67f5f626847c80925c7e84cd20
    • Opcode Fuzzy Hash: 1c78e0e252bebcd70450fce440d472f6a1e3912144bb1b639d284620a718b5bd
    • Instruction Fuzzy Hash: 1021C562A09A86C2EA208B12BD40F7A6294FF54794F4441B8EFAD877D2EF3CE441C340
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeString
    • String ID: 0
    • API String ID: 3341692771-4108050209
    • Opcode ID: 9cf80296f7dcd9bb6860b465af560b1e347520fcc812bf89a4befe40bf19f7a9
    • Instruction ID: ad485d363abe6012a31ead5b2073f4b6e2bc8c87821323a030d76d2bbf327eb4
    • Opcode Fuzzy Hash: 9cf80296f7dcd9bb6860b465af560b1e347520fcc812bf89a4befe40bf19f7a9
    • Instruction Fuzzy Hash: 63418121A0CBC181EA619B11A5107BAA760FF997C8F059168EEDD47A9BDF3DE184C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: ErrorInfoLastPerformance
    • String ID: @
    • API String ID: 3053874364-2766056989
    • Opcode ID: 077ea24f6a704ab3d0dc759e6e37f1d8599cac4a79e9985e6193cf203958e506
    • Instruction ID: 931d4c2bc1407c9ee1099fb2bfba79911d21695a27cd818258902a09f974f090
    • Opcode Fuzzy Hash: 077ea24f6a704ab3d0dc759e6e37f1d8599cac4a79e9985e6193cf203958e506
    • Instruction Fuzzy Hash: A0216411A08EC492EA324B29A4067E6A3B5BFE43A8F005315FBDC86795DF7ED156CB40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: AddressErrorLastWait
    • String ID:
    • API String ID: 1574541344-0
    • Opcode ID: 586061fe2e34f20f9e263b912a46c327c4bdf149aa0d38205655db5478124066
    • Instruction ID: f0309ae49e8634ea340acfb0b84df311ddc57a48b1b785376caff1af0df6156e
    • Opcode Fuzzy Hash: 586061fe2e34f20f9e263b912a46c327c4bdf149aa0d38205655db5478124066
    • Instruction Fuzzy Hash: 21213032B0C4C2C6FE358A15A45127D66A0BF80789F0481F8DB8ECBAC6DE3CE942C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: CloseHandleObjectSingleSleepWait
    • String ID:
    • API String ID: 640476663-0
    • Opcode ID: 87bdda77e8f7f0b28803330721d76a66ae64b95234273b2e9e0ddbcfa9fb1289
    • Instruction ID: ab65fad520f0fa9e5ad6d739385ccae7d9509efd47bbd930115e3f818a54347d
    • Opcode Fuzzy Hash: 87bdda77e8f7f0b28803330721d76a66ae64b95234273b2e9e0ddbcfa9fb1289
    • Instruction Fuzzy Hash: 1A01B552B0CAC281FE64A236B621B7951496F857F0F144279EEAE86BD7DE2C9441C241
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: ErrorInfo
    • String ID:
    • API String ID: 3619768924-0
    • Opcode ID: 5974e859057a934ac2e84da0e3abebde45f6dcb029ad41c2b9ae45ae016a50a4
    • Instruction ID: 4561517c84c1e7706dadb46db4f6b83f491a0b5acd83fd669177d537032a909a
    • Opcode Fuzzy Hash: 5974e859057a934ac2e84da0e3abebde45f6dcb029ad41c2b9ae45ae016a50a4
    • Instruction Fuzzy Hash: 14116732608AC1C2EF149F28E45476FA6A1BF80768F518179EB8A87AC6CFBDC105C700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap$InfoSystem
    • String ID:
    • API String ID: 738346042-0
    • Opcode ID: faa133be13beb5e4f603384a94e569edd5f59e1a28feb3bf11e84fc1aab4983a
    • Instruction ID: 77b0cd726a25b3fe8b986ec83115325e43e526abc0879a75e62df850121fe712
    • Opcode Fuzzy Hash: faa133be13beb5e4f603384a94e569edd5f59e1a28feb3bf11e84fc1aab4983a
    • Instruction Fuzzy Hash: 68318E37A18A81C0EA60CB01E44477967A5FF85B94F4481BAEA5D87796DF3CE086C700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID:
    • API String ID: 3298025750-0
    • Opcode ID: 4e979a9ec8997614d8d457e9aaf91d8b06a7f9304aa9e54bad75fc4831ca2564
    • Instruction ID: c11f468b4776fe621a4ebd6ea1368fd61ea6110b70d0447c351ab31f99c959c5
    • Opcode Fuzzy Hash: 4e979a9ec8997614d8d457e9aaf91d8b06a7f9304aa9e54bad75fc4831ca2564
    • Instruction Fuzzy Hash: DD31C227A08AC2C1EE20CB41E44477D63A5FF99B94F4441B9EA5D83BA5DF3CE582C700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: AddressWake
    • String ID:
    • API String ID: 98804233-0
    • Opcode ID: d899170c63f555119f42af66820b7c3946f4b4e83656a1d48d9bc3c5a5a8fc52
    • Instruction ID: c66c0e7034d1c9143a90ae4c95a2e7cfbfaf44d43024b0fe13e8663f423b5633
    • Opcode Fuzzy Hash: d899170c63f555119f42af66820b7c3946f4b4e83656a1d48d9bc3c5a5a8fc52
    • Instruction Fuzzy Hash: 34F08973709542CBEF26CB24A45126D67D0EBC479DF048174DB8A8BA95DF3CD582CB40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: AddressWake
    • String ID:
    • API String ID: 98804233-0
    • Opcode ID: 1fb3fc45eed4718661be2a7fcf0e2a82144b87f037791bc8693358aea4843251
    • Instruction ID: ef6331e6af52861bc5b007d554dd1cae6d17d4d01bdd7e0f5a725e6bfd8aa99a
    • Opcode Fuzzy Hash: 1fb3fc45eed4718661be2a7fcf0e2a82144b87f037791bc8693358aea4843251
    • Instruction Fuzzy Hash: 93E0DF3760C241CBEE369A24B05012C6B50FF887E9F0801B5DB8946EE6DE3CD282CF00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: CollectDataQuery
    • String ID:
    • API String ID: 777096026-0
    • Opcode ID: 3888c7d31c858ab674ec561122fe36d2925056e640258f185d6836656624c505
    • Instruction ID: ea716d50f239859e228fef7db4da8ae307100cdac467e48a1527b10114c04ae5
    • Opcode Fuzzy Hash: 3888c7d31c858ab674ec561122fe36d2925056e640258f185d6836656624c505
    • Instruction Fuzzy Hash: 1AE09A00A05DC5E4EA64AB76ED0AFEA2228BF94748F004175FE0D873A3EE39940AC340
    APIs
    • wcslen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF68C96797F
      • Part of subcall function 00007FF68C9519C0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,FFFFFFFF,00007FF68C953011), ref: 00007FF68C951B84
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: memcpywcslen
    • String ID:
    • API String ID: 982415701-0
    • Opcode ID: 1ae50bb9ed8a438ffa5a99cdb1b9607cd7617f54f30c76c214c759625ad131c2
    • Instruction ID: 3cc240da99f90efd6a51c945248e04447e0ccc7830b1ddccbaae9c85ac86b581
    • Opcode Fuzzy Hash: 1ae50bb9ed8a438ffa5a99cdb1b9607cd7617f54f30c76c214c759625ad131c2
    • Instruction Fuzzy Hash: C521C023918B81C1EA219B15B40076AA7A0FB897E8F444229EFDE16BD6DF3CE185C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: EnvironmentStrings
    • String ID: .exeprogram not found$=$exe\\.\NUL\cmd.exemaximum number of ProcThreadAttributes exceeded$p$U6$k(
    • API String ID: 2794021878-843690317
    • Opcode ID: 3d2e6a210b14a1226cea82b08d139b7c0f5f2cefccd7e22ba788b320230c443c
    • Instruction ID: 515e75b3e320e8b20d9bf493ba63918d1ede9dfb3f246b2bdb95f9011ae0ac0e
    • Opcode Fuzzy Hash: 3d2e6a210b14a1226cea82b08d139b7c0f5f2cefccd7e22ba788b320230c443c
    • Instruction Fuzzy Hash: B6E28F22A0DAC1C1EE718B15E4443FAA7A4FF94B95F04417ADA9D97B9ADF3CE181C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID: !$&$?$I$I
    • API String ID: 3298025750-3010272391
    • Opcode ID: efe3db7b1da18e428d0f8f852c299f49e73bc39fef0bd76448cf821915963c77
    • Instruction ID: 9eb4404c89831596e2243de106af50116e6e4d1c82dca735745a609c2d53d50a
    • Opcode Fuzzy Hash: efe3db7b1da18e428d0f8f852c299f49e73bc39fef0bd76448cf821915963c77
    • Instruction Fuzzy Hash: A4436032608BC1C5EB218B15E4943AABBA4FB89780F54917ADBCD47BA6DF3DD051CB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap$memcpy
    • String ID: p
    • API String ID: 1887603139-2181537457
    • Opcode ID: 581fd53c185e0ee6a638237b706a833573dbeee2d9c0a818cfa8639bd9e5c6b0
    • Instruction ID: d8db884f0e7df67e9a1baa7f761f359cf80d99209dd3bb57ddb26b56b02fdd99
    • Opcode Fuzzy Hash: 581fd53c185e0ee6a638237b706a833573dbeee2d9c0a818cfa8639bd9e5c6b0
    • Instruction Fuzzy Hash: ED729D22A0CAC2C0EA719B11E4447FAA7A0FF94785F448179DE8D87B9ADF3CD496C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap$ErrorLast$DirectoryWindows
    • String ID: PATH$p$-8
    • API String ID: 4021950356-2727323446
    • Opcode ID: a2b623c318b87364fe19e5c5aa4211406781934ea1a11a5e36647202f4574ee9
    • Instruction ID: 0eef00be3a43271024544285cc621b92e241893f609db092154f0d3fc908d280
    • Opcode Fuzzy Hash: a2b623c318b87364fe19e5c5aa4211406781934ea1a11a5e36647202f4574ee9
    • Instruction Fuzzy Hash: 0D02BC22A0CAC6C0FA709B15E4043FAA3A1FF85785F458179DA9D97A96DF3DE482C740
    APIs
    • memset.API-MS-WIN-CRT-STRING-L1-1-0(00000002,?,00000000,00000000,?,?,00000000), ref: 00007FF68C933D17
    • memset.API-MS-WIN-CRT-STRING-L1-1-0(00000002,?,00000000,00000000,?,?,00000000), ref: 00007FF68C933D50
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: memset
    • String ID: @$x
    • API String ID: 2221118986-552422522
    • Opcode ID: ba2d3648dfcd267d3b6a73823509147b295b9fa092e621591b3edf763e9e4dff
    • Instruction ID: 3b182418d6e3aa81ef1eeaa251a30faeb06fbfccb91134ef0218d3ad69be053c
    • Opcode Fuzzy Hash: ba2d3648dfcd267d3b6a73823509147b295b9fa092e621591b3edf763e9e4dff
    • Instruction Fuzzy Hash: 8E827D72A1DAC1C6EB318B25F4443EAA7A0FB89784F445129DB8D97B9ADF3CD145CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap$CompareOrdinalString
    • String ID:
    • API String ID: 3984308579-0
    • Opcode ID: 878b17003ff03361027c9621e25a04b426e0e4c63dc0a96aa39596ea124ebec7
    • Instruction ID: dd870cd5aa6833a51efe9e9423490cfada164efa6227bee942ee5db566bce40b
    • Opcode Fuzzy Hash: 878b17003ff03361027c9621e25a04b426e0e4c63dc0a96aa39596ea124ebec7
    • Instruction Fuzzy Hash: D8B2A422908BC4C1E6628F18E1057EAB3B8FF98794F459325DF9C53666EF35E295C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: ErrorLast$DirectoryFreeHeapSystem
    • String ID: p
    • API String ID: 696374338-2181537457
    • Opcode ID: d3b54accb912a9656846ffa433bab8aed066cc164c7d152435b7a7b4ecf80d48
    • Instruction ID: 298e49f701474da594257f846e1cb7ba5f49368f05a180bd57745c39bde8b44b
    • Opcode Fuzzy Hash: d3b54accb912a9656846ffa433bab8aed066cc164c7d152435b7a7b4ecf80d48
    • Instruction Fuzzy Hash: 99C17C22A0CAC5C0FA719B15E4457FAA3A4FF85794F048179DE9C97A9ADF3CE482C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap$CloseHandle$ErrorLast$AddressSingleWake$CreateDirectoryProcessSystem
    • String ID: p$!:
    • API String ID: 1207286729-2243553189
    • Opcode ID: 9a8bf098ffbfb7cc0e5088184c98e94c3d06fcbdf008a486b7503fbd6c7a63dd
    • Instruction ID: 6eb743ff7bd78b1203502164ef7cd1e59ddd17df6cc2e9a01c9f35d27a4cd7f7
    • Opcode Fuzzy Hash: 9a8bf098ffbfb7cc0e5088184c98e94c3d06fcbdf008a486b7503fbd6c7a63dd
    • Instruction Fuzzy Hash: 70B17E22A0CAC1C0FA719B15E4457FAA3A4FF95794F044279DE9C97A9ADF3CE082C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: ErrorLast$FreeHeap$DirectorySystem
    • String ID: p
    • API String ID: 2600690918-2181537457
    • Opcode ID: 66d4b79f129ce5bf88d425e95e1bdbc997e144f524eeec6128481a65899293b5
    • Instruction ID: bc4811a592165848df37a5dc649e2325e123dadfd7e0d35f7f74296fbe449d57
    • Opcode Fuzzy Hash: 66d4b79f129ce5bf88d425e95e1bdbc997e144f524eeec6128481a65899293b5
    • Instruction Fuzzy Hash: ABA17B22A0CAC1C0FA719B15E4457FAA3A4FF85784F048279DE9C97A96DF3DE082C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: ErrorLast$FullNamePath
    • String ID:
    • API String ID: 2482867836-0
    • Opcode ID: a403293eff0aefe955b598b9eee8073c48b3f10cbd13c54b5d3b83566b1836fe
    • Instruction ID: 931b3a42ad32c0c865a6dbc7f89353edee53a70b05c5340d451602b201bf789a
    • Opcode Fuzzy Hash: a403293eff0aefe955b598b9eee8073c48b3f10cbd13c54b5d3b83566b1836fe
    • Instruction Fuzzy Hash: ABF1CE62A08BC6C1EE109B11E40477AA7A4FF84BA5F148679EE9D877DADF7CD481C340
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap$Close$CreateHandleObjectSingleSleepWaitmemcpy
    • String ID: !$?$I$I
    • API String ID: 3810575368-3843625877
    • Opcode ID: 577e81cdafbd691842ac1d2b764ec65ef7dd0bb54d53b137c32eb0854f402054
    • Instruction ID: 8d1e9cd9dc0752b5038cfed312dbd45b5ee9b94867445e9ed3ec5608d37cb748
    • Opcode Fuzzy Hash: 577e81cdafbd691842ac1d2b764ec65ef7dd0bb54d53b137c32eb0854f402054
    • Instruction Fuzzy Hash: 02E28F32609B80C5EB508B15E4943AABBB4FB89B90F54817AEBCD47BA6DF3DD051C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID:
    • API String ID: 3298025750-0
    • Opcode ID: e0ece5aa866dfe8e0159698542e698c759baff41315bac022c1c51d002b0c75f
    • Instruction ID: 3777fb732a3387118737fc87e3c16dbf0837efde3789adfcd14870e303d53d54
    • Opcode Fuzzy Hash: e0ece5aa866dfe8e0159698542e698c759baff41315bac022c1c51d002b0c75f
    • Instruction Fuzzy Hash: 80F1BF22A19AC1C1EE519B1690647F91694FF4EFA0F5842BACE7D973D2DE3CE441C344
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap$ErrorLast$EnvironmentVariable
    • String ID:
    • API String ID: 4066227703-0
    • Opcode ID: 3ec53acc82e4c17f845f0ae04ba4a9cc60344305a98663a19ef7d63b00a741cf
    • Instruction ID: e48905e5541eb7b84e692f79e350df130a53fbb27744215293c113576b931d26
    • Opcode Fuzzy Hash: 3ec53acc82e4c17f845f0ae04ba4a9cc60344305a98663a19ef7d63b00a741cf
    • Instruction Fuzzy Hash: 1DC1AF22A0CAC2C1EE209B56E44437AA3A0FF55795F1881B9EE9D977D6DF7CE081C340
    APIs
    • TlsAlloc.KERNEL32 ref: 00007FF68C95149E
    • InitOnceComplete.KERNEL32 ref: 00007FF68C9514DE
    • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,-00000008,?,00000010,00007FF68C95098D,-00000008,?,00000000,00007FF68C950192), ref: 00007FF68C951570
    • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,-00000008,?,00000010,00007FF68C95098D,-00000008,?,00000000,00007FF68C950192), ref: 00007FF68C951581
    • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,-00000008,?,00000010,00007FF68C95098D,-00000008,?,00000000,00007FF68C950192), ref: 00007FF68C9515D0
    • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,-00000008,?,00000010,00007FF68C95098D,-00000008,?,00000000,00007FF68C950192), ref: 00007FF68C9515E1
    • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,-00000008,?,00000010,00007FF68C95098D,-00000008,?,00000000,00007FF68C950192), ref: 00007FF68C951630
    • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,-00000008,?,00000010,00007FF68C95098D,-00000008,?,00000000,00007FF68C950192), ref: 00007FF68C951641
    • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,-00000008,?,00000010,00007FF68C95098D,-00000008,?,00000000,00007FF68C950192), ref: 00007FF68C951690
    • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,-00000008,?,00000010,00007FF68C95098D,-00000008,?,00000000,00007FF68C950192), ref: 00007FF68C9516A1
    • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,-00000008,?,00000010,00007FF68C95098D,-00000008,?,00000000,00007FF68C950192), ref: 00007FF68C9516DC
    • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,-00000008,?,00000010,00007FF68C95098D,-00000008,?,00000000,00007FF68C950192), ref: 00007FF68C9516ED
    • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,-00000008,?,00000010,00007FF68C95098D), ref: 00007FF68C95174A
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Value$AllocCompleteFreeHeapInitOnce
    • String ID:
    • API String ID: 807793084-0
    • Opcode ID: 0675609f4caf9f2afd1cda4694cdcc72201c1ee0b91c5a52ba0c9ce1780fe71c
    • Instruction ID: baf924db37b88e5adb258752a3cbf04646c37ac99ed9441a4aedca64f4cc9b15
    • Opcode Fuzzy Hash: 0675609f4caf9f2afd1cda4694cdcc72201c1ee0b91c5a52ba0c9ce1780fe71c
    • Instruction Fuzzy Hash: AD818226F09592C2EE659A2655003B95295BF95B91F0C40BCCE1DD77CAEE3CE882C380
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: ErrorLast$FullNamePath
    • String ID: \\?\\\?\UNC\
    • API String ID: 2482867836-3975371117
    • Opcode ID: d84d089e55dddc0e9d4a1ed6300acfe65f7787120397e22b6a30caf0559a1670
    • Instruction ID: f80b242cd6ee3963ea5373d343f07b7f70c490a129aa1c1b333a73ed6fe6bb05
    • Opcode Fuzzy Hash: d84d089e55dddc0e9d4a1ed6300acfe65f7787120397e22b6a30caf0559a1670
    • Instruction Fuzzy Hash: ABE1BFA2E0CAD2C1EE608B15E05877A63A4FF447A5F50457AEA9DC76C6EF7CE481C300
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: memset
    • String ID: $ $
    • API String ID: 2221118986-3665324030
    • Opcode ID: 86d6bbfb23a73066360884d037bc2645f403e0b14234b1c9f4452dd2a8b017c5
    • Instruction ID: f358d2f46e874448fb21bd8ec6caf7225e3f19fef14855a9e37295804b608036
    • Opcode Fuzzy Hash: 86d6bbfb23a73066360884d037bc2645f403e0b14234b1c9f4452dd2a8b017c5
    • Instruction Fuzzy Hash: B8E2A12250C6C189E7328B28A4157EBBBA0FF96355F085259EBD842B9BDF3DC245CF11
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: memcpy
    • String ID:
    • API String ID: 3510742995-0
    • Opcode ID: 9c5b801a96a8fb46d58ba27210e5e63a0a19fd3d7b2443bb59b6d6cb927858e4
    • Instruction ID: 6fdbab8bc8675c3967e41ff2daa5f6e27ef2942e1a9a757d0aad600f4a10d99c
    • Opcode Fuzzy Hash: 9c5b801a96a8fb46d58ba27210e5e63a0a19fd3d7b2443bb59b6d6cb927858e4
    • Instruction Fuzzy Hash: 24322B72A2DBC1C1EA618B11E4447AAB3A4FF88784F40517AEACD87B9ADF3CD054D740
    APIs
    • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00007FF68C93291D,?,?), ref: 00007FF68C94865C
    • BCryptGenRandom.BCRYPT(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00007FF68C93291D,?,?), ref: 00007FF68C948691
    • SystemFunction036.ADVAPI32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00007FF68C93291D,?,?), ref: 00007FF68C9486A9
    • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00007FF68C93291D,?,?), ref: 00007FF68C948874
    • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00007FF68C93291D,?,?), ref: 00007FF68C948884
    • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00007FF68C93291D,?,?), ref: 00007FF68C9488A5
    • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00007FF68C93291D,?,?), ref: 00007FF68C9488B6
    • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00007FF68C93291D,?,?), ref: 00007FF68C9488D9
    • TlsSetValue.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF68C948933
    • HeapFree.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF68C94894F
    • HeapFree.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF68C948960
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Value$FreeHeap$CryptFunction036RandomSystem
    • String ID:
    • API String ID: 624231926-0
    • Opcode ID: 48683c90f155eb3ab6b0f480876dc731db24b583f7fd340b0cc4d0d58db42888
    • Instruction ID: 53632af9aed6f4181c433a8c88898b621f1c7952df377583838f90fac59f06f5
    • Opcode Fuzzy Hash: 48683c90f155eb3ab6b0f480876dc731db24b583f7fd340b0cc4d0d58db42888
    • Instruction Fuzzy Hash: 7791A521D1CAC1C1FA665B28A0067F9A3A0BFD4754F059279EB9C83796EF3DA5D2C340
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: CloseHandlememcpymemset
    • String ID: arenegyl$modnarod$setybdet$uespemos
    • API String ID: 3079659014-66988881
    • Opcode ID: 9e51cb5e9eab53be9b38e922076bab1050d4355f12cb712b4656db2a253b1688
    • Instruction ID: ccf131900db17502eb388f196625d18f883c74a60e16dc88b53c20c13f4eb7b3
    • Opcode Fuzzy Hash: 9e51cb5e9eab53be9b38e922076bab1050d4355f12cb712b4656db2a253b1688
    • Instruction Fuzzy Hash: D8322553E18FC581EA05CB2895116B96320FB99B98F09A339DFAD566D3EF38E1D1C340
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID: 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899000000000000000000000000000000000000000000000000000000000000$0123456789abcdef[$0x000102030405060708091011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798990000000000000000000000000000000000000000000000000000000000$\\$\u$\u${${$}$}
    • API String ID: 0-473666626
    • Opcode ID: 8b596f3fd2b25c00cfd59654428b73a39b7c730e7381da243b893e0f712c348c
    • Instruction ID: de618d66d53d7484b2e415faeb8a2119eef4251c544e21d256a0c157692050ea
    • Opcode Fuzzy Hash: 8b596f3fd2b25c00cfd59654428b73a39b7c730e7381da243b893e0f712c348c
    • Instruction Fuzzy Hash: 89524A22A2C2D2C6EF748738A014B7D7A90FF55780F4061B9EA8E93AC2CF6ED541D701
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID: +$-$-$-$-$-$-$<$INFINITY$NAN
    • API String ID: 0-3578884141
    • Opcode ID: 4eda23634bc7c016abfc26b19e4b810dbbf8c42afebe1cfb9949150ba9b9d5ee
    • Instruction ID: c6f4d01e1d111cb4044b8e9d1477dbbfb31ed6e9e4d64715532fb9faedc1d1bc
    • Opcode Fuzzy Hash: 4eda23634bc7c016abfc26b19e4b810dbbf8c42afebe1cfb9949150ba9b9d5ee
    • Instruction Fuzzy Hash: 87C12352E0C6C3C1FE218A39949077A56A1BF40794F5861FAED4ED62D3EF3EE981D200
    APIs
    • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,0000000C,00007FF68C967E3E), ref: 00007FF68C968C31
    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,0000000C,00007FF68C967E3E), ref: 00007FF68C968E81
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: memcpymemset
    • String ID: arenegyl$modnarod$setybdet$uespemos
    • API String ID: 1297977491-66988881
    • Opcode ID: 095e737c519e80db1e1a180b5f3d5e39476d15b3181db30f1ef949f0194f7770
    • Instruction ID: 75f9ee288f0b2ef543b8926183432f41b85931ed4db4b16d4d3ea27a7414b32d
    • Opcode Fuzzy Hash: 095e737c519e80db1e1a180b5f3d5e39476d15b3181db30f1ef949f0194f7770
    • Instruction Fuzzy Hash: 4C1256A2B14BC582EE048F69A4119BA6761FB85BE0F419335DFAE577C6EE3CC141C340
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: AttributeProcThread$FreeHeapInitializeListUpdate
    • String ID:
    • API String ID: 3691516580-0
    • Opcode ID: bd69586e2e46eb3e7d5079dc6a9b5f3f56cfd11cb646f10c9d9e9a093e3e6031
    • Instruction ID: 7fabcb0e8bb8312b0258e70ddec6b21613ef675114e19bdf5199cdabcbcb9860
    • Opcode Fuzzy Hash: bd69586e2e46eb3e7d5079dc6a9b5f3f56cfd11cb646f10c9d9e9a093e3e6031
    • Instruction Fuzzy Hash: 55711722B096D1C1EE149F1A94067BA3391BF48BE5F584279EE2E837D6DE3DE041C200
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID: +$-$-$-$-$INFINITY$NAN
    • API String ID: 0-176520682
    • Opcode ID: b5cf5c857cb251bae17931494819c86813d3d21859b320fe9b282f69f3c1af6e
    • Instruction ID: 9f91f2b38951c530a056c9488ed3f88f7fadfefd95a037223694661c83c010bb
    • Opcode Fuzzy Hash: b5cf5c857cb251bae17931494819c86813d3d21859b320fe9b282f69f3c1af6e
    • Instruction Fuzzy Hash: 5DC13522E0C5C2C2FF218A35948437A6682BF847D4F5861FAE94DD66D7DF3EE985C204
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d1cb696e7cde7725783437b057aac67969f44b243f56186d7595fe84ee82d1bd
    • Instruction ID: 8f71cd9247f54e95e4b79f8928bec81f3433771cd09497b5c68d80ad9d4c61b0
    • Opcode Fuzzy Hash: d1cb696e7cde7725783437b057aac67969f44b243f56186d7595fe84ee82d1bd
    • Instruction Fuzzy Hash: 10223772609BC1C6EB758B25B4403EABBA5FB88794F44512ADB8D83B99DF3CD145CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: memset
    • String ID: +NaNinf00e00123456789abcdef[
    • API String ID: 2221118986-1013878795
    • Opcode ID: 9f6c63ea40faf9d7776fb3227d70d5de8e022c5ec24c29459dd6b2d99e63d944
    • Instruction ID: 93b5fc078051a716196b108cc29dfc83ba4a71cbb87f9eb7c1669cc40bec0167
    • Opcode Fuzzy Hash: 9f6c63ea40faf9d7776fb3227d70d5de8e022c5ec24c29459dd6b2d99e63d944
    • Instruction Fuzzy Hash: F1E13363B292D5C3EF298A389464379228ABF84798F459079C95E87BC6DF3CA945C700
    APIs
    • memset.API-MS-WIN-CRT-STRING-L1-1-0(00000002,?,00000000,00000000,?,?,00000000), ref: 00007FF68C933D17
    • memset.API-MS-WIN-CRT-STRING-L1-1-0(00000002,?,00000000,00000000,?,?,00000000), ref: 00007FF68C933D50
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: memset
    • String ID:
    • API String ID: 2221118986-0
    • Opcode ID: 40d707ea82821389a3abfe0a54bc94a80059103a4080be6e317932e1e45081e2
    • Instruction ID: 9ce88e3aa1cd4c0dc90cb06d8edcc1382ac39e1af6424a207e72f20782413f94
    • Opcode Fuzzy Hash: 40d707ea82821389a3abfe0a54bc94a80059103a4080be6e317932e1e45081e2
    • Instruction Fuzzy Hash: 2C021372609BC186EB758B25F4403EABBA5FB89784F44512ADB8D83B99DF3CD145CB00
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID: +$-$-$FFFFFFFF$FFFFFFFF$d
    • API String ID: 0-1053537561
    • Opcode ID: 706d152c5714f094e570a520f8043db7189edd8cc7cfc7cce119ddd89aee227e
    • Instruction ID: f9f590db3e17cc9559fbd45d08799bcd011e0ef3af8ffa21e0ef5bdf39ba373e
    • Opcode Fuzzy Hash: 706d152c5714f094e570a520f8043db7189edd8cc7cfc7cce119ddd89aee227e
    • Instruction Fuzzy Hash: 5AB14A22F085E2C2EE548E3695847B96690BF11BE4F4A6279CE6E477D6EF3CD541C300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: memcpy
    • String ID: x
    • API String ID: 3510742995-2363233923
    • Opcode ID: 2ba7719f30cd3b8dda077a363329c35286023c649d9ae4a55b0becc365115029
    • Instruction ID: 1e26c6732ddc65e83a4f3b178395aeceddff2d668a3082f39c7d48a5f63f3bf3
    • Opcode Fuzzy Hash: 2ba7719f30cd3b8dda077a363329c35286023c649d9ae4a55b0becc365115029
    • Instruction Fuzzy Hash: 9602A336619FC584D6B18B19F8803DAB3A4F799794F548226DECC63B19EF78D198CB00
    Strings
    • 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899000000000000000000000000000000000000000000000000000000000000, xrefs: 00007FF68C92367E, 00007FF68C9237AB, 00007FF68C9237DB, 00007FF68C92385C
    • }((,]0x0001020304050607080910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989900000000000000000000000000000000000000000000000000, xrefs: 00007FF68C923ADA
    • } }((,]0x000102030405060708091011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798990000000000000000000000000000000000000000000000000, xrefs: 00007FF68C923AF1
    • 0x000102030405060708091011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798990000000000000000000000000000000000000000000000000000000000, xrefs: 00007FF68C923766, 00007FF68C9239E1
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID: }((,]0x0001020304050607080910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989900000000000000000000000000000000000000000000000000$00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899000000000000000000000000000000000000000000000000000000000000$0x000102030405060708091011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798990000000000000000000000000000000000000000000000000000000000$} }((,]0x000102030405060708091011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798990000000000000000000000000000000000000000000000000
    • API String ID: 0-989609041
    • Opcode ID: 8f7a4330d985837b16954c7c8942412312f9f62e90daf5aafe7c9d5e282de8a0
    • Instruction ID: bc054edfa603e62658432c40e4e7661d567af87864ef04f75833f257b6ee3776
    • Opcode Fuzzy Hash: 8f7a4330d985837b16954c7c8942412312f9f62e90daf5aafe7c9d5e282de8a0
    • Instruction Fuzzy Hash: 6BC15672B18695C2EB248B15E010BB87B64FB99B94F805239DAEE57BE1CF3DC245D700
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID: arenegyl$modnarod$setybdet$uespemos
    • API String ID: 0-66988881
    • Opcode ID: b4d0b01a74f92c1dd7256cf564e30a0a617bb5f67117b0844aa177738c44540a
    • Instruction ID: 27c8322933769904843feb15b2581eae28c6e8122ef2f94993066102d6ba34ab
    • Opcode Fuzzy Hash: b4d0b01a74f92c1dd7256cf564e30a0a617bb5f67117b0844aa177738c44540a
    • Instruction Fuzzy Hash: 7F3125E6B08B8042FE54D7E4787536B9212A7457D0F90E13AEE4D9BF1EDE3DD2428240
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID: arenegyl$modnarod$setybdet$uespemos
    • API String ID: 0-66988881
    • Opcode ID: 2245685689969dc26132a4786679ef62b6e8df96e94c5d07d423d7e1e7501f9e
    • Instruction ID: 790256dd086d36beda63b4b8c01b012486993d897132228f40410405ffca0f86
    • Opcode Fuzzy Hash: 2245685689969dc26132a4786679ef62b6e8df96e94c5d07d423d7e1e7501f9e
    • Instruction Fuzzy Hash: 3721E7E6B08B8042FE44D7D4747136B9262A3447C0F90E036EE4D97B1EDF3DD2514640
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: memset
    • String ID: arenegyl$setybdet
    • API String ID: 2221118986-2199462733
    • Opcode ID: cdcff81bc8450103981dc810123f6557636ea43d9cbe738f630e8902aa7e6a2b
    • Instruction ID: 830f0bac6fd0e7ef6de25164ea1bd00d264060a70a9ef3d6561ad26309b2c3ca
    • Opcode Fuzzy Hash: cdcff81bc8450103981dc810123f6557636ea43d9cbe738f630e8902aa7e6a2b
    • Instruction Fuzzy Hash: E7514D23B446A1CAF6A4AF75BA507E72A50F318758F885025DF9C87352DF38DAE2C340
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeapmemcmp
    • String ID:
    • API String ID: 2929263700-0
    • Opcode ID: 75d4ca94a912342500757eb0cacd0f6640c795a4e7728d402fc5a865ed8a3b1c
    • Instruction ID: 6d9c4af22a17aa9e3b0c4e305a6a24cd5631f5c94f34364a3098308edc37bd51
    • Opcode Fuzzy Hash: 75d4ca94a912342500757eb0cacd0f6640c795a4e7728d402fc5a865ed8a3b1c
    • Instruction Fuzzy Hash: BB523922B1C6D1C1FE218B259421BB9A751FF59795F448279EEEE93A82EF3CE541C300
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: memcpy
    • String ID:
    • API String ID: 3510742995-0
    • Opcode ID: 9508fe8bffddda92d75bd7629f9fdc783abf528d6a1f0c345942ccd6e9668a97
    • Instruction ID: 74ad577cf064a5183b87c3418e8cceab9bf90af8be81a890bc60da2b49225362
    • Opcode Fuzzy Hash: 9508fe8bffddda92d75bd7629f9fdc783abf528d6a1f0c345942ccd6e9668a97
    • Instruction Fuzzy Hash: 4242AE23D18BD1C2E7608F20E9543BA33A0FB55B8CF15A238DF9A4A6D6DF799195C310
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID: Authenti$GenuineI$HygonGen
    • API String ID: 0-696657513
    • Opcode ID: af8090e0685c6ae0e240fc2a188f8cd7655971698e78a546eacfb7dad60ded05
    • Instruction ID: 44d76ce60b82f17866bb62e48c3c95ce6993625ce039523e62a0298cf84b2bc4
    • Opcode Fuzzy Hash: af8090e0685c6ae0e240fc2a188f8cd7655971698e78a546eacfb7dad60ded05
    • Instruction Fuzzy Hash: 42B148A37389A143FB598A46BD52BB64991B358BC4F18703DEE5B87BC1DC7DCA10D240
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID:
    • API String ID: 3298025750-0
    • Opcode ID: 7bd68b3bfbffb44e3ebe031dd448b54deebb13ba44114b1364ade926e01979ae
    • Instruction ID: a71ca84720246e0f2b25fc3daca3f71faa67f92bfec65602b7d1994f4953eebe
    • Opcode Fuzzy Hash: 7bd68b3bfbffb44e3ebe031dd448b54deebb13ba44114b1364ade926e01979ae
    • Instruction Fuzzy Hash: A871ACA7A09781C1EE558B42E6403B96698FF46FE1F5486BACE1D977C2DE78E1D0C300
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 896da6279d52843613759fa602d04b45b87885fae0688f27167969770fa4b905
    • Instruction ID: 0e4bab67341ce84564687aa042b4d88482ef4b03388a96ff379d2d4a1cc00df8
    • Opcode Fuzzy Hash: 896da6279d52843613759fa602d04b45b87885fae0688f27167969770fa4b905
    • Instruction Fuzzy Hash: C4313835A0AA86C1EB00AF55E9A46B923A1BF58BC4F00407DEA5DC77A7DE3CE851D250
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c994733f000f205a261743c464e086444c9072910b16e37ab1f25a00a1c54555
    • Instruction ID: 4bb753d19079d98afb1de36115a7da8aca60cd9949b1a119ec7c5e74a1827189
    • Opcode Fuzzy Hash: c994733f000f205a261743c464e086444c9072910b16e37ab1f25a00a1c54555
    • Instruction Fuzzy Hash: 8BD2B4A7F45AD083FA60CFE474607D7AB61FB95788F44A026DE8C93B09DE38C6918744
    Strings
    • 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899000000000000000000000000000000000000000000000000000000000000, xrefs: 00007FF68C9240AB, 00007FF68C9242E0, 00007FF68C9243F1, 00007FF68C924477
    • 0x000102030405060708091011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798990000000000000000000000000000000000000000000000000000000000, xrefs: 00007FF68C924230, 00007FF68C9243C0, 00007FF68C924601
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID: 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899000000000000000000000000000000000000000000000000000000000000$0x000102030405060708091011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798990000000000000000000000000000000000000000000000000000000000
    • API String ID: 0-1429195914
    • Opcode ID: fd104769d42c57b2532ed534e7d2e49fed76a871e781d223ae9640d92f6e226e
    • Instruction ID: 99cf65c648d4890b6316b824b4d03a523d889b9f6e4a209cb936c4c5518fc88b
    • Opcode Fuzzy Hash: fd104769d42c57b2532ed534e7d2e49fed76a871e781d223ae9640d92f6e226e
    • Instruction Fuzzy Hash: A2026762B086D581EB248B25E010BB96761FFA9794F905239DEEE57BD2CF3DC601D700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID:
    • API String ID: 3298025750-0
    • Opcode ID: 51e8ce8bd5b6c8c8c452163f16a45b4a2fab635007e494dab822d6d195244a32
    • Instruction ID: 31be34b6f362d292e37fe4f7e1e2e48a9fa446d6911091d1530ccd9b512f00df
    • Opcode Fuzzy Hash: 51e8ce8bd5b6c8c8c452163f16a45b4a2fab635007e494dab822d6d195244a32
    • Instruction Fuzzy Hash: DEE1C822E0CEC2C1EE718714A5453BAA791FF81795F5441BAE78D82A9BDE3CE485C700
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID: 0.ee--+NaNinf00e00123456789abcdef[
    • API String ID: 0-2347449866
    • Opcode ID: a9489ab1a9e23fda4fc2c48208d82a026bb97bd508256d740414ebff05c4198c
    • Instruction ID: 95ba7725c20f0284e4fad388115d14aad3964b165a2d22356a9ce1c0bb13dacf
    • Opcode Fuzzy Hash: a9489ab1a9e23fda4fc2c48208d82a026bb97bd508256d740414ebff05c4198c
    • Instruction Fuzzy Hash: 7752B13291CBC1C1EB718B10F4403AAA6A5FF85384F505279EA9D87BA9EF7DD584CB40
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID: 0.ee--+NaNinf00e00123456789abcdef[
    • API String ID: 0-2347449866
    • Opcode ID: 0f1a64eb6dae038731163b610a0950d03314f11fd062e5b2fb97546c57704837
    • Instruction ID: 0317cdf4f8ac5e8610d7a3e8eb0f89e2d0a06d89b0419be09fe118028f193efb
    • Opcode Fuzzy Hash: 0f1a64eb6dae038731163b610a0950d03314f11fd062e5b2fb97546c57704837
    • Instruction Fuzzy Hash: 0E32C362A1DBC1C1EB708B10F4407AAA7A1FF94394F105239EAAD87B99EF7DD545CB00
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID: +NaNinf00e00123456789abcdef[
    • API String ID: 0-1013878795
    • Opcode ID: 6837581a57a9980670aeceedd9ee8ffbbadc029e4d40c319108c0f95e6d53880
    • Instruction ID: cffaacf80aa32c16ac468b972663d3fe18324cf971c71c8ede8cb5c31d7d264e
    • Opcode Fuzzy Hash: 6837581a57a9980670aeceedd9ee8ffbbadc029e4d40c319108c0f95e6d53880
    • Instruction Fuzzy Hash: FCF14562728AD5C3DF14CF65A40466AAB95FB84BC0F54A13AEE4E83B99CF3CD945C700
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 7336feaa95fd2ef51da9c0d4026dbca259ab2a00fc7acd68179c43fa545717a2
    • Instruction ID: 540be69327b9426bb10a29c3598f9a94048851d32ac09a1054d03244e12c9d5b
    • Opcode Fuzzy Hash: 7336feaa95fd2ef51da9c0d4026dbca259ab2a00fc7acd68179c43fa545717a2
    • Instruction Fuzzy Hash: 4C02B032608BD085EBA08B22E4903EEB7A4FB84790F45907ADE9D47BA6DF3CD451D750
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: memcmp
    • String ID:
    • API String ID: 1475443563-0
    • Opcode ID: 26c8372820b04c8065bb61067e0676e37b4cd3dc4849671adea62fef3de3c050
    • Instruction ID: 4bc24781b7a725458e326175f90d5803cc418f5542d9088d328f17040327b7be
    • Opcode Fuzzy Hash: 26c8372820b04c8065bb61067e0676e37b4cd3dc4849671adea62fef3de3c050
    • Instruction Fuzzy Hash: FF512897F15BC181FE50C76864213BA9310BF997D4F44A33AEEC9A6A46EF3CD146C240
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID:
    • API String ID: 3298025750-0
    • Opcode ID: 34dc33e977de95e2aa8dc89f82795e9281cd5dd4c09bf821a8f419b6ea95e991
    • Instruction ID: 1f71953f03b9328557f51923072c35793f7505e87c16c8d4e0386c559816dc44
    • Opcode Fuzzy Hash: 34dc33e977de95e2aa8dc89f82795e9281cd5dd4c09bf821a8f419b6ea95e991
    • Instruction Fuzzy Hash: 28411372B19A81C2FE558B16A504B7826D5BF447E0F058A79DFAE83BD2EE3CE041C344
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 6aa5c9f037f992481c5d4a898faa3f0562503b33e060e6b0185ab9d085fbddc9
    • Instruction ID: c7bf4171ae93d7e3f5c5c95db60db3b6dc784b5245322c960649b1c0a708ecce
    • Opcode Fuzzy Hash: 6aa5c9f037f992481c5d4a898faa3f0562503b33e060e6b0185ab9d085fbddc9
    • Instruction Fuzzy Hash: CC324996E297E681EA23463A95053B45650BFA37D0E01D33AFDAD71F96DF29E281C300
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0008cb838a1a7d1119a14ba7d8f2eeb85f944b6c727f85d109163e7cbb8f0d0e
    • Instruction ID: 38d0b1edcc7329eb8f48a6eef0d19ab4cc859e69226b76435a59e737da1bcd3d
    • Opcode Fuzzy Hash: 0008cb838a1a7d1119a14ba7d8f2eeb85f944b6c727f85d109163e7cbb8f0d0e
    • Instruction Fuzzy Hash: B3F12862E29FC586EB22473854023BAF714BFEB794F40D326EEE971A82DF1C9141D140
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e31be5707e724445f2252c5881b99883c2d0881c28b889c9f2e2d75c82b7ba2b
    • Instruction ID: 5e1589d1126e8265170e2216aa57ffc0f49dd187af78fc69c57da152fe37c094
    • Opcode Fuzzy Hash: e31be5707e724445f2252c5881b99883c2d0881c28b889c9f2e2d75c82b7ba2b
    • Instruction Fuzzy Hash: DEB10866F81BA443DA188F85B85179AA365B3C9BD4F45E026DE4CA7F58ED3CC9038340
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ddb443bf15f0c0808131960636e03ef8ccbd760d7c35891fba3a68a0fde93101
    • Instruction ID: b83f1b2dc42fa54e91f78a1fa6413df2319bd6325b81eac4ab96d489f1b17f68
    • Opcode Fuzzy Hash: ddb443bf15f0c0808131960636e03ef8ccbd760d7c35891fba3a68a0fde93101
    • Instruction Fuzzy Hash: DAC16962E0C6D1C4FF628A649400B796A81BF02767F5483B8C97E971D2EFBD5D96D300
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a5253e93aaebdb80888fead87f16646c4513e5280444b0ca7af1c6c0ef13a77d
    • Instruction ID: d358b07c73984bbfbc85bd402de2963593e62ca8cfaec3f6987f0339e7cfd5ae
    • Opcode Fuzzy Hash: a5253e93aaebdb80888fead87f16646c4513e5280444b0ca7af1c6c0ef13a77d
    • Instruction Fuzzy Hash: D8E15B66E29FC956F313573864032B6E318AFFB6C9F40E31AFDD0B1913EB6482529644
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a2edd579274dd08393264abd86524fcd460068e4d84029b77e39eceb842e0c63
    • Instruction ID: 451c5376f997476323c44d4d9b9dbe16d91e4b762719cb89964e319367d83ff1
    • Opcode Fuzzy Hash: a2edd579274dd08393264abd86524fcd460068e4d84029b77e39eceb842e0c63
    • Instruction Fuzzy Hash: B3A1F712E196D1D2FF564B2484107B82A51BF91B90F4B92BBDE1D87BC2CF3CA955C309
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e9b0bec211e6195bb120cdd5099edde79d6a45dd3d239ce56b518f5aae1f642a
    • Instruction ID: 1dd3f8f51ea6d095d3dfca9d7ed4c3cdf117b14dbaab57946e6a9822177f0773
    • Opcode Fuzzy Hash: e9b0bec211e6195bb120cdd5099edde79d6a45dd3d239ce56b518f5aae1f642a
    • Instruction Fuzzy Hash: 37414773F146B182FF14CB51A574A382712FB54BD0F42913ADD6AA3F81CE28D896C384
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 235281eec64871b40e926be524ef9672bcf5aecf8045c25ea4de9a8cfd46bf51
    • Instruction ID: 8dd05497edb27aa10839df32deee162402610d6c8898227e7d8493d7489102a9
    • Opcode Fuzzy Hash: 235281eec64871b40e926be524ef9672bcf5aecf8045c25ea4de9a8cfd46bf51
    • Instruction Fuzzy Hash: 67316B52F55A96C3FE14813989257B501826F857F0E54A3B8DE3ECBBD8EF2D9541C200
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: memcpy
    • String ID: .exeprogram not found$p
    • API String ID: 3510742995-3588222318
    • Opcode ID: 91bca6fc6900877c90ba94fcfcd7c9d2bbc746bd43a7f388c1ecd0c44c2fb826
    • Instruction ID: a01f9eb3074b9d6dbf626ca276a7751f380247ced19474f3a0d98e5f24f99ae7
    • Opcode Fuzzy Hash: 91bca6fc6900877c90ba94fcfcd7c9d2bbc746bd43a7f388c1ecd0c44c2fb826
    • Instruction Fuzzy Hash: 08A17E22A0DAC1C0EA719B15E4557FAA3A4FF95785F044179DE8C86A9BDF3CE182C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: ExceptionRaiseUnwindabort
    • String ID: CCG $CCG $CCG!$CCG!$CCG"
    • API String ID: 4140830120-3297834124
    • Opcode ID: 85bf20e9dbddc103779356c694087b508f263b141af8ce1d52b975771c3dd7ce
    • Instruction ID: f90ce1d505333be4a1be881f44ffd00506d230f9bfd61fd18702f3ea2549f274
    • Opcode Fuzzy Hash: 85bf20e9dbddc103779356c694087b508f263b141af8ce1d52b975771c3dd7ce
    • Instruction Fuzzy Hash: ED51CF22A1AB80C2EB608F55E4447BD7370FB99B84F50522AEE8D53B59DF38D5C2C700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: CloseHandle$memcpy$CodeErrorExitLastObjectProcessSingleWait
    • String ID:
    • API String ID: 4095814610-0
    • Opcode ID: d7bfa7cac7c116067fe547020d47ff1cdee2c613d16024e256421e0818c62604
    • Instruction ID: d59aeae5f8247edfa2588cc1a8e225cbf11c09ec31e453a702c9982af006f9f7
    • Opcode Fuzzy Hash: d7bfa7cac7c116067fe547020d47ff1cdee2c613d16024e256421e0818c62604
    • Instruction Fuzzy Hash: B891B222A08BC1C2EA619B25F405BFAA3A4FF94784F049275EF8D52796DF3CE191C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap$CloseHandle
    • String ID:
    • API String ID: 1910495013-0
    • Opcode ID: 12d8711fbcedbc2757be5d5f6e80439acd786e58ab72267057fc44b7b96f8bbe
    • Instruction ID: 415ed3e2e52c429069fb63a3f2705d6727fc5ea2bff9a2c54b6e7680ea9da875
    • Opcode Fuzzy Hash: 12d8711fbcedbc2757be5d5f6e80439acd786e58ab72267057fc44b7b96f8bbe
    • Instruction Fuzzy Hash: 32611932A0CAC2C0EA719F11E4147EAA3A4FF84795F44417ADA8D87A9ACF7CE485C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Value$FreeHeap$PrngProcess
    • String ID:
    • API String ID: 2541186568-0
    • Opcode ID: 53b8e99d704bf6651451a73ee2f0e1a6acc74449b4a6f87551685e8cc0445ab7
    • Instruction ID: 661bc0b6ef62b037893d9e304674068e0fb3e0962591815a24830a83b06c6a1d
    • Opcode Fuzzy Hash: 53b8e99d704bf6651451a73ee2f0e1a6acc74449b4a6f87551685e8cc0445ab7
    • Instruction Fuzzy Hash: C331C212E1C9D2C1FD552B666401AB952957F88F80F0845BDEA1DC73C7ED2CA882C2C0
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID:
    • API String ID: 3298025750-0
    • Opcode ID: dab4d528d52ff534bedb1bed343f7f2cfef11ca4b6873d4725fc569e50c34220
    • Instruction ID: 452a528b06e63339f0b789c0ad5cf5d3f34a1a58dcf3b7f8111cc473c92f7247
    • Opcode Fuzzy Hash: dab4d528d52ff534bedb1bed343f7f2cfef11ca4b6873d4725fc569e50c34220
    • Instruction Fuzzy Hash: FE516E16A09EC6C1FE648B56E440BB95290BF84B94F48457ECB6E867D2DF3CF492D380
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap$ErrorLast$FileHandle$CloseCreateInformation
    • String ID:
    • API String ID: 910738790-0
    • Opcode ID: 6f781c2dea5ffee30beb9144e5308161996e975bbd1dd044ae2d85e76f672d0a
    • Instruction ID: ad0a1e4fae395d871ae27da1574166eb05a7fa0eaad25d75b1ce0340805aaac1
    • Opcode Fuzzy Hash: 6f781c2dea5ffee30beb9144e5308161996e975bbd1dd044ae2d85e76f672d0a
    • Instruction Fuzzy Hash: A361AD62A0C2D682FF618A22A1007796B80BF45785F4441B9EE9DC7EC7DF7DE4A5C700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap$Value$AddressSingleWake
    • String ID:
    • API String ID: 406711419-0
    • Opcode ID: a14425816d90bf8b35b70f114aa7e6150f6e27b0ceeff9ce5b2c51dd6d24f6d9
    • Instruction ID: 7a54588ba985fa493c5294d7b9906174d1ecc74e1d120d3412b679e01fc734f4
    • Opcode Fuzzy Hash: a14425816d90bf8b35b70f114aa7e6150f6e27b0ceeff9ce5b2c51dd6d24f6d9
    • Instruction Fuzzy Hash: 14916622A1DA82C0EE61DB11A45477963A0BF95B95F5888BEEE5DC73D2DF3CE442C340
    APIs
    • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,-00000008,?,00000000,00007FF68C950192), ref: 00007FF68C95082C
    • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,-00000008,?,00000000,00007FF68C950192), ref: 00007FF68C95087C
    • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,-00000008,?,00000000,00007FF68C950192), ref: 00007FF68C95088C
    • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,-00000008,?,00000000,00007FF68C950192), ref: 00007FF68C9508A2
    • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,-00000008,?,00000000,00007FF68C950192), ref: 00007FF68C9508C2
    • TlsGetValue.KERNEL32(?,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,00000000,-00000008), ref: 00007FF68C9508F9
    • TlsGetValue.KERNEL32(?,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,00000000,-00000008), ref: 00007FF68C950931
    • TlsSetValue.KERNEL32(?,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,00000000,-00000008), ref: 00007FF68C950941
    • HeapFree.KERNEL32(?,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,00000000,-00000008), ref: 00007FF68C95096D
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Value$FreeHeap
    • String ID:
    • API String ID: 911738859-0
    • Opcode ID: 7a91e8425537da9f6cdf666d2ee2030b644c3801640f78c588b15dd3424535cd
    • Instruction ID: c8cd4b14e7f8d85101b1eb7e81d210e4dc9d45d9152aee5836303e9aa5bec161
    • Opcode Fuzzy Hash: 7a91e8425537da9f6cdf666d2ee2030b644c3801640f78c588b15dd3424535cd
    • Instruction Fuzzy Hash: 8741BD22E0DAD2C1FE652B26A510B7952947F89B91F0C50FDDA5DC77C7DE7CA841C280
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: ErrorFreeHeapLast$DirectoryWindows
    • String ID:
    • API String ID: 3038101868-0
    • Opcode ID: 8f3967d82c1e7d039006414896063e670faa859c6d133682fe786fae5e8a46de
    • Instruction ID: cfb92c321c0c0d80808dfe4f09809e80240f515651499e0d8c37cc228d2f3574
    • Opcode Fuzzy Hash: 8f3967d82c1e7d039006414896063e670faa859c6d133682fe786fae5e8a46de
    • Instruction Fuzzy Hash: FA31AB22B0CAC680FE209A66D5083BA6295BF45B91F554179DA6DD7BC2DF7CE042C340
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID:
    • API String ID: 3298025750-0
    • Opcode ID: 1cadcfc04fc0b00f7294f8aa3fade6e97f7d2483505162fb7989819c58a3d154
    • Instruction ID: fdd893bae24d4b8ffc3ff8d378971fbb2bda43dc03a82532be712f3c88333c3b
    • Opcode Fuzzy Hash: 1cadcfc04fc0b00f7294f8aa3fade6e97f7d2483505162fb7989819c58a3d154
    • Instruction Fuzzy Hash: EB615C22B09AC6C4EE25CB129544BB82391BF49BE8F49457ACE3D877D6DF38E491C340
    APIs
      • Part of subcall function 00007FF68C9508E0: TlsGetValue.KERNEL32(?,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,00000000,-00000008), ref: 00007FF68C9508F9
      • Part of subcall function 00007FF68C9508E0: TlsGetValue.KERNEL32(?,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,00000000,-00000008), ref: 00007FF68C950931
      • Part of subcall function 00007FF68C9508E0: TlsSetValue.KERNEL32(?,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,00000000,-00000008), ref: 00007FF68C950941
      • Part of subcall function 00007FF68C9508E0: HeapFree.KERNEL32(?,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,00000000,-00000008), ref: 00007FF68C95096D
    • HeapFree.KERNEL32 ref: 00007FF68C9500C4
    • HeapFree.KERNEL32 ref: 00007FF68C9500D5
    • HeapFree.KERNEL32 ref: 00007FF68C950145
    • HeapFree.KERNEL32 ref: 00007FF68C950156
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap$Value
    • String ID: <unknown>PATH$main
    • API String ID: 3456309649-1581385649
    • Opcode ID: 792cab6459d9c0d20925b8ca77dfed35d9e0065f578f8cdaaf6ab09fe7b03964
    • Instruction ID: 4572746c7ccf281126f10feaf86a2efe8b70985434367b2e91f602dc1a24cab4
    • Opcode Fuzzy Hash: 792cab6459d9c0d20925b8ca77dfed35d9e0065f578f8cdaaf6ab09fe7b03964
    • Instruction Fuzzy Hash: 91515A22A09A82C1EE60CB15F444379A3A4FF85B95F4450BAEA9DC77A6DF3CE551C340
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: ErrorLast$FileFreeHeapModuleName
    • String ID:
    • API String ID: 2130810879-0
    • Opcode ID: b1acf2bbf4d34673459571eedac742362e16ac1c1458ae57f6b46f7c0216beaa
    • Instruction ID: e772ae16e5f50b3ec74776bed02115b8e69e0a350c3119f489ae937162e33591
    • Opcode Fuzzy Hash: b1acf2bbf4d34673459571eedac742362e16ac1c1458ae57f6b46f7c0216beaa
    • Instruction Fuzzy Hash: D5410422A1CBC6C0FE208A22B804B7A6690BF447A5F54027CEE6DC76C7CE7DD180C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: memcpy$FreeHeap
    • String ID:
    • API String ID: 4250714341-0
    • Opcode ID: 55b54bfb86a12a0241974352b423482a55883790906131e1acac40a12f55475b
    • Instruction ID: 30aa4e8f69f175d8a6011da9f5f16040d0f01b3b171d9934fe1e35ddcebdba3f
    • Opcode Fuzzy Hash: 55b54bfb86a12a0241974352b423482a55883790906131e1acac40a12f55475b
    • Instruction Fuzzy Hash: 2DD17D22618BC082DB16CF28E4403FA73A5FF98B94F549226DF9957769DF79E291C300
    APIs
    • TlsGetValue.KERNEL32(00000000,00000000,00000001,00007FF68C9565A0), ref: 00007FF68C956239
    • TlsGetValue.KERNEL32(00000000,00000000,00000001,00007FF68C9565A0), ref: 00007FF68C956271
    • TlsSetValue.KERNEL32(00000000,00000000,00000001,00007FF68C9565A0), ref: 00007FF68C956281
    • HeapFree.KERNEL32(00000000,00000000,00000001,00007FF68C9565A0), ref: 00007FF68C9562AD
      • Part of subcall function 00007FF68C94CBC0: HeapFree.KERNEL32(?,?,00000001,00007FF68C95631E,?,?,?,?,?,00000000,00000000,00000001,00007FF68C9565A0), ref: 00007FF68C94CBDC
    • TlsGetValue.KERNEL32(00000000,00000000,00000001,00007FF68C9565A0), ref: 00007FF68C9562D1
    • TlsSetValue.KERNEL32(?,?,?,?,?,00000000,00000000,00000001,00007FF68C9565A0), ref: 00007FF68C956303
    • HeapFree.KERNEL32(?,?,?,?,?,00000000,00000000,00000001,00007FF68C9565A0), ref: 00007FF68C95632A
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Value$FreeHeap
    • String ID:
    • API String ID: 911738859-0
    • Opcode ID: 0cf19cf232c03d6f849de63c95224587dc43345695acae4c472907aae5a60070
    • Instruction ID: 0527059d4472cd8b15d9d21fcf362aa50c5cfdeea3ce9459fb72234003ff37f6
    • Opcode Fuzzy Hash: 0cf19cf232c03d6f849de63c95224587dc43345695acae4c472907aae5a60070
    • Instruction Fuzzy Hash: AA31AC22F0D9D2C1FE256B2695117BD1291BF89B91F0844BDCA1DD73D7DE6CA892C380
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap$Close$Create
    • String ID: ?
    • API String ID: 3832569539-1684325040
    • Opcode ID: abe1b56737e018da4e46bad23ec6a8407202cebab7e49d1ffbae50ec55ea28e4
    • Instruction ID: e086e6780fca92b4d15d192cee5b504bf31872f9e057d033224d62dcab78cb52
    • Opcode Fuzzy Hash: abe1b56737e018da4e46bad23ec6a8407202cebab7e49d1ffbae50ec55ea28e4
    • Instruction Fuzzy Hash: 09411732609BC1C5EB309B51F4943AAB3A4FF88784F501179DA8C86B9AEF7CD155CB44
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: memcpy$FreeHeap
    • String ID:
    • API String ID: 4250714341-0
    • Opcode ID: 84764352876102455a3b2aa23fe2f3af7d4ce00cb73b0e0aa1858fbe032be188
    • Instruction ID: 44dc96a086d1b71093a2495ed46f6abc1b4b26724f737f8b8befca6c88884f23
    • Opcode Fuzzy Hash: 84764352876102455a3b2aa23fe2f3af7d4ce00cb73b0e0aa1858fbe032be188
    • Instruction Fuzzy Hash: 92F1AD22A19AC1C1EE60CB14E4047B967A0FF58BA8F059379DABD877D6DF38E191C340
    APIs
    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000,00000000,00000000,00007FF68C94BF94), ref: 00007FF68C942779
    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000,00000000,00000000,00007FF68C94BF94), ref: 00007FF68C94278C
    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000,00000000,00000000,00007FF68C94BF94), ref: 00007FF68C9427D6
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: memcpy
    • String ID:
    • API String ID: 3510742995-0
    • Opcode ID: 815b6481848aac9d6395472ca5d520f3f45efa49456bacff0ec74a9b8bc44a25
    • Instruction ID: 610a5765acbca5df6dbaf13026d78d852c27daabb7d5983ad4b9707956a8932a
    • Opcode Fuzzy Hash: 815b6481848aac9d6395472ca5d520f3f45efa49456bacff0ec74a9b8bc44a25
    • Instruction Fuzzy Hash: 34A19F22A09AC1C1EA609B15E4003F9A3A0FF597A8F149379DEBD867D6DF3CE185C740
    APIs
    • WakeByAddressSingle.API-MS-WIN-CORE-SYNCH-L1-2-0 ref: 00007FF68C95071A
    • HeapFree.KERNEL32 ref: 00007FF68C950777
    • HeapFree.KERNEL32 ref: 00007FF68C950788
      • Part of subcall function 00007FF68C950810: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,-00000008,?,00000000,00007FF68C950192), ref: 00007FF68C95082C
      • Part of subcall function 00007FF68C950810: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,-00000008,?,00000000,00007FF68C950192), ref: 00007FF68C95087C
      • Part of subcall function 00007FF68C950810: TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,-00000008,?,00000000,00007FF68C950192), ref: 00007FF68C95088C
      • Part of subcall function 00007FF68C950810: HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,-00000008,?,00000000,00007FF68C950192), ref: 00007FF68C9508A2
      • Part of subcall function 00007FF68C9508E0: TlsGetValue.KERNEL32(?,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,00000000,-00000008), ref: 00007FF68C9508F9
      • Part of subcall function 00007FF68C9508E0: TlsGetValue.KERNEL32(?,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,00000000,-00000008), ref: 00007FF68C950931
      • Part of subcall function 00007FF68C9508E0: TlsSetValue.KERNEL32(?,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,00000000,-00000008), ref: 00007FF68C950941
      • Part of subcall function 00007FF68C9508E0: HeapFree.KERNEL32(?,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,00000000,-00000008), ref: 00007FF68C95096D
      • Part of subcall function 00007FF68C94FE90: HeapFree.KERNEL32(?,?,00000001,00007FF68C95173E,?,?,?,?,?), ref: 00007FF68C94FEB6
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Value$FreeHeap$AddressSingleWake
    • String ID:
    • API String ID: 2155206942-0
    • Opcode ID: 58eaf7c0866332e462f632632dfac8d6449c26b0b08e90e07aef5a2668aa7239
    • Instruction ID: 34acb4d859e8ac1bcb6b007b709a0106361ca3438eaf1711d36a16a1754cc355
    • Opcode Fuzzy Hash: 58eaf7c0866332e462f632632dfac8d6449c26b0b08e90e07aef5a2668aa7239
    • Instruction Fuzzy Hash: 9F91BA21E0D682C4FE618B61B9443782690BF65B95F481AFEE91CC72E2DF3CA486D300
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: memcpy
    • String ID:
    • API String ID: 3510742995-0
    • Opcode ID: d5db16d91affda2f84a152caf751f07f8368cedc113330026889aa15eaa87eea
    • Instruction ID: e2068af570000e4ecbeffe48641d44c78d3fbea5201b5577c9bc597a51e84981
    • Opcode Fuzzy Hash: d5db16d91affda2f84a152caf751f07f8368cedc113330026889aa15eaa87eea
    • Instruction Fuzzy Hash: E391D722A15BC4C2EA559F18F4017FAA368FF54798F545326DF8D13266EF39E196C300
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: memcpy$FreeHeap
    • String ID:
    • API String ID: 4250714341-0
    • Opcode ID: a0caff6dd93ee5d7dd380fdfb93ab33e69047ed97e2fd5ff91c07ec619dc2965
    • Instruction ID: 8242a0e2d6722e5b591cffab5a28d20329268a1e1253cd0b7d61d7ef9288b346
    • Opcode Fuzzy Hash: a0caff6dd93ee5d7dd380fdfb93ab33e69047ed97e2fd5ff91c07ec619dc2965
    • Instruction Fuzzy Hash: 11917C22605BC082DB15CF28E4443E97764FF98B88F589336DB9957769EF75E282C300
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID:
    • API String ID: 3298025750-0
    • Opcode ID: b283ebb46fc539135ded7bf984fae4520afc19b3de7bb98c244c57499e960ffa
    • Instruction ID: a541bd82fa6b6440cbe25e3637e7575dff7a2e39515eb6890006811cec0da7a5
    • Opcode Fuzzy Hash: b283ebb46fc539135ded7bf984fae4520afc19b3de7bb98c244c57499e960ffa
    • Instruction Fuzzy Hash: 26515B22A0DA86C1EE64DA16A50437D5791BF89BC5F1884B9EE1E87797DE3CE142C340
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap$InfoSystem
    • String ID:
    • API String ID: 738346042-0
    • Opcode ID: eb3f5b1d3b5f82bb69807adc4302becdbf9f55ab7de732d39ccc6c47cfe18b98
    • Instruction ID: e40ea082e50953fb91ff2cafd420234fb07acd8e5d86f86a117f2dcdf8e11553
    • Opcode Fuzzy Hash: eb3f5b1d3b5f82bb69807adc4302becdbf9f55ab7de732d39ccc6c47cfe18b98
    • Instruction Fuzzy Hash: 5F511C27A18A82C0EE64DB05E54877D63A5FF85B84F4840B9DA6D876D6DF7CE481C340
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Value$FreeHeapmemcpy
    • String ID:
    • API String ID: 834479853-0
    • Opcode ID: a5821416040ee07c2aee2775c04b113f283301bd7503e62b4d74c7fb4b75c0b4
    • Instruction ID: dcbb08a1d3f9d9061a8f67daa468fe84dd54a5e3b547599a72407f3e7d30dc94
    • Opcode Fuzzy Hash: a5821416040ee07c2aee2775c04b113f283301bd7503e62b4d74c7fb4b75c0b4
    • Instruction Fuzzy Hash: 7F51B522E19ED2C1FA209B2595047B963A4FF58758F0596BDDAAC873D3DF3CA091C780
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: ErrorLast$DirectoryFreeHeapSystem
    • String ID:
    • API String ID: 696374338-0
    • Opcode ID: 6f1e48ae02e7c56fd37775aedc06950689497fdc8ef0be3575ca0c0c837f756f
    • Instruction ID: 23f9fc6ff323aa192204f3688e1f1d32adb72e53184d88a990b4c3172a51e2f0
    • Opcode Fuzzy Hash: 6f1e48ae02e7c56fd37775aedc06950689497fdc8ef0be3575ca0c0c837f756f
    • Instruction Fuzzy Hash: AF318116A486D2C1FB345A61845937A6280BF00B65F15427DEA7ED7ACACF7CE841C344
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID: U6
    • API String ID: 3298025750-3964119060
    • Opcode ID: 8d2fa64b969eaa990475b96f5440ef1618286f35dfd0f6c07492a1405a308adf
    • Instruction ID: e931272d23b5eae14f508e13256bbdea3d963f3e4a23930ce1552b8e2ff5f071
    • Opcode Fuzzy Hash: 8d2fa64b969eaa990475b96f5440ef1618286f35dfd0f6c07492a1405a308adf
    • Instruction Fuzzy Hash: 29310A32508BC1C0EB608F51E4483FA67A4FF88B84F04817ADA9D97A9ACF7CD091C744
    APIs
    • HeapFree.KERNEL32(?,?,00000000,00000000,00000000,00007FF68C94BF94), ref: 00007FF68C942ADD
    • HeapFree.KERNEL32(?,?,00000000,00000000,00000000,00007FF68C94BF94), ref: 00007FF68C942C01
    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000,00000000,00000000,00007FF68C94BF94), ref: 00007FF68C942C1E
    • HeapFree.KERNEL32(?,?,00000000,00000000,00000000,00007FF68C94BF94), ref: 00007FF68C942CA9
    • HeapFree.KERNEL32(?,?,00000000,00000000,00000000,00007FF68C94BF94), ref: 00007FF68C942CCB
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap$memcpy
    • String ID:
    • API String ID: 1887603139-0
    • Opcode ID: af2bdd6e8122c800f99326544e929ee6727fa896b07752b671ee12e7031306d2
    • Instruction ID: 9550d9695f7dedd8a6e42810e85e89fce2800e9f72a872b329a38be5980f6160
    • Opcode Fuzzy Hash: af2bdd6e8122c800f99326544e929ee6727fa896b07752b671ee12e7031306d2
    • Instruction Fuzzy Hash: 4551E512A18EC6C0EA218B1998047B95764FF967B4F559379EE7D962D2EF3CE481C300
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap$CloseHandlememcpy
    • String ID:
    • API String ID: 2532389815-0
    • Opcode ID: 809d676975b0920cbe60297eb4b30ed59231665c628e83d3c3e9f1b9eaa2a573
    • Instruction ID: 0902e8056595e251f58045d95d89f4a82a5b977a425850111106ac7d93b356c6
    • Opcode Fuzzy Hash: 809d676975b0920cbe60297eb4b30ed59231665c628e83d3c3e9f1b9eaa2a573
    • Instruction Fuzzy Hash: 25515C22A0CAC6C0EE21DB55E4403BDA361FF94B85F44807ADA8D93B9ADF3CD446C700
    APIs
    • TlsGetValue.KERNEL32(?,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,00000000,-00000008), ref: 00007FF68C9508F9
    • TlsGetValue.KERNEL32(?,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,00000000,-00000008), ref: 00007FF68C950931
    • TlsSetValue.KERNEL32(?,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,00000000,-00000008), ref: 00007FF68C950941
    • HeapFree.KERNEL32(?,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,00000000,-00000008), ref: 00007FF68C95096D
      • Part of subcall function 00007FF68C94FE90: HeapFree.KERNEL32(?,?,00000001,00007FF68C95173E,?,?,?,?,?), ref: 00007FF68C94FEB6
    • TlsGetValue.KERNEL32(-00000008,?,00000000,00007FF68C950192), ref: 00007FF68C950991
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Value$FreeHeap
    • String ID:
    • API String ID: 911738859-0
    • Opcode ID: 389c5f119a7f37e152ef57dae1ef26e2890b5f5958358c5235fe991c236ea3a3
    • Instruction ID: 2116a845bb6c8314427228366793cfdbf6bcda29186a8b752dc135641cad661d
    • Opcode Fuzzy Hash: 389c5f119a7f37e152ef57dae1ef26e2890b5f5958358c5235fe991c236ea3a3
    • Instruction Fuzzy Hash: DF11BEB2E0D5D2C1FE652B26A52177D5294BF85B81F0860FDDA5DC73CBDD6CA841C280
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: Value$FreeHeap
    • String ID:
    • API String ID: 911738859-0
    • Opcode ID: 1b4d6d9c542dc838a40c6e866a6cde91695e8afd33f488985f9d1d13d2fd6d9f
    • Instruction ID: 869e7bc4470eca959e985e9e4012d2b4999f52ff622679f81b143b4f95ea962c
    • Opcode Fuzzy Hash: 1b4d6d9c542dc838a40c6e866a6cde91695e8afd33f488985f9d1d13d2fd6d9f
    • Instruction Fuzzy Hash: FF11CE22F1C9D2C5FD656B2264117BD02947F89B80F0804FDD92DD73C7DD2CA882C280
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: memset$memcpy
    • String ID: FFFFFFFF
    • API String ID: 368790112-1347283565
    • Opcode ID: 66bb0766c79497e08940e15b097dba0dcaa17d9f29aa89d6a913e861e4bdf955
    • Instruction ID: 48ed8e4d54700da59b7524e66c8f8ee543b97b6c597c270618091bf098eab2e1
    • Opcode Fuzzy Hash: 66bb0766c79497e08940e15b097dba0dcaa17d9f29aa89d6a913e861e4bdf955
    • Instruction Fuzzy Hash: 39814422B1C6D2C2FE75CA7581043B96792BF457A4F466279D94E923C2CF3E9A41C204
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: ErrorLast$DirectorySystem
    • String ID:
    • API String ID: 860285823-0
    • Opcode ID: ea9b788d52612664f9088d34ffec071b64d5f209076e391ccc328b6bb5778006
    • Instruction ID: d1ab755615bd65bec07550c250d1420cf8e49dae203360f72cd442472e8804a2
    • Opcode Fuzzy Hash: ea9b788d52612664f9088d34ffec071b64d5f209076e391ccc328b6bb5778006
    • Instruction Fuzzy Hash: E0518A22A18AD1C1EB309B11E4443BE62A4FF407A1F01427ADAAEA7BDADF7CD441C744
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: ConsoleWrite$ByteCharErrorLastMultiWide
    • String ID:
    • API String ID: 3036337926-0
    • Opcode ID: 07c537da8811d70a022d6f154d311d44786e5e5512504200c64fb391a295c508
    • Instruction ID: 0e49b1d99f784b73b8f64cea8c81e44a36a8bfe7fe55d79ae6543a6640f02f53
    • Opcode Fuzzy Hash: 07c537da8811d70a022d6f154d311d44786e5e5512504200c64fb391a295c508
    • Instruction Fuzzy Hash: 1641DC62F081E2C6FE244651B4043BA5550BF44786F6460F9EA8ED3BCBDE7CE485C640
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: AddressValue$SingleWake$ErrorFreeHeapLastWait
    • String ID:
    • API String ID: 2675984105-0
    • Opcode ID: b38cdef6c2f7d106dc1ae0eb83e231e11ca37de4423362bc878a466cc47ec2c6
    • Instruction ID: 4bc7e0bea70a7c1008f3cc41904a48678fb090538518ee8e072147e9e29babba
    • Opcode Fuzzy Hash: b38cdef6c2f7d106dc1ae0eb83e231e11ca37de4423362bc878a466cc47ec2c6
    • Instruction Fuzzy Hash: 14416F2290CAC1C1EB61DB75A500BBEA790BF95798F049179EF8C86A97DF2CE0C5C741
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID: PATH$g5
    • API String ID: 3298025750-4158530234
    • Opcode ID: 26d314a44fd4dae24bbdcc30059c1fd47763102072f4676809573130bc0ef09a
    • Instruction ID: 7834e3a31591261a57bb92e96fd4d89be47790f92b9c1bc4656b6ff315896500
    • Opcode Fuzzy Hash: 26d314a44fd4dae24bbdcc30059c1fd47763102072f4676809573130bc0ef09a
    • Instruction Fuzzy Hash: 4B419C22A0CAC6C5EA309B50E4443FBA391FF85756F45807ADA8D97B9ACF3DE485C704
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap$Thread$CurrentDescription
    • String ID:
    • API String ID: 930939367-0
    • Opcode ID: 03c4c9017ea353290674e4955ed8cbc4ef4f50d0e68ce97cacc1b9bd90d63113
    • Instruction ID: a5ae30bc09538125feeec9b9ac119085b7b72255b2f966e1520e3155e8209b4a
    • Opcode Fuzzy Hash: 03c4c9017ea353290674e4955ed8cbc4ef4f50d0e68ce97cacc1b9bd90d63113
    • Instruction Fuzzy Hash: B6115122A0CAC6C1EE20DB16A5046B96361BF89BE4F444279DE5D87B9ADE2CE142C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: ErrorLast$FullNamePath
    • String ID:
    • API String ID: 2482867836-0
    • Opcode ID: 67e6fe3ae0aeeaeb24e89052fa6734204a564b7297581c4f1078b856a5f688f6
    • Instruction ID: 7baeb4cd9850feb398ed9ae3000b984f4db1dc1d48a71ee408b288b9bcf8a259
    • Opcode Fuzzy Hash: 67e6fe3ae0aeeaeb24e89052fa6734204a564b7297581c4f1078b856a5f688f6
    • Instruction Fuzzy Hash: F1012E52B0D6D6C5FF20587685087BA52847F01BE0F510679DA39E3EC3DE6CE400C309
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: ErrorLast$DirectoryWindows
    • String ID:
    • API String ID: 1506654308-0
    • Opcode ID: 88a4185f548dab2ad5cf16b63d8672d72048dae1b877773ca6e29c293c116a5d
    • Instruction ID: 666c858c32ec05b66ef4d68fd92669452726f187127bd7ad501166a285e44999
    • Opcode Fuzzy Hash: 88a4185f548dab2ad5cf16b63d8672d72048dae1b877773ca6e29c293c116a5d
    • Instruction Fuzzy Hash: 1A019E52B1C6D6C8FE60696995043B952893F00BE2F650679EA39E7AC3DE6DE402C340
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: ErrorLast$DirectorySystem
    • String ID:
    • API String ID: 860285823-0
    • Opcode ID: dd4c86467902ee9b8df7f3d06b4dd389ff0079c6ef2c5990c25acac0ac822cd0
    • Instruction ID: c5e6d8585f5602bdc8e93c6326857753680381171578af5df1208f5defecbf3f
    • Opcode Fuzzy Hash: dd4c86467902ee9b8df7f3d06b4dd389ff0079c6ef2c5990c25acac0ac822cd0
    • Instruction Fuzzy Hash: 7901BC12A0CAD685FE2069A599053B912843F01BF1F5607B9DA3EE7AC3DE6DE402C250
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: ErrorLast$DirectorySystem
    • String ID:
    • API String ID: 860285823-0
    • Opcode ID: d96709fa5ad1a7e2649e00c7be5a36b9731436211f8e646a09ef1ea265dab2f8
    • Instruction ID: 867de1a5c16a6dbc7c30c14f14c8a5d2a6ff4d5596a31fd362f27a3ee237327c
    • Opcode Fuzzy Hash: d96709fa5ad1a7e2649e00c7be5a36b9731436211f8e646a09ef1ea265dab2f8
    • Instruction Fuzzy Hash: 3C018012F189E6C2FE20683484053795244BF017B5F1642B8DA3DE7ECBDE6DE801C349
    APIs
    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,-0000026F,00000000,00007FF68C942DB7,00000000,00000000,00007FF68C94B4EB), ref: 00007FF68C94307F
    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,-0000026F,00000000,00007FF68C942DB7,00000000,00000000,00007FF68C94B4EB), ref: 00007FF68C943092
    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF68C9430DA
    • HeapFree.KERNEL32(00007FF68C942DB7,00000000,00000000,00007FF68C94B4EB), ref: 00007FF68C94327D
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: memcpy$FreeHeap
    • String ID:
    • API String ID: 4250714341-0
    • Opcode ID: f1174401a5010b7f4574f4d3f1384ce6f318dca5a5104f3d1d6713112bdb8c60
    • Instruction ID: b7c1754904ac0cce779281362e8969b28137c4535461c94da8c3cb35e949824a
    • Opcode Fuzzy Hash: f1174401a5010b7f4574f4d3f1384ce6f318dca5a5104f3d1d6713112bdb8c60
    • Instruction Fuzzy Hash: A481A022A19BC481E6218B19E8013EAB7A0FF99759F059325EFEC53795DF38D2D2C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID:
    • API String ID: 3298025750-0
    • Opcode ID: 6fdd41e4e85157a888c6b510b22fbf47570cef9d66cf2e5ce5d1061829f76096
    • Instruction ID: 2b86fdb232e0096edf6a8cc753810b60128c01c6837ee799d60752af22a602df
    • Opcode Fuzzy Hash: 6fdd41e4e85157a888c6b510b22fbf47570cef9d66cf2e5ce5d1061829f76096
    • Instruction Fuzzy Hash: 6E418326B09E86C2EA259B23A540B6A6364FF44B98F584479DF5D877C2DF3CE091C340
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID:
    • API String ID: 3298025750-0
    • Opcode ID: c725985f59428f0de4427d322dfb0947af3d541a8a41e62dc10622d450ee8d3d
    • Instruction ID: ec87b5ee8140f42711df68d8d90eb88f41ff7768442af0175457659f9a934abd
    • Opcode Fuzzy Hash: c725985f59428f0de4427d322dfb0947af3d541a8a41e62dc10622d450ee8d3d
    • Instruction Fuzzy Hash: 01417E22B0DA86C1ED64DA16A51427D5381BF89BD5F4444BEEE1E87797EE3CE142C340
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap$CloseHandle
    • String ID:
    • API String ID: 1910495013-0
    • Opcode ID: b5b75d0d2f4fcb7fa9033217e1989d5190c4d618f5041e978ca3aa4d5ffb238f
    • Instruction ID: bff7b8d5082f7deba9c536563838ab4211d3f2a25b7c429203504f21a4037e20
    • Opcode Fuzzy Hash: b5b75d0d2f4fcb7fa9033217e1989d5190c4d618f5041e978ca3aa4d5ffb238f
    • Instruction Fuzzy Hash: 1141565291E5C2C5FE278F05A1007BD1B50BF817A2F4490BADE5E967E2CE3CEA51D300
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2440288160.00007FF68C921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68C920000, based on PE: true
    • Associated: 00000000.00000002.2440259388.00007FF68C920000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440336856.00007FF68C97D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68C97E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68D37E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2440367853.00007FF68DD7E000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447426567.00007FF68E63E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447460167.00007FF68E63F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2447508453.00007FF68E642000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff68c920000_CSh#U0430rk F1 x.jbxd
    Similarity
    • API ID: FreeHeap$CloseHandle
    • String ID:
    • API String ID: 1910495013-0
    • Opcode ID: 5bcdc74ea95421b13a642897fdbf48fca400b8ae6d00bc05bfd1afe3d031dd2a
    • Instruction ID: b76fda206547cc562995bde667a44278b170563993a633dfb26fd8dc23759e3a
    • Opcode Fuzzy Hash: 5bcdc74ea95421b13a642897fdbf48fca400b8ae6d00bc05bfd1afe3d031dd2a
    • Instruction Fuzzy Hash: DE217E22A0CAC6C0EF21DF55E4003B9A3A5FF84B95F44807ADA4D97AA6DF7CD482C740