Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
fxc.exe

Overview

General Information

Sample name:fxc.exe
Analysis ID:1541091
MD5:0b1904602a90ed190066095f29a3f92a
SHA1:f0a25529b0d0aabce9d72ba46aaf1c78c5b48c31
SHA256:6e349195bdc65a1964367317ba14b905440d75398c3fbb1911c3400082d7f149
Tags:exeMDeployeruser-smica83
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
AV process strings found (often used to terminate AV products)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates files inside the system directory
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
One or more processes crash
PE file contains sections with non-standard names
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • fxc.exe (PID: 7312 cmdline: "C:\Users\user\Desktop\fxc.exe" MD5: 0B1904602A90ED190066095F29A3F92A)
    • WerFault.exe (PID: 7388 cmdline: C:\Windows\system32\WerFault.exe -u -p 7312 -s 232 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: fxc.exeAvira: detected
Source: fxc.exeReversingLabs: Detection: 52%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.0% probability
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC212410 BCryptGenRandom,GetCurrentProcessId,BCryptGenRandom,HeapFree,CreateNamedPipeW,GetLastError,BCryptGenRandom,BCryptGenRandom,HeapFree,HeapFree,HeapFree,HeapFree,CloseHandle,HeapFree,BCryptGenRandom,HeapFree,0_2_00007FF7BC212410
Source: fxc.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC2085E0 GetFileInformationByHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,FindFirstFileW,FindClose,HeapFree,0_2_00007FF7BC2085E0
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC21EF88 FindFirstFileExW,0_2_00007FF7BC21EF88
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC1F1D30 HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,NtReadFile,WaitForSingleObject,RtlNtStatusToDosError,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,CloseHandle,CloseHandle,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,CloseHandle,0_2_00007FF7BC1F1D30
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC200230 NtWriteFile,WaitForSingleObject,RtlNtStatusToDosError,0_2_00007FF7BC200230
Source: C:\Users\user\Desktop\fxc.exeFile created: C:\Windows\Debug\fail.txtJump to behavior
Source: C:\Users\user\Desktop\fxc.exeFile created: C:\Windows\Debug\stop.exeJump to behavior
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC1F1D300_2_00007FF7BC1F1D30
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC1F12D00_2_00007FF7BC1F12D0
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC201B100_2_00007FF7BC201B10
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC2094200_2_00007FF7BC209420
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC203D400_2_00007FF7BC203D40
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC1F75200_2_00007FF7BC1F7520
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC1FD5900_2_00007FF7BC1FD590
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC1F85900_2_00007FF7BC1F8590
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC1F6D900_2_00007FF7BC1F6D90
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC2265580_2_00007FF7BC226558
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC21D5F40_2_00007FF7BC21D5F4
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC211E400_2_00007FF7BC211E40
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC2046C00_2_00007FF7BC2046C0
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC21EF880_2_00007FF7BC21EF88
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC2007900_2_00007FF7BC200790
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC2097A00_2_00007FF7BC2097A0
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC202FE00_2_00007FF7BC202FE0
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC2158700_2_00007FF7BC215870
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC2112070_2_00007FF7BC211207
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC1FB1F00_2_00007FF7BC1FB1F0
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC210A200_2_00007FF7BC210A20
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC1F2B100_2_00007FF7BC1F2B10
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC1F43500_2_00007FF7BC1F4350
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC210BD00_2_00007FF7BC210BD0
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC2034000_2_00007FF7BC203400
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC2124100_2_00007FF7BC212410
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC2233FC0_2_00007FF7BC2233FC
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC20EC900_2_00007FF7BC20EC90
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC206C600_2_00007FF7BC206C60
Source: C:\Users\user\Desktop\fxc.exeCode function: String function: 00007FF7BC1F48E0 appears 81 times
Source: C:\Users\user\Desktop\fxc.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7312 -s 232
Source: classification engineClassification label: mal60.winEXE@3/7@0/0
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC201B10 GetModuleHandleW,FormatMessageW,GetLastError,HeapFree,HeapFree,0_2_00007FF7BC201B10
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7312
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\e17b0cfc-ae68-4569-b6fd-0a48457ca425Jump to behavior
Source: fxc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\fxc.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: fxc.exeReversingLabs: Detection: 52%
Source: unknownProcess created: C:\Users\user\Desktop\fxc.exe "C:\Users\user\Desktop\fxc.exe"
Source: C:\Users\user\Desktop\fxc.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7312 -s 232
Source: C:\Users\user\Desktop\fxc.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\fxc.exeSection loaded: cryptbase.dllJump to behavior
Source: fxc.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: fxc.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: fxc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC215870 SetLastError,GetCurrentDirectoryW,GetLastError,GetLastError,HeapFree,RtlCaptureContext,RtlLookupFunctionEntry,GetCurrentProcessId,CreateMutexA,CloseHandle,WaitForSingleObjectEx,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetCurrentProcess,GetProcAddress,ReleaseMutex,RtlVirtualUnwind,HeapFree,GetLastError,HeapFree,HeapFree,0_2_00007FF7BC215870
Source: fxc.exeStatic PE information: section name: _RDATA
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fxc.exeAPI coverage: 3.6 %
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC2085E0 GetFileInformationByHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,FindFirstFileW,FindClose,HeapFree,0_2_00007FF7BC2085E0
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC21EF88 FindFirstFileExW,0_2_00007FF7BC21EF88
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC21E54C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7BC21E54C
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC215870 SetLastError,GetCurrentDirectoryW,GetLastError,GetLastError,HeapFree,RtlCaptureContext,RtlLookupFunctionEntry,GetCurrentProcessId,CreateMutexA,CloseHandle,WaitForSingleObjectEx,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetCurrentProcess,GetProcAddress,ReleaseMutex,RtlVirtualUnwind,HeapFree,GetLastError,HeapFree,HeapFree,0_2_00007FF7BC215870
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC221F64 GetProcessHeap,0_2_00007FF7BC221F64
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC21E54C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7BC21E54C
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC218F70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7BC218F70
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC219118 SetUnhandledExceptionFilter,0_2_00007FF7BC219118
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC226ADC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7BC226ADC
Source: C:\Users\user\Desktop\fxc.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC2263A0 cpuid 0_2_00007FF7BC2263A0
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC212410 BCryptGenRandom,GetCurrentProcessId,BCryptGenRandom,HeapFree,CreateNamedPipeW,GetLastError,BCryptGenRandom,BCryptGenRandom,HeapFree,HeapFree,HeapFree,HeapFree,CloseHandle,HeapFree,BCryptGenRandom,HeapFree,0_2_00007FF7BC212410
Source: C:\Users\user\Desktop\fxc.exeCode function: 0_2_00007FF7BC218E4C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF7BC218E4C
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
2
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory31
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Process Injection
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
fxc.exe53%ReversingLabsWin64.Trojan.Generic
fxc.exe100%AviraTR/AVI.Agent.robcr
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.3.drfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1541091
Start date and time:2024-10-24 12:06:05 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 16s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:9
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:fxc.exe
Detection:MAL
Classification:mal60.winEXE@3/7@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 18
  • Number of non-executed functions: 73
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.42.73.29
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: fxc.exe
TimeTypeDescription
06:07:12API Interceptor1x Sleep call for process: WerFault.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\System32\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.6728573216818682
Encrypted:false
SSDEEP:96:6sFb+Ix67sYhqFy7qA8SKQXIDcQTc65cE1cw3u+HbHg/KHnOgrZAX/d5FMT2SlPB:z5x678/U0N9/Dj+zuiF/Z24lO8ID
MD5:3691DBE0C0CCD7C21D1906B1B48F6608
SHA1:6AE458A3EB2C13F909F3838734A189E8E7A83711
SHA-256:4AE7D1474B59ABCDCA2CDECC26C57B90B9742B706C6D95277B893FC2C0351A8E
SHA-512:36B0C7FFC3E71AA1638B68A310A941CB452AB53388B818981BF9A1D22E2324EF1E521C1DDF668995E8250F1E174C4B77013896A564D4FC9B69E3DA8276F51AC9
Malicious:true
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.2.3.8.0.1.7.5.4.5.7.1.4.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.2.3.8.0.1.7.8.5.8.2.2.0.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.b.4.7.2.4.b.5.-.c.8.6.e.-.4.7.1.1.-.b.2.9.0.-.a.9.b.5.b.2.b.0.e.c.6.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.c.b.1.8.6.2.7.-.5.5.b.9.-.4.5.4.c.-.b.b.2.7.-.b.9.5.c.f.9.8.b.3.a.9.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.f.x.c...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.9.0.-.0.0.0.1.-.0.0.1.4.-.a.d.3.0.-.6.c.7.5.f.c.2.5.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.c.8.b.7.d.6.1.e.2.d.4.d.0.a.f.d.c.b.6.a.d.c.f.5.c.8.b.2.2.c.2.d.0.0.0.0.f.f.f.f.!.0.0.0.0.f.0.a.2.5.5.2.9.b.0.d.0.a.a.b.c.e.9.d.7.2.b.a.4.6.a.a.f.1.c.7.8.c.5.b.4.8.c.3.1.!.f.x.c...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.7././.2.3.:.1.2.:.3.1.:.4.8.!.0.!.f.x.c...e.
Process:C:\Windows\System32\WerFault.exe
File Type:Mini DuMP crash report, 15 streams, Thu Oct 24 10:06:57 2024, 0x1205a4 type
Category:dropped
Size (bytes):45042
Entropy (8bit):1.405447527681338
Encrypted:false
SSDEEP:96:5w8EH/X74RvrEXi7V1Ii6l1lsUzTBiBgNBhuOWIqsIGKKAeT:REDOV1IhuUzUijXL
MD5:675533C5A57EE551BA29EFD019E4B910
SHA1:F22AB31832151DE70D41C9264595929A2426871F
SHA-256:559F5095C2EC35E87C0676A6109C136D08764FEAC2103F265F2AED9D739C9A57
SHA-512:A173BEBBA6783FBF0473EA3EE6981D66F0BAD9599B0E2E6513825CA8B70924546973FA43DE4D8234852C8BDD126701AA62DDE27C6854488B87A8753C5779F68C
Malicious:false
Reputation:low
Preview:MDMP..a..... .......A..g........................................h#..........`.......8...........T........... ..............P...........<...........................................................................................eJ..............Lw......................T...........@..g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8548
Entropy (8bit):3.6882233133926294
Encrypted:false
SSDEEP:192:R6l7wVeJTfwr8V6Y9RdLZIgmfDopDa89b8Dkf+0m:R6lXJLwr8V6YbPIgmfDW8gfk
MD5:F5AE93F79CE827BEB61C8E994328D5E6
SHA1:42A5AAC3A912BCAF36D6DF19CC771790BA5F25CB
SHA-256:0E33EE03DAAC5F2EA81A0F56897B66615E4887B788A769CAA004D86EF6EC8258
SHA-512:27C397DA9F17ECEEB70F1CE9B66CE17FBB91C276D371FF347931515E935700F4B3EC161C0F35335E9449C16EB6E02EBABCDF61CF90953E183497B34E06190C9F
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.3.1.2.<./.P.i.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4707
Entropy (8bit):4.412733950254919
Encrypted:false
SSDEEP:48:cvIwWl8zsFJg771I9HyzJWpW8VY6Ym8M4JNXVgFJ8yq8vfXVpuQreTd:uIjffI79s7VaJ28WvuoGd
MD5:561D5A71770CB8AFF8689E0E23AF95C9
SHA1:A647710A9981C58D1BCDB90D90D4B623E6083E73
SHA-256:81CC975015FF88FF1E7E4EBD13B3BA84660EBFBAC760BB0E9C2BF7AE5990F19A
SHA-512:853E04B7500445077BB4FDD8D09EAD56841A27B390244DD6E2D64FF566F808E64E84F13E9BD261961380B5EEF5A7FE75F0851348661C4EBE8E3B525F81748904
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="557349" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\System32\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.465446814406059
Encrypted:false
SSDEEP:6144:gIXfpi67eLPU9skLmb0b4eWSPKaJG8nAgejZMMhA2gX4WABl0uNMdwBCswSbkn:lXD94eWlLZMM6YFHq+kn
MD5:E2FC2FECDC61BD1707A31530694208C9
SHA1:C6415863386027A0ACE5552FB147731897E82B7B
SHA-256:F4E04A62E0F77566C5DC0D8E34BE43CD9BB57AC2181F7905E17BD7E37F147E6F
SHA-512:CC8364C8E000031CDAAFD784AAF47EC8875ECE8F266B078BFB1F5CD83ED900B34D7C94FEEBD17872EBB9AE595ED45FE5D6160FA8FE8FB4CDD66DA2F455105B76
Malicious:false
Reputation:low
Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmZ..u.%.................................................................................................................................................................................................................................................................................................................................................A........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\fxc.exe
File Type:ASCII text, with no line terminators
Category:dropped
Size (bytes):13
Entropy (8bit):3.238901256602631
Encrypted:false
SSDEEP:3:5bn:5b
MD5:B8E0C5361ACE0B62719F10962426B704
SHA1:9386FD982496B811D4FEAEB51631AC9C08E97F76
SHA-256:954297FEA35BC7CCC2C8E474E61EE24ED7248C625804B9FF8768EA15554C2773
SHA-512:41DC778B14295F97A435DD6BF142D1DFD63A5A17B7D519B9E92CFB9C4BBFCB50B0FFAAF6121E604FE996CA4CF0FE62FD8825EAFD222A10E2BE25D0DCDE6509B8
Malicious:false
Reputation:low
Preview:child is none
Process:C:\Users\user\Desktop\fxc.exe
File Type:ASCII text, with no line terminators
Category:dropped
Size (bytes):4
Entropy (8bit):2.0
Encrypted:false
SSDEEP:3:H:H
MD5:EF399B2D446BB37B7C32AD2CC1B6045B
SHA1:1B480158E1F30E0B6CEE7813E9ECF094BD6B3745
SHA-256:6C45CB72A36E63D522AA54ED8ADBD7A29A989474F2F77E0458AF8800564EF3CB
SHA-512:BF9C0733CA09AE29BAE7EFBFF03B69E87A5489CE610F19DA806F795847563F6055964E5AEC1771293067662402C8613BEB0F498E77E20820587E133B16F73CF5
Malicious:false
Reputation:low
Preview:stop
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):6.299817634972105
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:fxc.exe
File size:324'608 bytes
MD5:0b1904602a90ed190066095f29a3f92a
SHA1:f0a25529b0d0aabce9d72ba46aaf1c78c5b48c31
SHA256:6e349195bdc65a1964367317ba14b905440d75398c3fbb1911c3400082d7f149
SHA512:d18058b6b1a045d8544db79940ca5500843a71d3541c012b01d0a70648d0b210113b1715b608c3866d61f41db521109b7084a109a279dc306aed4544ffd17b54
SSDEEP:6144:6BrFsAPhVdTPrOi4OU4Ym0D+slljJbJ3pvTVFIh:6BrFBEF3mEBvr
TLSH:99645D15FB9618FDD5ABC074C6468A72B933B8860B21BDEF12A441353F276E46E3DB10
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......E..0...c...c...cJ..b...cJ..b...cJ..b...c...b(..c...b...c...b...c...c...c...c...c9k.b...cRich...c................PE..d......f...
Icon Hash:90cececece8e8eb0
Entrypoint:0x140028b50
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x669FA2B4 [Tue Jul 23 12:31:48 2024 UTC]
TLS Callbacks:0x4000e530, 0x1
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:e56ef045fa5f5c9fae11e44b0b3dd79a
Instruction
dec eax
sub esp, 28h
call 00007F74C4B9CDC8h
dec eax
add esp, 28h
jmp 00007F74C4B9C947h
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
nop word ptr [eax+eax+00000000h]
dec eax
sub esp, 10h
dec esp
mov dword ptr [esp], edx
dec esp
mov dword ptr [esp+08h], ebx
dec ebp
xor ebx, ebx
dec esp
lea edx, dword ptr [esp+18h]
dec esp
sub edx, eax
dec ebp
cmovb edx, ebx
dec esp
mov ebx, dword ptr [00000010h]
dec ebp
cmp edx, ebx
jnc 00007F74C4B9CAE8h
inc cx
and edx, 8D4DF000h
wait
add al, dh
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x4bb040x64.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x4f0000x24cc.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x530000x9c8.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x46a900x1c.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x46b000x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x469500x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x390000x3d8.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x377200x37800a02ec713fbe9974812e412b84ffebaadFalse0.5355917440878378data6.3992226630856495IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x390000x1389a0x13a0013b8deb7020ad1349aeef6eb5d67cc1fFalse0.39951980493630573data5.309728177527535IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x4d0000x1dd80xc00217dde2fe845fd603a329ab7852c64e6False0.14485677083333334data2.0102799590686815IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x4f0000x24cc0x2600ab62c9ecd85cc5c7443fed8a745a001fFalse0.4862253289473684data5.453329444307597IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
_RDATA0x520000x15c0x2005556100c66644b92472d605a319cfb77False0.40625data3.2977765662674985IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x530000x9c80xa008233352803a1d795b1a18ffe13667efbFalse0.5890625data5.39691148505322IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
DLLImport
kernel32.dllCreateWaitableTimerExW, SetWaitableTimer, WaitForSingleObject, CloseHandle, Sleep, GetExitCodeProcess, HeapReAlloc, GetModuleHandleA, GetProcAddress, GetCurrentThread, TryAcquireSRWLockExclusive, ReleaseSRWLockExclusive, GetStdHandle, GetConsoleMode, SetFilePointerEx, MultiByteToWideChar, WriteConsoleW, SetLastError, GetModuleHandleW, FormatMessageW, GetCurrentProcess, GetEnvironmentVariableW, CreateFileW, SetFileInformationByHandle, GetFullPathNameW, GetFileInformationByHandle, GetFileInformationByHandleEx, FindFirstFileW, FindClose, GetEnvironmentStringsW, HeapFree, CompareStringOrdinal, GetModuleFileNameW, GetSystemDirectoryW, AcquireSRWLockExclusive, GetWindowsDirectoryW, CreateProcessW, GetFileAttributesW, DuplicateHandle, CreateThread, InitializeProcThreadAttributeList, UpdateProcThreadAttribute, DeleteProcThreadAttributeList, GetLastError, GetCurrentProcessId, CreateNamedPipeW, ReadFileEx, SleepEx, WriteFileEx, SetThreadStackGuarantee, TerminateProcess, GetProcessHeap, HeapAlloc, GetCurrentDirectoryW, RtlCaptureContext, RtlLookupFunctionEntry, CreateMutexA, WaitForSingleObjectEx, LoadLibraryA, ReleaseMutex, RtlVirtualUnwind, AcquireSRWLockShared, ReleaseSRWLockShared, DeleteFileW, GetConsoleOutputCP, FreeEnvironmentStringsW, AddVectoredExceptionHandler, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, IsProcessorFeaturePresent, RtlUnwindEx, EncodePointer, RaiseException, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, RtlPcToFileHeader, WriteFile, ExitProcess, GetModuleHandleExW, GetCommandLineA, GetCommandLineW, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, WideCharToMultiByte, SetEnvironmentVariableW, SetStdHandle, GetFileType, GetStringTypeW, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, CompareStringW, LCMapStringW, HeapSize, FlushFileBuffers
ntdll.dllRtlNtStatusToDosError, NtReadFile, NtWriteFile
bcrypt.dllBCryptGenRandom
advapi32.dllSystemFunction036
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:06:06:56
Start date:24/10/2024
Path:C:\Users\user\Desktop\fxc.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\fxc.exe"
Imagebase:0x7ff7bc1f0000
File size:324'608 bytes
MD5 hash:0B1904602A90ED190066095F29A3F92A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:3
Start time:06:06:57
Start date:24/10/2024
Path:C:\Windows\System32\WerFault.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\WerFault.exe -u -p 7312 -s 232
Imagebase:0x7ff6e4b30000
File size:570'736 bytes
MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:2.1%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:64.3%
    Total number of Nodes:759
    Total number of Limit Nodes:10
    execution_graph 21254 7ff7bc2189d4 21275 7ff7bc218c38 21254->21275 21257 7ff7bc218b2b 21322 7ff7bc218f70 7 API calls __FrameHandler3::FrameUnwindToEmptyState 21257->21322 21258 7ff7bc2189f5 __scrt_acquire_startup_lock 21260 7ff7bc218b35 21258->21260 21266 7ff7bc218a13 __scrt_release_startup_lock 21258->21266 21323 7ff7bc218f70 7 API calls __FrameHandler3::FrameUnwindToEmptyState 21260->21323 21262 7ff7bc218a38 21263 7ff7bc218b40 __FrameHandler3::FrameUnwindToEmptyState 21264 7ff7bc218abe 21281 7ff7bc21cfb8 21264->21281 21266->21262 21266->21264 21319 7ff7bc21d364 47 API calls 21266->21319 21268 7ff7bc218ac3 21287 7ff7bc1f1010 AddVectoredExceptionHandler 21268->21287 21270 7ff7bc218ae0 21320 7ff7bc2190c4 GetModuleHandleW 21270->21320 21273 7ff7bc218ae7 21273->21263 21321 7ff7bc218dcc 7 API calls __scrt_initialize_crt 21273->21321 21274 7ff7bc218afe 21274->21262 21324 7ff7bc219204 21275->21324 21278 7ff7bc2189ed 21278->21257 21278->21258 21279 7ff7bc218c67 __scrt_initialize_crt 21279->21278 21326 7ff7bc21a6e8 7 API calls 2 library calls 21279->21326 21282 7ff7bc21cfc8 21281->21282 21285 7ff7bc21cfdd 21281->21285 21282->21285 21327 7ff7bc21cc58 70 API calls __free_lconv_mon 21282->21327 21284 7ff7bc21cfe6 21284->21285 21328 7ff7bc21ce20 12 API calls 2 library calls 21284->21328 21285->21268 21288 7ff7bc1f1041 SetThreadStackGuarantee 21287->21288 21289 7ff7bc1f118b 21287->21289 21291 7ff7bc1f1065 21288->21291 21292 7ff7bc1f1056 GetLastError 21288->21292 21366 7ff7bc226fe0 106 API calls 21289->21366 21329 7ff7bc1fe830 21291->21329 21292->21291 21294 7ff7bc1f11ec 21292->21294 21293 7ff7bc1f1186 21298 7ff7bc1f1255 21293->21298 21370 7ff7bc200ed0 HeapFree 21293->21370 21369 7ff7bc226fe0 106 API calls 21294->21369 21298->21270 21302 7ff7bc1f11c2 21367 7ff7bc226f10 106 API calls 21302->21367 21303 7ff7bc1f1092 21305 7ff7bc215820 2 API calls 21303->21305 21306 7ff7bc1f10cc 21305->21306 21307 7ff7bc1f11d3 21306->21307 21308 7ff7bc1f10d8 21306->21308 21368 7ff7bc226f10 106 API calls 21307->21368 21310 7ff7bc1f1179 21308->21310 21311 7ff7bc1f1113 21308->21311 21365 7ff7bc227fd0 106 API calls 21310->21365 21343 7ff7bc1fe9d0 21311->21343 21314 7ff7bc1f1123 21361 7ff7bc1f1000 21314->21361 21317 7ff7bc1f116d 21317->21270 21319->21264 21320->21273 21321->21274 21322->21260 21323->21263 21325 7ff7bc218c5a __scrt_dllmain_crt_thread_attach 21324->21325 21325->21278 21325->21279 21326->21278 21327->21284 21328->21285 21330 7ff7bc1fe84a 21329->21330 21337 7ff7bc1f1076 21330->21337 21371 7ff7bc200f00 21330->21371 21332 7ff7bc1fe866 21333 7ff7bc1fe886 GetCurrentThread SetThreadDescription 21332->21333 21334 7ff7bc1fe87a 21332->21334 21335 7ff7bc1fe8a6 HeapFree 21333->21335 21333->21337 21391 7ff7bc1fe8c0 HeapFree HeapFree 21334->21391 21335->21337 21338 7ff7bc215820 21337->21338 21339 7ff7bc215837 GetProcessHeap 21338->21339 21340 7ff7bc21584c HeapAlloc 21338->21340 21341 7ff7bc1f1089 21339->21341 21342 7ff7bc215842 21339->21342 21340->21341 21341->21302 21341->21303 21342->21340 21344 7ff7bc1fea3d 21343->21344 21345 7ff7bc1fea07 21343->21345 21348 7ff7bc1fea78 21344->21348 21397 7ff7bc1f4c50 21344->21397 21346 7ff7bc1fea13 21345->21346 21347 7ff7bc1feb07 21345->21347 21396 7ff7bc1fee40 106 API calls 21346->21396 21349 7ff7bc1feb1a 21347->21349 21401 7ff7bc1fefb0 HeapFree HeapFree 21347->21401 21348->21314 21402 7ff7bc227470 106 API calls 21349->21402 21355 7ff7bc1feaf7 21404 7ff7bc1fe8c0 HeapFree HeapFree 21355->21404 21358 7ff7bc1feb5e 21359 7ff7bc1feb91 21358->21359 21405 7ff7bc1fe8c0 HeapFree HeapFree 21358->21405 21359->21314 21457 7ff7bc1f12d0 21361->21457 21364 7ff7bc227700 108 API calls 21364->21317 21367->21293 21368->21293 21370->21298 21372 7ff7bc200f2f 21371->21372 21373 7ff7bc200f5a 21371->21373 21374 7ff7bc20106e 21372->21374 21375 7ff7bc200f3c 21372->21375 21392 7ff7bc201140 106 API calls 21373->21392 21394 7ff7bc1f3a10 106 API calls 21374->21394 21377 7ff7bc215820 2 API calls 21375->21377 21380 7ff7bc200f51 21377->21380 21379 7ff7bc201073 21395 7ff7bc226f10 106 API calls 21379->21395 21380->21373 21380->21379 21382 7ff7bc201080 21386 7ff7bc2010bf 21382->21386 21387 7ff7bc2010ac HeapFree 21382->21387 21383 7ff7bc200f88 21384 7ff7bc201031 21383->21384 21385 7ff7bc201001 21383->21385 21388 7ff7bc201040 21384->21388 21393 7ff7bc2012d0 106 API calls 21384->21393 21385->21388 21389 7ff7bc201020 HeapFree 21385->21389 21386->21332 21387->21386 21388->21332 21389->21388 21391->21337 21392->21383 21393->21388 21395->21382 21396->21344 21398 7ff7bc1f4dab 21397->21398 21399 7ff7bc1f4c9a 21397->21399 21398->21399 21406 7ff7bc201611 21398->21406 21399->21355 21403 7ff7bc1fe8c0 HeapFree HeapFree 21399->21403 21401->21349 21403->21355 21404->21358 21405->21359 21407 7ff7bc201630 21406->21407 21412 7ff7bc201b10 21407->21412 21409 7ff7bc2016a3 21410 7ff7bc20172f 21409->21410 21411 7ff7bc20177b HeapFree 21409->21411 21410->21398 21411->21410 21413 7ff7bc201b26 __FrameHandler3::FrameUnwindToEmptyState 21412->21413 21414 7ff7bc201b6c GetModuleHandleW 21413->21414 21415 7ff7bc201b98 FormatMessageW 21413->21415 21416 7ff7bc201b7e 21414->21416 21417 7ff7bc201e9c GetLastError 21415->21417 21418 7ff7bc201bc8 21415->21418 21416->21415 21437 7ff7bc1f3b90 21417->21437 21419 7ff7bc201e7c 21418->21419 21422 7ff7bc215820 2 API calls 21418->21422 21432 7ff7bc201f29 21419->21432 21452 7ff7bc227120 106 API calls 21419->21452 21435 7ff7bc201bed 21422->21435 21423 7ff7bc20217a 21453 7ff7bc226f10 106 API calls 21423->21453 21425 7ff7bc202187 21427 7ff7bc2021b6 HeapFree 21425->21427 21428 7ff7bc2021cc 21425->21428 21426 7ff7bc201c32 21426->21419 21430 7ff7bc201f60 21426->21430 21427->21428 21428->21409 21429 7ff7bc201f40 21429->21430 21433 7ff7bc201f4a HeapFree 21429->21433 21431 7ff7bc1f3b90 101 API calls 21430->21431 21431->21432 21432->21409 21433->21430 21435->21423 21435->21426 21435->21429 21436 7ff7bc1f3ae0 106 API calls 21435->21436 21436->21435 21438 7ff7bc1f3c7d 21437->21438 21444 7ff7bc1f3bb8 21437->21444 21439 7ff7bc1f4c50 105 API calls 21438->21439 21440 7ff7bc1f3ca7 21439->21440 21441 7ff7bc1f3cab 21440->21441 21455 7ff7bc227470 106 API calls 21440->21455 21441->21432 21443 7ff7bc1f3ceb 21456 7ff7bc1f3a10 106 API calls 21443->21456 21444->21438 21444->21443 21446 7ff7bc215820 2 API calls 21444->21446 21447 7ff7bc1f3c6b 21446->21447 21447->21438 21454 7ff7bc226f10 106 API calls 21447->21454 21453->21425 21454->21438 21458 7ff7bc1f12e7 21457->21458 21574 7ff7bc1f1d30 21458->21574 21460 7ff7bc1f137b 21461 7ff7bc1f1384 21460->21461 21667 7ff7bc1f2920 21460->21667 21463 7ff7bc215820 2 API calls 21461->21463 21464 7ff7bc1f1397 21463->21464 21465 7ff7bc1f13a0 21464->21465 21466 7ff7bc1f1abe 21464->21466 21688 7ff7bc2097a0 21465->21688 22014 7ff7bc226f10 106 API calls 21466->22014 21469 7ff7bc1f1acd 21471 7ff7bc1f3b90 106 API calls 21469->21471 21470 7ff7bc1f14ae 21470->21469 21472 7ff7bc1f14c2 21470->21472 21473 7ff7bc1f1b29 21471->21473 21474 7ff7bc1f2b10 18 API calls 21472->21474 21972 7ff7bc2073f0 21473->21972 21476 7ff7bc1f150e CreateWaitableTimerExW 21474->21476 21478 7ff7bc1f158d Sleep 21476->21478 21479 7ff7bc1f1529 SetWaitableTimer 21476->21479 21482 7ff7bc1f1598 WaitForSingleObject 21478->21482 21480 7ff7bc1f1584 CloseHandle 21479->21480 21481 7ff7bc1f1564 WaitForSingleObject CloseHandle 21479->21481 21480->21478 21481->21482 21484 7ff7bc1f1582 21481->21484 21485 7ff7bc1f15b7 GetExitCodeProcess 21482->21485 21486 7ff7bc1f15a7 21482->21486 21483 7ff7bc1f1b52 HeapFree 21514 7ff7bc1f1b64 21483->21514 21484->21478 21489 7ff7bc1f16f2 GetLastError 21485->21489 21490 7ff7bc1f15db 21485->21490 21487 7ff7bc1f19a6 21486->21487 21486->21489 21494 7ff7bc1f1d30 165 API calls 21487->21494 21488 7ff7bc1f1c26 21982 7ff7bc1f2b10 21488->21982 21492 7ff7bc1f3b90 106 API calls 21489->21492 21493 7ff7bc1f3b90 106 API calls 21490->21493 21497 7ff7bc1f176b 21492->21497 21498 7ff7bc1f164c 21493->21498 21495 7ff7bc1f19be 21494->21495 21499 7ff7bc1f19c2 21495->21499 21500 7ff7bc1f19da 21495->21500 21503 7ff7bc2073f0 130 API calls 21497->21503 21504 7ff7bc2073f0 130 API calls 21498->21504 22009 7ff7bc1f3340 375 API calls 21499->22009 21508 7ff7bc1f2920 142 API calls 21500->21508 21501 7ff7bc215820 2 API calls 21507 7ff7bc1f1c46 21501->21507 21502 7ff7bc1f1bc6 21502->21488 21509 7ff7bc1f1c14 HeapFree 21502->21509 21517 7ff7bc1f1c02 HeapFree 21502->21517 21510 7ff7bc1f178f 21503->21510 21511 7ff7bc1f1670 21504->21511 21506 7ff7bc1f1bb4 HeapFree 21506->21502 21515 7ff7bc1f1c69 21507->21515 22015 7ff7bc226f10 106 API calls 21507->22015 21516 7ff7bc1f19df 21508->21516 21509->21488 21518 7ff7bc1f179d HeapFree 21510->21518 21547 7ff7bc1f17af 21510->21547 21519 7ff7bc1f167e HeapFree 21511->21519 21539 7ff7bc1f1690 21511->21539 21512 7ff7bc1f19c7 21520 7ff7bc1f19cb 21512->21520 21521 7ff7bc1f19e8 21512->21521 21513 7ff7bc1f1ba2 HeapFree 21513->21506 21514->21502 21514->21506 21514->21513 21523 7ff7bc2073f0 130 API calls 21515->21523 22011 7ff7bc1f3340 375 API calls 21516->22011 21517->21509 21518->21547 21519->21539 22010 7ff7bc215780 7 API calls 21520->22010 22012 7ff7bc1f3340 375 API calls 21521->22012 21529 7ff7bc1f1ca1 HeapFree 21523->21529 21525 7ff7bc1f1875 22008 7ff7bc215780 7 API calls 21525->22008 21528 7ff7bc1f1c5a 22016 7ff7bc226f10 106 API calls 21528->22016 21532 7ff7bc1f1d18 21529->21532 21550 7ff7bc1f1cbb 21529->21550 21536 7ff7bc1f2920 142 API calls 21532->21536 21533 7ff7bc1f19ed 22013 7ff7bc215780 7 API calls 21533->22013 21535 7ff7bc1f18e0 21540 7ff7bc215820 2 API calls 21535->21540 21538 7ff7bc1f1d1d 21536->21538 21537 7ff7bc1f19d8 21543 7ff7bc1f2920 142 API calls 21537->21543 21539->21525 21542 7ff7bc1f1863 HeapFree 21539->21542 21548 7ff7bc1f16dd HeapFree 21539->21548 21544 7ff7bc1f18f3 21540->21544 21541 7ff7bc1f1802 HeapFree 21541->21539 21542->21525 21549 7ff7bc1f1a5d CloseHandle CloseHandle 21543->21549 21544->21528 21545 7ff7bc1f18fc 21544->21545 21552 7ff7bc2073f0 130 API calls 21545->21552 21546 7ff7bc1f17f0 HeapFree 21546->21541 21547->21539 21547->21541 21547->21546 21548->21542 21555 7ff7bc1f1a75 CloseHandle 21549->21555 21556 7ff7bc1f1a83 21549->21556 21550->21532 21551 7ff7bc1f1d06 HeapFree 21550->21551 21559 7ff7bc1f1cf4 HeapFree 21550->21559 21551->21532 21560 7ff7bc1f1927 HeapFree 21552->21560 21553 7ff7bc1f19fa 21553->21537 21561 7ff7bc1f1a46 HeapFree 21553->21561 21566 7ff7bc1f1a34 HeapFree 21553->21566 21567 7ff7bc1f19d3 21553->21567 21555->21556 21557 7ff7bc1f1a96 21556->21557 21558 7ff7bc1f1a88 CloseHandle 21556->21558 21563 7ff7bc1f1a9b CloseHandle 21557->21563 21564 7ff7bc1f1006 21557->21564 21558->21557 21559->21551 21565 7ff7bc1f19a1 21560->21565 21571 7ff7bc1f1941 21560->21571 21561->21537 21562 7ff7bc1f18ce HeapFree 21562->21535 21563->21564 21564->21317 21564->21364 21570 7ff7bc1f2920 142 API calls 21565->21570 21566->21561 21567->21537 21567->21553 21567->21566 21568 7ff7bc1f18bc HeapFree 21568->21562 21569 7ff7bc1f187d 21569->21535 21569->21562 21569->21568 21570->21487 21571->21565 21572 7ff7bc1f198f HeapFree 21571->21572 21573 7ff7bc1f197d HeapFree 21571->21573 21572->21565 21573->21572 22017 7ff7bc2085e0 21574->22017 21576 7ff7bc1f1fbe 22044 7ff7bc206a00 21576->22044 21577 7ff7bc1f1ddd 21580 7ff7bc1f3b90 106 API calls 21577->21580 21578 7ff7bc1f2856 22061 7ff7bc1f3a10 106 API calls 21578->22061 21581 7ff7bc1f1e99 21580->21581 21586 7ff7bc2073f0 130 API calls 21581->21586 21582 7ff7bc215820 2 API calls 21595 7ff7bc1f1ddf 21582->21595 21585 7ff7bc2085e0 132 API calls 21589 7ff7bc1f1dc8 21585->21589 21590 7ff7bc1f1eb5 21586->21590 21587 7ff7bc1f285b 22062 7ff7bc1ff410 106 API calls 21587->22062 21594 7ff7bc1f1dd1 21589->21594 21589->21595 21596 7ff7bc1f1ebf HeapFree 21590->21596 21628 7ff7bc1f1ed1 21590->21628 21592 7ff7bc1f219f NtReadFile 21597 7ff7bc1f21e1 WaitForSingleObject 21592->21597 21598 7ff7bc1f21f2 21592->21598 21593 7ff7bc1f201c 21601 7ff7bc1f3b90 106 API calls 21593->21601 22041 7ff7bc1fe8c0 HeapFree HeapFree 21594->22041 21595->21576 21595->21577 21595->21578 21595->21582 22042 7ff7bc226f10 106 API calls 21595->22042 22043 7ff7bc1fe8c0 HeapFree HeapFree 21595->22043 21596->21628 21597->21598 21598->21587 21608 7ff7bc1f2219 21598->21608 21626 7ff7bc1f225d __FrameHandler3::FrameUnwindToEmptyState 21598->21626 21600 7ff7bc1f28b0 22063 7ff7bc1fe8c0 HeapFree HeapFree 21600->22063 21603 7ff7bc1f207e 21601->21603 21606 7ff7bc2073f0 130 API calls 21603->21606 21605 7ff7bc1f28c3 22064 7ff7bc1fe8c0 HeapFree HeapFree 21605->22064 21611 7ff7bc1f209a 21606->21611 21612 7ff7bc1f221d RtlNtStatusToDosError 21608->21612 21608->21626 21609 7ff7bc1f2837 21609->21460 21614 7ff7bc1f20a4 HeapFree 21611->21614 21644 7ff7bc1f20b6 21611->21644 21615 7ff7bc1f2249 21612->21615 21613 7ff7bc1f28fd 21613->21460 21614->21644 21617 7ff7bc1f2251 21615->21617 21618 7ff7bc1f26bf 21615->21618 21616 7ff7bc1f1f33 21616->21609 21619 7ff7bc1f1f8b HeapFree 21616->21619 21624 7ff7bc1f1f79 HeapFree 21616->21624 22060 7ff7bc1fe8c0 HeapFree HeapFree 21617->22060 21622 7ff7bc1f3b90 106 API calls 21618->21622 21619->21609 21620 7ff7bc1f1f21 HeapFree 21620->21616 21621 7ff7bc1f217d 21621->21609 21625 7ff7bc1f2186 HeapFree 21621->21625 21629 7ff7bc1f2722 21622->21629 21624->21619 21625->21609 21630 7ff7bc1f24e6 21626->21630 21631 7ff7bc1f2423 21626->21631 21627 7ff7bc1f1f0f HeapFree 21627->21620 21628->21616 21628->21620 21628->21627 21633 7ff7bc2073f0 130 API calls 21629->21633 21632 7ff7bc206a00 125 API calls 21630->21632 21645 7ff7bc2073f0 130 API calls 21631->21645 21635 7ff7bc1f2533 21632->21635 21636 7ff7bc1f273e 21633->21636 21634 7ff7bc1f211a 21634->21621 21637 7ff7bc1f216b HeapFree 21634->21637 21642 7ff7bc1f2159 HeapFree 21634->21642 21639 7ff7bc1f2546 21635->21639 21640 7ff7bc1f26b1 CloseHandle 21635->21640 21641 7ff7bc1f2748 HeapFree 21636->21641 21659 7ff7bc1f275a 21636->21659 21637->21621 21638 7ff7bc1f2108 HeapFree 21638->21634 21646 7ff7bc1f3b90 106 API calls 21639->21646 21648 7ff7bc1f26a3 CloseHandle 21640->21648 21641->21659 21642->21637 21643 7ff7bc1f20f6 HeapFree 21643->21638 21644->21634 21644->21638 21644->21643 21647 7ff7bc1f24c4 HeapFree 21645->21647 21650 7ff7bc1f25a4 21646->21650 21647->21639 21651 7ff7bc1f24de 21647->21651 21648->21609 21649 7ff7bc1f2825 CloseHandle 21649->21609 21649->21625 21652 7ff7bc2073f0 130 API calls 21650->21652 21651->21648 21653 7ff7bc1f25c0 21652->21653 21655 7ff7bc1f25ca HeapFree 21653->21655 21664 7ff7bc1f25dc 21653->21664 21654 7ff7bc1f27bf 21654->21649 21656 7ff7bc1f2813 HeapFree 21654->21656 21658 7ff7bc1f2801 HeapFree 21654->21658 21655->21664 21656->21649 21657 7ff7bc1f27ad HeapFree 21657->21654 21658->21656 21659->21654 21659->21657 21660 7ff7bc1f279b HeapFree 21659->21660 21660->21657 21661 7ff7bc1f263e 21661->21651 21662 7ff7bc1f268f HeapFree 21661->21662 21666 7ff7bc1f267d HeapFree 21661->21666 21662->21651 21663 7ff7bc1f262c HeapFree 21663->21661 21664->21661 21664->21663 21665 7ff7bc1f261a HeapFree 21664->21665 21665->21663 21666->21662 22119 7ff7bc2187e0 21667->22119 21669 7ff7bc1f299a 21670 7ff7bc2187e0 121 API calls 21669->21670 21674 7ff7bc1f29ab 21670->21674 21671 7ff7bc1f2a0d 21672 7ff7bc2187e0 121 API calls 21671->21672 21673 7ff7bc1f2a1e 21672->21673 21678 7ff7bc1f2a80 21673->21678 21683 7ff7bc1f2a6e HeapFree 21673->21683 21684 7ff7bc1f2a5c HeapFree 21673->21684 21674->21671 21680 7ff7bc1f29fb HeapFree 21674->21680 21681 7ff7bc1f29e9 HeapFree 21674->21681 21675 7ff7bc1f2988 HeapFree 21675->21669 21676 7ff7bc1f2976 HeapFree 21676->21675 21679 7ff7bc2073f0 130 API calls 21678->21679 21685 7ff7bc1f2a9e 21679->21685 21680->21671 21681->21680 21682 7ff7bc1f2ab7 21682->21461 21683->21678 21684->21683 21685->21682 21686 7ff7bc1f2af6 HeapFree 21685->21686 21687 7ff7bc1f2ae4 HeapFree 21685->21687 21687->21686 21689 7ff7bc2097f5 21688->21689 21690 7ff7bc209835 GetEnvironmentStringsW 21689->21690 21715 7ff7bc2097fa 21689->21715 21757 7ff7bc209a4d 21689->21757 21691 7ff7bc20d4ba GetLastError 21690->21691 21741 7ff7bc209844 21690->21741 22196 7ff7bc226fe0 106 API calls 21691->22196 21692 7ff7bc20a293 21695 7ff7bc215820 2 API calls 21692->21695 21694 7ff7bc209a36 FreeEnvironmentStringsW 21694->21757 21697 7ff7bc20a2cd 21695->21697 21696 7ff7bc20d60d CloseHandle 21696->21470 21698 7ff7bc20d465 21697->21698 21699 7ff7bc20a2d6 21697->21699 22195 7ff7bc226f10 106 API calls 21698->22195 22134 7ff7bc20ea60 107 API calls 21699->22134 21701 7ff7bc20a7ad 21812 7ff7bc20a829 21701->21812 22138 7ff7bc20e990 255 API calls 21701->22138 21703 7ff7bc20d3f8 22192 7ff7bc227020 106 API calls 21703->22192 21704 7ff7bc20a83f 21704->21470 21705 7ff7bc20a835 CloseHandle 21705->21704 21709 7ff7bc20d3ee 22191 7ff7bc1f3a10 106 API calls 21709->22191 21711 7ff7bc20d410 22193 7ff7bc227120 106 API calls 21711->22193 21712 7ff7bc20a44f HeapFree 21712->21715 21713 7ff7bc215820 GetProcessHeap HeapAlloc 21713->21757 21715->21701 21719 7ff7bc20a586 21715->21719 21753 7ff7bc20a5d9 21715->21753 21717 7ff7bc20a3a5 CompareStringOrdinal 21724 7ff7bc20a314 21717->21724 21718 7ff7bc202fe0 107 API calls 21718->21741 21721 7ff7bc20a6b3 21719->21721 21722 7ff7bc20a595 21719->21722 21720 7ff7bc209cf9 22190 7ff7bc226f10 106 API calls 21720->22190 21726 7ff7bc20d54b 21721->21726 21727 7ff7bc20a6bc 21721->21727 21730 7ff7bc200f00 108 API calls 21722->21730 21723 7ff7bc20a40c 21732 7ff7bc20d2ff GetLastError 21723->21732 21733 7ff7bc20a415 HeapFree 21723->21733 21724->21717 21724->21723 21724->21733 21742 7ff7bc20a5c6 21724->21742 21725 7ff7bc20d42a 22194 7ff7bc227020 106 API calls 21725->22194 22197 7ff7bc1f3a10 106 API calls 21726->22197 21736 7ff7bc215820 2 API calls 21727->21736 21728 7ff7bc20d3a8 22187 7ff7bc1f3a10 106 API calls 21728->22187 21729 7ff7bc210500 111 API calls 21729->21757 21737 7ff7bc20a5ab 21730->21737 22185 7ff7bc226fe0 106 API calls 21732->22185 21733->21712 21733->21715 21740 7ff7bc20a6cd 21736->21740 21737->21742 22139 7ff7bc210a20 135 API calls 21737->22139 21744 7ff7bc20d55c 21740->21744 21745 7ff7bc20a6d6 21740->21745 21741->21694 21741->21703 21741->21711 21741->21718 21741->21725 21768 7ff7bc209a1b HeapFree 21741->21768 22130 7ff7bc20ea60 107 API calls 21741->22130 22131 7ff7bc20ec90 111 API calls 21741->22131 21742->21701 21818 7ff7bc20b359 21742->21818 22156 7ff7bc2012d0 106 API calls 21742->22156 22198 7ff7bc226f10 106 API calls 21744->22198 22135 7ff7bc2067d0 106 API calls 21745->22135 21746 7ff7bc209d5f 22186 7ff7bc226f10 106 API calls 21746->22186 21749 7ff7bc20d3cb 22189 7ff7bc1f3a10 106 API calls 21749->22189 21750 7ff7bc20a1dd HeapFree 21750->21757 21753->21701 21762 7ff7bc20a997 21753->21762 22140 7ff7bc206520 108 API calls 21753->22140 21754 7ff7bc209b53 21754->21696 21757->21692 21757->21709 21757->21713 21757->21720 21757->21728 21757->21729 21757->21746 21757->21749 21757->21750 21757->21754 21758 7ff7bc20a233 HeapFree 21757->21758 21759 7ff7bc20a24c HeapFree 21757->21759 21763 7ff7bc20a27a HeapFree 21757->21763 21766 7ff7bc209ded 21757->21766 21774 7ff7bc209e6f HeapFree 21757->21774 22132 7ff7bc210360 108 API calls 21757->22132 22133 7ff7bc20ec90 111 API calls 21757->22133 21758->21757 21759->21757 21760 7ff7bc20b0d1 22157 7ff7bc201140 106 API calls 21760->22157 21775 7ff7bc20a9e0 21762->21775 21763->21715 21763->21757 21765 7ff7bc20a714 22136 7ff7bc210b00 139 API calls 21765->22136 22188 7ff7bc226f10 106 API calls 21766->22188 21768->21741 21770 7ff7bc20aa58 SetLastError GetModuleFileNameW 21770->21775 21776 7ff7bc20aa74 GetLastError 21770->21776 21771 7ff7bc20b114 21785 7ff7bc20b130 21771->21785 22158 7ff7bc2012d0 106 API calls 21771->22158 21774->21757 21775->21762 21775->21770 21780 7ff7bc20aa8a GetLastError 21775->21780 21783 7ff7bc20aabd 21775->21783 22141 7ff7bc228010 106 API calls 21775->22141 21776->21775 21779 7ff7bc20aaf3 GetLastError 21776->21779 21777 7ff7bc20a747 21782 7ff7bc20a886 21777->21782 22137 7ff7bc209040 106 API calls 21777->22137 21787 7ff7bc20aad5 21779->21787 21780->21754 21780->21775 21782->21742 21792 7ff7bc20b020 HeapFree 21782->21792 21793 7ff7bc20d58f 21783->21793 21794 7ff7bc20aac6 21783->21794 21784 7ff7bc20b1d7 21789 7ff7bc20b1f4 21784->21789 21790 7ff7bc20b236 21784->21790 21785->21784 21819 7ff7bc20b1b5 21785->21819 22159 7ff7bc2012d0 106 API calls 21785->22159 22160 7ff7bc210bd0 106 API calls 21785->22160 21786 7ff7bc20b526 AcquireSRWLockExclusive 21889 7ff7bc20b576 21786->21889 21795 7ff7bc20ab1e HeapFree 21787->21795 21796 7ff7bc20ab34 21787->21796 21789->21701 21807 7ff7bc20b212 HeapFree 21789->21807 21799 7ff7bc20b296 21790->21799 22161 7ff7bc2012d0 106 API calls 21790->22161 21792->21742 22199 7ff7bc227120 106 API calls 21793->22199 22142 7ff7bc202fe0 107 API calls 21794->22142 21795->21796 21804 7ff7bc20ab4a 21796->21804 21805 7ff7bc20ab62 21796->21805 21797 7ff7bc20aee1 HeapFree 21800 7ff7bc20a980 21797->21800 21816 7ff7bc20b59a 21799->21816 21799->21818 21953 7ff7bc20b33a 21799->21953 21800->21762 21800->21797 21853 7ff7bc20ae80 21800->21853 22150 7ff7bc206520 108 API calls 21800->22150 22151 7ff7bc207590 106 API calls 21800->22151 22143 7ff7bc1fe8c0 HeapFree HeapFree 21804->22143 22144 7ff7bc208490 106 API calls 21805->22144 21807->21701 21812->21704 21812->21705 21813 7ff7bc20c10b 21821 7ff7bc20b51c 21813->21821 22180 7ff7bc2012d0 106 API calls 21813->22180 22162 7ff7bc2012d0 106 API calls 21816->22162 21818->21821 21857 7ff7bc20c0c8 21818->21857 22179 7ff7bc20ea60 107 API calls 21818->22179 21819->21789 21824 7ff7bc20b1bf HeapFree 21819->21824 21821->21786 21821->21857 21824->21789 21827 7ff7bc20d1af HeapFree 21827->21857 21828 7ff7bc20aea2 HeapFree 21828->21853 21829 7ff7bc20cd4b 21844 7ff7bc20d12a 21829->21844 21845 7ff7bc20d11d CloseHandle 21829->21845 21832 7ff7bc20acf8 SetLastError GetSystemDirectoryW 21840 7ff7bc20ab5d 21832->21840 21841 7ff7bc20ad12 GetLastError 21832->21841 21833 7ff7bc20d1cf HeapFree 21833->21857 21834 7ff7bc20ba94 21849 7ff7bc20baae HeapFree 21834->21849 21839 7ff7bc20d1ef HeapFree 21839->21857 21840->21832 21852 7ff7bc20ad2c GetLastError 21840->21852 21859 7ff7bc20ad5f 21840->21859 21863 7ff7bc20af81 21840->21863 22145 7ff7bc228010 106 API calls 21840->22145 21841->21840 21851 7ff7bc20aef2 GetLastError 21841->21851 21847 7ff7bc20d141 21844->21847 21848 7ff7bc20d134 CloseHandle 21844->21848 21845->21844 21847->21857 21858 7ff7bc20d14b CloseHandle 21847->21858 21848->21847 21878 7ff7bc20bac4 21849->21878 21862 7ff7bc20ade0 21851->21862 21852->21754 21852->21840 21853->21800 21853->21828 21853->21834 22152 7ff7bc209170 106 API calls 21853->22152 22153 7ff7bc210b00 139 API calls 21853->22153 22154 7ff7bc206520 108 API calls 21853->22154 21854 7ff7bc20cd82 21861 7ff7bc20d106 CloseHandle 21854->21861 21855 7ff7bc20bf66 22177 7ff7bc20e990 255 API calls 21855->22177 21857->21812 21857->21827 21857->21833 21857->21839 21864 7ff7bc20d176 ReleaseSRWLockExclusive 21857->21864 21858->21857 21866 7ff7bc20ad68 21859->21866 21867 7ff7bc20d5a6 21859->21867 21861->21829 21868 7ff7bc20af1d HeapFree 21862->21868 21869 7ff7bc20af33 21862->21869 21863->21742 21864->21857 21870 7ff7bc20d194 HeapFree 21864->21870 21865 7ff7bc20bf76 21872 7ff7bc20bf95 21865->21872 22178 7ff7bc2012d0 106 API calls 21865->22178 22146 7ff7bc202fe0 107 API calls 21866->22146 22200 7ff7bc227120 106 API calls 21867->22200 21868->21869 21869->21849 21876 7ff7bc20bd16 21869->21876 21869->21878 21890 7ff7bc20af69 21869->21890 21870->21857 21871 7ff7bc20bb7f SetLastError GetWindowsDirectoryW 21871->21878 21879 7ff7bc20bb99 GetLastError 21871->21879 21872->21818 21872->21821 21880 7ff7bc20ba6a 21872->21880 21875 7ff7bc20cdbc 21882 7ff7bc20d0f9 CloseHandle 21875->21882 21884 7ff7bc20bd67 HeapFree 21876->21884 21878->21871 21887 7ff7bc20bbb3 GetLastError 21878->21887 21893 7ff7bc20bbe6 21878->21893 22167 7ff7bc228010 106 API calls 21878->22167 21879->21878 21886 7ff7bc20bc8f GetLastError 21879->21886 21880->21857 21881 7ff7bc20ad77 22147 7ff7bc207590 106 API calls 21881->22147 21882->21861 21894 7ff7bc20bd14 21884->21894 21885 7ff7bc20b78a HeapFree 21885->21953 21892 7ff7bc20bcb5 21886->21892 21887->21754 21887->21878 21889->21829 21889->21854 21889->21875 21911 7ff7bc20ce7c 21889->21911 22181 7ff7bc211e40 115 API calls 21889->22181 22155 7ff7bc1fe8c0 HeapFree HeapFree 21890->22155 21891 7ff7bc20b9d5 21895 7ff7bc20b9e9 21891->21895 21896 7ff7bc20b9da HeapFree 21891->21896 21899 7ff7bc20bcba HeapFree 21892->21899 21900 7ff7bc20bcd0 21892->21900 21904 7ff7bc20d5bd 21893->21904 21905 7ff7bc20bbef 21893->21905 22173 7ff7bc2053b0 117 API calls 21894->22173 21906 7ff7bc20ba17 21895->21906 21907 7ff7bc20ba08 HeapFree 21895->21907 21896->21895 21897 7ff7bc20ad91 21908 7ff7bc20ada7 21897->21908 22148 7ff7bc209170 106 API calls 21897->22148 21899->21900 21900->21876 21900->21884 21900->21894 21928 7ff7bc20bd01 21900->21928 21901 7ff7bc20cf26 CreateProcessW 21912 7ff7bc20cf7a 21901->21912 21913 7ff7bc20d0a4 GetLastError 21901->21913 22201 7ff7bc227120 106 API calls 21904->22201 22168 7ff7bc202fe0 107 API calls 21905->22168 21916 7ff7bc20ba21 HeapFree 21906->21916 21917 7ff7bc20ba33 21906->21917 21907->21906 22149 7ff7bc210b00 139 API calls 21908->22149 21909 7ff7bc20af7c 21909->21878 21911->21901 21920 7ff7bc20d0d8 21911->21920 21921 7ff7bc20cfc0 CloseHandle CloseHandle CloseHandle 21912->21921 21922 7ff7bc20cfb1 21912->21922 21925 7ff7bc20d0c9 21913->21925 21926 7ff7bc20d0ec CloseHandle 21913->21926 21916->21917 22166 7ff7bc20e990 255 API calls 21917->22166 21920->21926 22183 7ff7bc212310 ReleaseSRWLockExclusive 21921->22183 22182 7ff7bc2122d0 DeleteProcThreadAttributeList HeapFree 21922->22182 21923 7ff7bc20b7f6 HeapFree 21923->21953 21924 7ff7bc20bbfe 22169 7ff7bc207590 106 API calls 21924->22169 22184 7ff7bc2122d0 DeleteProcThreadAttributeList HeapFree 21925->22184 21926->21882 21927 7ff7bc20adc4 21927->21862 21934 7ff7bc20adce HeapFree 21927->21934 22172 7ff7bc1fe8c0 HeapFree HeapFree 21928->22172 21934->21862 21937 7ff7bc206520 108 API calls 21964 7ff7bc20bd9d 21937->21964 21938 7ff7bc20bc18 21942 7ff7bc20bc2e 21938->21942 21943 7ff7bc20bc22 21938->21943 21939 7ff7bc20ba4a 21939->21880 21944 7ff7bc20ba54 HeapFree 21939->21944 22171 7ff7bc210b00 139 API calls 21942->22171 22170 7ff7bc209170 106 API calls 21943->22170 21944->21880 21951 7ff7bc20bf1a 21951->21701 21954 7ff7bc20bf24 HeapFree 21951->21954 21952 7ff7bc20bc4b 21958 7ff7bc20bc5f HeapFree 21952->21958 21959 7ff7bc20bc71 21952->21959 21953->21855 21953->21885 21953->21891 21953->21906 21953->21917 21953->21923 21963 7ff7bc20b963 HeapFree 21953->21963 21966 7ff7bc2012d0 106 API calls 21953->21966 22163 7ff7bc209420 255 API calls 21953->22163 22164 7ff7bc228010 106 API calls 21953->22164 22165 7ff7bc201140 106 API calls 21953->22165 21954->21701 21958->21959 21959->21892 21961 7ff7bc20be55 HeapFree 21961->21964 21963->21953 21964->21701 21964->21937 21964->21951 21964->21961 21965 7ff7bc20be92 21964->21965 22174 7ff7bc207590 106 API calls 21964->22174 21965->21964 21969 7ff7bc20beb4 HeapFree 21965->21969 21970 7ff7bc20bedc 21965->21970 22175 7ff7bc209170 106 API calls 21965->22175 22176 7ff7bc210b00 139 API calls 21965->22176 21966->21953 21969->21965 21970->21742 21971 7ff7bc20beff HeapFree 21970->21971 21971->21742 21973 7ff7bc206a00 125 API calls 21972->21973 21975 7ff7bc20744b 21973->21975 21974 7ff7bc1f1b47 21974->21483 21974->21514 21975->21974 21978 7ff7bc2074f0 CloseHandle 21975->21978 21979 7ff7bc20753d 21975->21979 22202 7ff7bc200230 NtWriteFile 21975->22202 21978->21974 22212 7ff7bc227020 106 API calls 21979->22212 21983 7ff7bc1f2b29 HeapFree 21982->21983 21986 7ff7bc1f2b3c 21982->21986 21983->21986 21984 7ff7bc1f2b81 21985 7ff7bc1f2b88 HeapFree 21984->21985 21999 7ff7bc1f2b9a 21984->21999 21985->21999 21986->21984 21987 7ff7bc1f2b70 HeapFree 21986->21987 21987->21986 21988 7ff7bc1f2ede HeapFree 22005 7ff7bc1f2df3 21988->22005 21989 7ff7bc1f2efe CloseHandle 21989->22005 21990 7ff7bc1f2f15 CloseHandle 21990->22005 21991 7ff7bc1f2e90 HeapFree 21991->21991 21991->22005 21992 7ff7bc1f2eb6 HeapFree 21992->22005 21993 7ff7bc1f2f2c CloseHandle 21993->22005 21994 7ff7bc1f1c33 21994->21501 21995 7ff7bc1f3255 22215 7ff7bc1f74d0 HeapFree 21995->22215 21996 7ff7bc1f2ca0 HeapFree 21996->21999 21997 7ff7bc1f2d74 HeapFree 21997->21999 21999->21995 21999->21996 21999->21997 21999->21999 22000 7ff7bc1f2d8b HeapFree 21999->22000 22001 7ff7bc1f2daf HeapFree 21999->22001 21999->22005 22000->21999 22001->21999 22002 7ff7bc1f31f0 HeapFree 22002->22002 22002->22005 22003 7ff7bc1f3211 HeapFree 22003->22005 22004 7ff7bc1f304c HeapFree 22004->22005 22005->21988 22005->21989 22005->21990 22005->21991 22005->21992 22005->21993 22005->21994 22005->21995 22005->22002 22005->22003 22005->22004 22006 7ff7bc1f2f70 HeapFree 22005->22006 22006->22005 22008->21569 22009->21512 22010->21567 22011->21512 22012->21533 22013->21567 22014->21469 22015->21528 22016->21515 22018 7ff7bc206a00 125 API calls 22017->22018 22019 7ff7bc20866a 22018->22019 22020 7ff7bc208743 GetFileInformationByHandle 22019->22020 22027 7ff7bc208676 22019->22027 22021 7ff7bc20881a GetLastError 22020->22021 22022 7ff7bc20876e 22020->22022 22026 7ff7bc208833 CloseHandle 22021->22026 22024 7ff7bc2087a5 22022->22024 22025 7ff7bc20877b GetFileInformationByHandleEx 22022->22025 22023 7ff7bc1f1d78 22023->21577 22023->21585 22023->21595 22024->22026 22025->22021 22025->22024 22026->22023 22027->22023 22028 7ff7bc200f00 108 API calls 22027->22028 22029 7ff7bc2086bd 22028->22029 22030 7ff7bc208717 22029->22030 22065 7ff7bc206c60 22029->22065 22107 7ff7bc1fe8c0 HeapFree HeapFree 22030->22107 22032 7ff7bc208700 22032->22030 22034 7ff7bc20884f __FrameHandler3::FrameUnwindToEmptyState 22032->22034 22035 7ff7bc208863 FindFirstFileW 22034->22035 22036 7ff7bc208875 FindClose 22035->22036 22037 7ff7bc20888b 22035->22037 22036->22037 22038 7ff7bc2088fa HeapFree 22037->22038 22039 7ff7bc20890c 22037->22039 22038->22039 22039->22030 22040 7ff7bc208915 22039->22040 22040->22023 22041->21577 22042->21595 22043->21595 22045 7ff7bc200f00 108 API calls 22044->22045 22046 7ff7bc206a24 22045->22046 22047 7ff7bc206c60 115 API calls 22046->22047 22055 7ff7bc1f2010 22046->22055 22048 7ff7bc206a6d 22047->22048 22050 7ff7bc206b58 CreateFileW 22048->22050 22053 7ff7bc206ab1 22048->22053 22048->22055 22049 7ff7bc206bff HeapFree 22049->22055 22051 7ff7bc206be4 GetLastError 22050->22051 22052 7ff7bc206b9a 22050->22052 22051->22049 22051->22055 22052->22053 22054 7ff7bc206ba8 GetLastError 22052->22054 22053->22049 22053->22055 22054->22053 22056 7ff7bc206bb5 SetFileInformationByHandle 22054->22056 22055->21592 22055->21593 22056->22053 22057 7ff7bc206c29 GetLastError CloseHandle 22056->22057 22058 7ff7bc206c59 22057->22058 22059 7ff7bc206c47 HeapFree 22057->22059 22058->22055 22059->22058 22060->21626 22062->21600 22063->21605 22064->21613 22066 7ff7bc206c9b 22065->22066 22067 7ff7bc206e75 SetLastError GetFullPathNameW 22066->22067 22071 7ff7bc206eb6 GetLastError 22066->22071 22074 7ff7bc206ee9 22066->22074 22076 7ff7bc206d08 22066->22076 22108 7ff7bc228010 106 API calls 22066->22108 22067->22066 22068 7ff7bc206e9c GetLastError 22067->22068 22068->22066 22070 7ff7bc206f2a GetLastError 22068->22070 22072 7ff7bc206f4f 22070->22072 22073 7ff7bc2071b8 HeapFree 22070->22073 22071->22066 22079 7ff7bc2072ff 22071->22079 22072->22076 22078 7ff7bc2071f1 HeapFree 22072->22078 22073->22072 22075 7ff7bc207319 22074->22075 22080 7ff7bc206ef2 22074->22080 22114 7ff7bc227120 106 API calls 22075->22114 22076->22032 22078->22076 22081 7ff7bc207396 HeapFree 22079->22081 22082 7ff7bc2073ac 22079->22082 22088 7ff7bc206fee 22080->22088 22093 7ff7bc206f0a 22080->22093 22113 7ff7bc1ff5c0 HeapReAlloc GetProcessHeap HeapAlloc 22080->22113 22081->22082 22083 7ff7bc2073d3 22082->22083 22084 7ff7bc2073b9 HeapFree 22082->22084 22083->22032 22084->22083 22085 7ff7bc2070ce 22085->22088 22110 7ff7bc228010 106 API calls 22085->22110 22092 7ff7bc20714a 22088->22092 22111 7ff7bc228010 106 API calls 22088->22111 22090 7ff7bc2072aa 22090->22093 22094 7ff7bc207347 22090->22094 22096 7ff7bc207190 22092->22096 22112 7ff7bc2012d0 106 API calls 22092->22112 22093->22085 22109 7ff7bc1ff5c0 HeapReAlloc GetProcessHeap HeapAlloc 22093->22109 22098 7ff7bc207353 22094->22098 22099 7ff7bc20734c 22094->22099 22095 7ff7bc2070aa 22095->22085 22102 7ff7bc20732d 22095->22102 22096->22072 22096->22073 22118 7ff7bc226f10 106 API calls 22098->22118 22117 7ff7bc1f3a10 106 API calls 22099->22117 22103 7ff7bc207332 22102->22103 22104 7ff7bc207339 22102->22104 22115 7ff7bc1f3a10 106 API calls 22103->22115 22116 7ff7bc226f10 106 API calls 22104->22116 22107->22023 22108->22066 22109->22095 22110->22088 22111->22092 22112->22096 22113->22090 22116->22079 22118->22079 22120 7ff7bc200f00 108 API calls 22119->22120 22121 7ff7bc2187f7 22120->22121 22122 7ff7bc206c60 115 API calls 22121->22122 22128 7ff7bc1f2938 22121->22128 22123 7ff7bc21883a 22122->22123 22124 7ff7bc218849 DeleteFileW 22123->22124 22123->22128 22125 7ff7bc218871 GetLastError 22124->22125 22126 7ff7bc218856 22124->22126 22125->22128 22129 7ff7bc218886 HeapFree 22125->22129 22127 7ff7bc21885b HeapFree 22126->22127 22126->22128 22127->22128 22128->21669 22128->21675 22128->21676 22129->22128 22130->21741 22131->21741 22132->21757 22133->21757 22134->21724 22135->21765 22136->21777 22138->21812 22139->21742 22140->21800 22141->21775 22142->21787 22143->21840 22145->21840 22146->21881 22147->21897 22148->21908 22149->21927 22150->21800 22151->21800 22152->21853 22153->21853 22154->21853 22155->21909 22156->21760 22157->21771 22158->21785 22159->21785 22160->21785 22161->21799 22162->21953 22163->21953 22164->21953 22165->21953 22166->21939 22167->21878 22168->21924 22169->21938 22170->21942 22171->21952 22172->21894 22173->21964 22174->21964 22175->21965 22176->21965 22177->21865 22178->21872 22179->21813 22180->21821 22181->21911 22182->21921 22184->21920 22186->21754 22188->21754 22190->21754 22195->21754 22198->21754 22203 7ff7bc2002a3 22202->22203 22204 7ff7bc20028a WaitForSingleObject 22202->22204 22206 7ff7bc2002b4 RtlNtStatusToDosError 22203->22206 22207 7ff7bc2002a7 22203->22207 22204->22203 22205 7ff7bc2002da 22204->22205 22213 7ff7bc1ff410 106 API calls 22205->22213 22206->22207 22207->21975 22209 7ff7bc200326 22214 7ff7bc1fe8c0 HeapFree HeapFree 22209->22214 22211 7ff7bc200335 22213->22209 22214->22211
    APIs
    • HeapFree.KERNEL32(00000004,00000000,?,00000000,?,00007FF7BC20E9AD,?,?,?,00000000,?,00000000,00007FF7BC20A829), ref: 00007FF7BC20956C
    • HeapFree.KERNEL32(00000004,00000000,?,00000000,?,00007FF7BC20E9AD,?,?,?,00000000,?,00000000,00007FF7BC20A829), ref: 00007FF7BC2095D4
    • HeapFree.KERNEL32(00000004,00000000,?,00000000,?,00007FF7BC20E9AD,?,?,?,00000000,?,00000000,00007FF7BC20A829), ref: 00007FF7BC209732
    • HeapFree.KERNEL32(00000004,00000000,?,00000000,?,00007FF7BC20E9AD,?,?,?,00000000,?,00000000,00007FF7BC20A829), ref: 00007FF7BC20975F
    • GetEnvironmentStringsW.KERNEL32 ref: 00007FF7BC209835
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: FreeHeap$EnvironmentStrings
    • String ID: .exeprogram not found$PATHRUST_MIN_STACKfatal runtime error: assertion failed: thread_info.stack_guard.get().is_none() && thread_info.thread.get().is_none()$\?\\$]?\\$assertion failed: self.height > 0
    • API String ID: 2767186067-769273994
    • Opcode ID: 74984789f61491dd844e620553365b152a912cf5e5ad061f5bca680f47206e06
    • Instruction ID: 25b568b23afc686ca03e2377ff4c77e3ebc2318d7216de766f2ad1bd3839c274
    • Opcode Fuzzy Hash: 74984789f61491dd844e620553365b152a912cf5e5ad061f5bca680f47206e06
    • Instruction Fuzzy Hash: 40538366A08BC189F770AF29D8453F9A3A1FB66798F848136CF5D5B799DF389240C310

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 776 7ff7bc1f12d0-7ff7bc1f137d call 7ff7bc2276f0 * 4 call 7ff7bc1f1d30 787 7ff7bc1f1384-7ff7bc1f139a call 7ff7bc215820 776->787 788 7ff7bc1f137f call 7ff7bc1f2920 776->788 792 7ff7bc1f13a0-7ff7bc1f14a9 call 7ff7bc2097a0 787->792 793 7ff7bc1f1abe-7ff7bc1f1ac8 call 7ff7bc226f10 787->793 788->787 797 7ff7bc1f14ae-7ff7bc1f14bc 792->797 796 7ff7bc1f1acd-7ff7bc1f1b50 call 7ff7bc1f3b90 call 7ff7bc2073f0 793->796 810 7ff7bc1f1b64-7ff7bc1f1b67 796->810 811 7ff7bc1f1b52-7ff7bc1f1b5e HeapFree 796->811 797->796 799 7ff7bc1f14c2-7ff7bc1f1527 call 7ff7bc1f2b10 CreateWaitableTimerExW 797->799 805 7ff7bc1f158d-7ff7bc1f1592 Sleep 799->805 806 7ff7bc1f1529-7ff7bc1f1562 SetWaitableTimer 799->806 809 7ff7bc1f1598-7ff7bc1f15a5 WaitForSingleObject 805->809 807 7ff7bc1f1584-7ff7bc1f1587 CloseHandle 806->807 808 7ff7bc1f1564-7ff7bc1f1580 WaitForSingleObject CloseHandle 806->808 807->805 808->809 812 7ff7bc1f1582 808->812 813 7ff7bc1f15b7-7ff7bc1f15d5 GetExitCodeProcess 809->813 814 7ff7bc1f15a7-7ff7bc1f15ac 809->814 815 7ff7bc1f1bc6-7ff7bc1f1bd8 810->815 816 7ff7bc1f1b69-7ff7bc1f1b76 810->816 811->810 812->805 821 7ff7bc1f16f2-7ff7bc1f179b GetLastError call 7ff7bc1f3b90 call 7ff7bc2073f0 813->821 822 7ff7bc1f15db-7ff7bc1f167c call 7ff7bc1f3b90 call 7ff7bc2073f0 813->822 817 7ff7bc1f19a6-7ff7bc1f19c0 call 7ff7bc1f1d30 814->817 818 7ff7bc1f15b2 814->818 819 7ff7bc1f1c26-7ff7bc1f1c49 call 7ff7bc1f2b10 call 7ff7bc215820 815->819 820 7ff7bc1f1bda-7ff7bc1f1bdd 815->820 816->815 823 7ff7bc1f1b78-7ff7bc1f1b7b 816->823 834 7ff7bc1f19c2-7ff7bc1f19c9 call 7ff7bc1f3340 817->834 835 7ff7bc1f19da-7ff7bc1f19e6 call 7ff7bc1f2920 call 7ff7bc1f3340 817->835 818->821 853 7ff7bc1f1c4b-7ff7bc1f1c55 call 7ff7bc226f10 819->853 854 7ff7bc1f1c69-7ff7bc1f1cb9 call 7ff7bc2073f0 HeapFree 819->854 820->819 825 7ff7bc1f1bdf-7ff7bc1f1bf5 820->825 858 7ff7bc1f17af-7ff7bc1f17b2 821->858 859 7ff7bc1f179d-7ff7bc1f17a9 HeapFree 821->859 860 7ff7bc1f1690-7ff7bc1f1693 822->860 861 7ff7bc1f167e-7ff7bc1f168a HeapFree 822->861 823->815 829 7ff7bc1f1b7d-7ff7bc1f1b95 823->829 846 7ff7bc1f1c14-7ff7bc1f1c20 HeapFree 825->846 847 7ff7bc1f1bf7-7ff7bc1f1bfc 825->847 842 7ff7bc1f1bb4-7ff7bc1f1bc0 HeapFree 829->842 843 7ff7bc1f1b97-7ff7bc1f1b9c 829->843 862 7ff7bc1f19cb-7ff7bc1f19d6 call 7ff7bc215780 834->862 863 7ff7bc1f19e8-7ff7bc1f19f8 call 7ff7bc1f3340 call 7ff7bc215780 834->863 835->862 835->863 842->815 851 7ff7bc1f1ba2-7ff7bc1f1bae HeapFree 843->851 852 7ff7bc1f1b9e 843->852 846->819 856 7ff7bc1f1c02-7ff7bc1f1c0e HeapFree 847->856 857 7ff7bc1f1bfe 847->857 851->842 852->851 874 7ff7bc1f1c5a-7ff7bc1f1c64 call 7ff7bc226f10 853->874 886 7ff7bc1f1cbb-7ff7bc1f1cc8 854->886 887 7ff7bc1f1d18 call 7ff7bc1f2920 854->887 856->846 857->856 867 7ff7bc1f1814-7ff7bc1f1826 858->867 868 7ff7bc1f17b4-7ff7bc1f17c2 858->868 859->858 869 7ff7bc1f1875-7ff7bc1f1880 call 7ff7bc215780 860->869 870 7ff7bc1f1699-7ff7bc1f16a7 860->870 861->860 893 7ff7bc1f19fa-7ff7bc1f1a07 862->893 894 7ff7bc1f19d8 862->894 863->893 900 7ff7bc1f1a58-7ff7bc1f1a73 call 7ff7bc1f2920 CloseHandle * 2 863->900 867->869 875 7ff7bc1f1828-7ff7bc1f182b 867->875 868->867 879 7ff7bc1f17c4-7ff7bc1f17c7 868->879 890 7ff7bc1f1882-7ff7bc1f188f 869->890 891 7ff7bc1f18e0-7ff7bc1f18f6 call 7ff7bc215820 869->891 870->869 871 7ff7bc1f16ad-7ff7bc1f16b0 870->871 871->869 881 7ff7bc1f16b6-7ff7bc1f16d0 871->881 874->854 875->869 885 7ff7bc1f182d-7ff7bc1f1844 875->885 879->867 880 7ff7bc1f17c9-7ff7bc1f17e3 879->880 906 7ff7bc1f17e5-7ff7bc1f17ea 880->906 907 7ff7bc1f1802-7ff7bc1f180e HeapFree 880->907 908 7ff7bc1f16d6-7ff7bc1f16db 881->908 909 7ff7bc1f1863-7ff7bc1f186f HeapFree 881->909 885->909 914 7ff7bc1f1846-7ff7bc1f184b 885->914 886->887 895 7ff7bc1f1cca-7ff7bc1f1ccd 886->895 902 7ff7bc1f1d1d-7ff7bc1f1d29 call 7ff7bc227510 887->902 890->891 901 7ff7bc1f1891-7ff7bc1f1894 890->901 891->874 916 7ff7bc1f18fc-7ff7bc1f193f call 7ff7bc2073f0 HeapFree 891->916 899 7ff7bc1f1a09-7ff7bc1f1a0c 893->899 893->900 894->900 895->887 904 7ff7bc1f1ccf-7ff7bc1f1ce7 895->904 899->900 910 7ff7bc1f1a0e-7ff7bc1f1a27 899->910 932 7ff7bc1f1a75-7ff7bc1f1a7d CloseHandle 900->932 933 7ff7bc1f1a83-7ff7bc1f1a86 900->933 901->891 911 7ff7bc1f1896-7ff7bc1f18af 901->911 926 7ff7bc1f1d06-7ff7bc1f1d12 HeapFree 904->926 927 7ff7bc1f1ce9-7ff7bc1f1cee 904->927 917 7ff7bc1f17f0-7ff7bc1f17fc HeapFree 906->917 918 7ff7bc1f17ec 906->918 907->867 919 7ff7bc1f16e1-7ff7bc1f16ed 908->919 920 7ff7bc1f16dd 908->920 909->869 939 7ff7bc1f1a46-7ff7bc1f1a52 HeapFree 910->939 940 7ff7bc1f1a29-7ff7bc1f1a2e 910->940 941 7ff7bc1f18b1-7ff7bc1f18b6 911->941 942 7ff7bc1f18ce-7ff7bc1f18da HeapFree 911->942 923 7ff7bc1f1851-7ff7bc1f185a 914->923 924 7ff7bc1f184d 914->924 945 7ff7bc1f19a1 call 7ff7bc1f2920 916->945 946 7ff7bc1f1941-7ff7bc1f194f 916->946 917->907 918->917 930 7ff7bc1f185d HeapFree 919->930 920->919 923->930 924->923 926->887 936 7ff7bc1f1cf4-7ff7bc1f1d00 HeapFree 927->936 937 7ff7bc1f1cf0 927->937 930->909 932->933 934 7ff7bc1f1a96-7ff7bc1f1a99 933->934 935 7ff7bc1f1a88-7ff7bc1f1a90 CloseHandle 933->935 943 7ff7bc1f1a9b-7ff7bc1f1aa3 CloseHandle 934->943 944 7ff7bc1f1aa9-7ff7bc1f1abd 934->944 935->934 936->926 937->936 939->900 947 7ff7bc1f1a34-7ff7bc1f1a40 HeapFree 940->947 948 7ff7bc1f1a30 940->948 949 7ff7bc1f18bc-7ff7bc1f18c8 HeapFree 941->949 950 7ff7bc1f18b8 941->950 942->891 943->944 945->817 946->945 951 7ff7bc1f1951-7ff7bc1f1954 946->951 947->939 948->947 949->942 950->949 951->945 953 7ff7bc1f1956-7ff7bc1f1970 951->953 955 7ff7bc1f1972-7ff7bc1f1977 953->955 956 7ff7bc1f198f-7ff7bc1f199b HeapFree 953->956 957 7ff7bc1f197d-7ff7bc1f1989 HeapFree 955->957 958 7ff7bc1f1979 955->958 956->945 957->956 958->957
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: FreeHeap$CloseHandle$ObjectSingleTimerWaitWaitable$CodeCreateErrorExitLastProcessSleep
    • String ID: is none$C:\Windows\Debug\a.cache$C:\Windows\Debug\b.cache$C:\Windows\Debug\fail.txtwlQYLoPCil3niI7x8CvR9EtNtL/aeaHrZ23LP3fAsJogVTIzdnZ5Pi09ZVeHFkiB[dec] $C:\Windows\Debug\pay.exe[exec] $child is
    • API String ID: 1264200013-3480048919
    • Opcode ID: 07c59a73f36332f355eef5f65b84ea7444c81d44682379a05c2284ed909b3562
    • Instruction ID: 6c8a027f78d9af3423b1de2e10f85c5f5607c6821f7068b865a0eb6cf3602605
    • Opcode Fuzzy Hash: 07c59a73f36332f355eef5f65b84ea7444c81d44682379a05c2284ed909b3562
    • Instruction Fuzzy Hash: 71528E71A08A8A85EB14EB1AE4053EAA3A5FFA6B84F94C135CF5D57799DF3CD044C320

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 959 7ff7bc1f1d30-7ff7bc1f1d7c call 7ff7bc2085e0 962 7ff7bc1f1ddf-7ff7bc1f1de6 959->962 963 7ff7bc1f1d7e-7ff7bc1f1d8b 959->963 964 7ff7bc1f1fbe 962->964 965 7ff7bc1f1dec 962->965 966 7ff7bc1f1e36-7ff7bc1f1eb0 call 7ff7bc1f3b90 call 7ff7bc2073f0 963->966 967 7ff7bc1f1d91-7ff7bc1f1d94 963->967 970 7ff7bc1f1fc3-7ff7bc1f2016 call 7ff7bc206a00 964->970 968 7ff7bc1f2856 call 7ff7bc1f3a10 965->968 969 7ff7bc1f1df2-7ff7bc1f1e05 call 7ff7bc215820 965->969 984 7ff7bc1f1eb5-7ff7bc1f1ebd 966->984 967->966 971 7ff7bc1f1d9a-7ff7bc1f1da6 967->971 981 7ff7bc1f285b-7ff7bc1f2912 call 7ff7bc1ff410 call 7ff7bc1fe9c0 call 7ff7bc1fe8c0 968->981 969->970 985 7ff7bc1f1e0b-7ff7bc1f1e13 call 7ff7bc226f10 969->985 987 7ff7bc1f219f-7ff7bc1f21df NtReadFile 970->987 988 7ff7bc1f201c-7ff7bc1f20a2 call 7ff7bc1f3b90 call 7ff7bc2073f0 970->988 971->966 977 7ff7bc1f1dac-7ff7bc1f1dcf call 7ff7bc2085e0 971->977 989 7ff7bc1f1dd1-7ff7bc1f1ddd call 7ff7bc1fe8c0 977->989 990 7ff7bc1f1e18-7ff7bc1f1e1f 977->990 991 7ff7bc1f1ed1-7ff7bc1f1ed4 984->991 992 7ff7bc1f1ebf-7ff7bc1f1ecb HeapFree 984->992 985->990 993 7ff7bc1f21e1-7ff7bc1f21ef WaitForSingleObject 987->993 994 7ff7bc1f21f2-7ff7bc1f220c 987->994 1025 7ff7bc1f20b6-7ff7bc1f20b9 988->1025 1026 7ff7bc1f20a4-7ff7bc1f20b0 HeapFree 988->1026 989->966 1005 7ff7bc1f1e25-7ff7bc1f1e30 990->1005 1006 7ff7bc1f1fa2-7ff7bc1f1fb8 call 7ff7bc1fe8c0 990->1006 1001 7ff7bc1f1ed6-7ff7bc1f1ee3 991->1001 1002 7ff7bc1f1f33-7ff7bc1f1f47 991->1002 992->991 993->994 1003 7ff7bc1f225d-7ff7bc1f23a2 call 7ff7bc2199c0 994->1003 1004 7ff7bc1f220e-7ff7bc1f2213 994->1004 1001->1002 1011 7ff7bc1f1ee5-7ff7bc1f1ee8 1001->1011 1014 7ff7bc1f1f4d-7ff7bc1f1f50 1002->1014 1015 7ff7bc1f2837 1002->1015 1027 7ff7bc1f23b0-7ff7bc1f23fb 1003->1027 1004->981 1013 7ff7bc1f2219-7ff7bc1f221b 1004->1013 1005->966 1005->1006 1006->964 1006->965 1011->1002 1020 7ff7bc1f1eea-7ff7bc1f1f02 1011->1020 1013->1003 1023 7ff7bc1f221d-7ff7bc1f224b RtlNtStatusToDosError call 7ff7bc201950 1013->1023 1014->1015 1016 7ff7bc1f1f56-7ff7bc1f1f6c 1014->1016 1022 7ff7bc1f2839-7ff7bc1f2855 1015->1022 1037 7ff7bc1f1f6e-7ff7bc1f1f73 1016->1037 1038 7ff7bc1f1f8b-7ff7bc1f1f9d HeapFree 1016->1038 1041 7ff7bc1f1f04-7ff7bc1f1f09 1020->1041 1042 7ff7bc1f1f21-7ff7bc1f1f2d HeapFree 1020->1042 1035 7ff7bc1f2251-7ff7bc1f2258 call 7ff7bc1fe8c0 1023->1035 1036 7ff7bc1f26bf-7ff7bc1f2746 call 7ff7bc1f3b90 call 7ff7bc2073f0 1023->1036 1031 7ff7bc1f20bb-7ff7bc1f20c9 1025->1031 1032 7ff7bc1f211a-7ff7bc1f212e 1025->1032 1026->1025 1027->1027 1033 7ff7bc1f23fd-7ff7bc1f241d call 7ff7bc219d80 1027->1033 1031->1032 1039 7ff7bc1f20cb-7ff7bc1f20ce 1031->1039 1043 7ff7bc1f2130-7ff7bc1f2133 1032->1043 1044 7ff7bc1f217d-7ff7bc1f2180 1032->1044 1056 7ff7bc1f24e6-7ff7bc1f2540 call 7ff7bc206a00 1033->1056 1057 7ff7bc1f2423-7ff7bc1f244a 1033->1057 1035->1003 1072 7ff7bc1f275a-7ff7bc1f275d 1036->1072 1073 7ff7bc1f2748-7ff7bc1f2754 HeapFree 1036->1073 1048 7ff7bc1f1f75 1037->1048 1049 7ff7bc1f1f79-7ff7bc1f1f85 HeapFree 1037->1049 1038->1015 1039->1032 1050 7ff7bc1f20d0-7ff7bc1f20e9 1039->1050 1053 7ff7bc1f1f0f-7ff7bc1f1f1b HeapFree 1041->1053 1054 7ff7bc1f1f0b 1041->1054 1042->1002 1043->1044 1046 7ff7bc1f2135-7ff7bc1f214c 1043->1046 1044->1015 1051 7ff7bc1f2186-7ff7bc1f219a HeapFree 1044->1051 1065 7ff7bc1f214e-7ff7bc1f2153 1046->1065 1066 7ff7bc1f216b-7ff7bc1f2177 HeapFree 1046->1066 1048->1049 1049->1038 1067 7ff7bc1f20eb-7ff7bc1f20f0 1050->1067 1068 7ff7bc1f2108-7ff7bc1f2114 HeapFree 1050->1068 1051->1022 1053->1042 1054->1053 1070 7ff7bc1f2546-7ff7bc1f25c8 call 7ff7bc1f3b90 call 7ff7bc2073f0 1056->1070 1071 7ff7bc1f26b1-7ff7bc1f26bd CloseHandle 1056->1071 1062 7ff7bc1f2450-7ff7bc1f24a3 1057->1062 1062->1062 1069 7ff7bc1f24a5-7ff7bc1f24dc call 7ff7bc2073f0 HeapFree 1062->1069 1074 7ff7bc1f2155 1065->1074 1075 7ff7bc1f2159-7ff7bc1f2165 HeapFree 1065->1075 1066->1044 1076 7ff7bc1f20f6-7ff7bc1f2102 HeapFree 1067->1076 1077 7ff7bc1f20f2 1067->1077 1068->1032 1069->1070 1088 7ff7bc1f24de-7ff7bc1f24e1 1069->1088 1094 7ff7bc1f25dc-7ff7bc1f25df 1070->1094 1095 7ff7bc1f25ca-7ff7bc1f25d6 HeapFree 1070->1095 1083 7ff7bc1f26a3-7ff7bc1f26ac CloseHandle 1071->1083 1080 7ff7bc1f27bf-7ff7bc1f27d3 1072->1080 1081 7ff7bc1f275f-7ff7bc1f276d 1072->1081 1073->1072 1074->1075 1075->1066 1076->1068 1077->1076 1084 7ff7bc1f2825-7ff7bc1f2831 CloseHandle 1080->1084 1085 7ff7bc1f27d5-7ff7bc1f27d8 1080->1085 1081->1080 1087 7ff7bc1f276f-7ff7bc1f2772 1081->1087 1083->1022 1084->1015 1084->1051 1085->1084 1089 7ff7bc1f27da-7ff7bc1f27f3 1085->1089 1087->1080 1091 7ff7bc1f2774-7ff7bc1f278d 1087->1091 1088->1083 1097 7ff7bc1f27f5-7ff7bc1f27fb 1089->1097 1098 7ff7bc1f2813-7ff7bc1f281f HeapFree 1089->1098 1101 7ff7bc1f278f-7ff7bc1f2794 1091->1101 1102 7ff7bc1f27ad-7ff7bc1f27b9 HeapFree 1091->1102 1099 7ff7bc1f25e1-7ff7bc1f25ee 1094->1099 1100 7ff7bc1f263e-7ff7bc1f2652 1094->1100 1095->1094 1105 7ff7bc1f2801-7ff7bc1f280d HeapFree 1097->1105 1106 7ff7bc1f27fd 1097->1106 1098->1084 1099->1100 1107 7ff7bc1f25f0-7ff7bc1f25f3 1099->1107 1103 7ff7bc1f2654-7ff7bc1f2657 1100->1103 1104 7ff7bc1f26a1 1100->1104 1108 7ff7bc1f2796 1101->1108 1109 7ff7bc1f279b-7ff7bc1f27a7 HeapFree 1101->1109 1102->1080 1103->1104 1110 7ff7bc1f2659-7ff7bc1f2670 1103->1110 1104->1083 1105->1098 1106->1105 1107->1100 1111 7ff7bc1f25f5-7ff7bc1f260d 1107->1111 1108->1109 1109->1102 1114 7ff7bc1f2672-7ff7bc1f2677 1110->1114 1115 7ff7bc1f268f-7ff7bc1f269b HeapFree 1110->1115 1116 7ff7bc1f260f-7ff7bc1f2614 1111->1116 1117 7ff7bc1f262c-7ff7bc1f2638 HeapFree 1111->1117 1120 7ff7bc1f267d-7ff7bc1f2689 HeapFree 1114->1120 1121 7ff7bc1f2679 1114->1121 1115->1104 1118 7ff7bc1f2616 1116->1118 1119 7ff7bc1f261a-7ff7bc1f2626 HeapFree 1116->1119 1117->1100 1118->1119 1119->1117 1120->1115 1121->1120
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: FreeHeap$Close$Handle$FileFind$ErrorFirstObjectReadSingleStatusWait
    • String ID: C:\Windows\Debug\b.cache$C:\Windows\Debug\fail.txtwlQYLoPCil3niI7x8CvR9EtNtL/aeaHrZ23LP3fAsJogVTIzdnZ5Pi09ZVeHFkiB[dec]
    • API String ID: 245698163-1914240854
    • Opcode ID: 7f21da90883e318122770393cb50abb69f54e6a10b0c4ceaaea26ec06006e911
    • Instruction ID: 5c6364447982eb2ce2f7c7161cab83f81fda8ddf1219fe8a620e01f6458d4293
    • Opcode Fuzzy Hash: 7f21da90883e318122770393cb50abb69f54e6a10b0c4ceaaea26ec06006e911
    • Instruction Fuzzy Hash: EC72D571A08AC585F721EF29E8493E9A3A1FF66798F848131DF0D5B768DF389285C310

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1170 7ff7bc2085e0-7ff7bc208670 call 7ff7bc206a00 1173 7ff7bc208743-7ff7bc208768 GetFileInformationByHandle 1170->1173 1174 7ff7bc208676-7ff7bc20867f 1170->1174 1175 7ff7bc20881a-7ff7bc20882c GetLastError 1173->1175 1176 7ff7bc20876e-7ff7bc208779 1173->1176 1177 7ff7bc208733-7ff7bc20873e 1174->1177 1178 7ff7bc208685-7ff7bc208688 1174->1178 1183 7ff7bc208833-7ff7bc208836 CloseHandle 1175->1183 1180 7ff7bc2087ba-7ff7bc208818 1176->1180 1181 7ff7bc20877b-7ff7bc2087a3 GetFileInformationByHandleEx 1176->1181 1179 7ff7bc20883c-7ff7bc20884e 1177->1179 1178->1177 1182 7ff7bc20868e-7ff7bc208696 1178->1182 1180->1183 1181->1175 1184 7ff7bc2087a5-7ff7bc2087b7 1181->1184 1185 7ff7bc208698-7ff7bc20869b 1182->1185 1186 7ff7bc2086a1-7ff7bc2086d8 call 7ff7bc200f00 1182->1186 1183->1179 1184->1180 1185->1177 1185->1186 1189 7ff7bc208717-7ff7bc20871b 1186->1189 1190 7ff7bc2086da-7ff7bc208711 call 7ff7bc206c60 1186->1190 1192 7ff7bc208722-7ff7bc20872e call 7ff7bc1fe8c0 1189->1192 1190->1189 1195 7ff7bc20884f-7ff7bc208873 call 7ff7bc2199c0 FindFirstFileW 1190->1195 1192->1179 1199 7ff7bc2088e7-7ff7bc2088f2 1195->1199 1200 7ff7bc208875-7ff7bc208889 FindClose 1195->1200 1203 7ff7bc2088f5-7ff7bc2088f8 1199->1203 1201 7ff7bc20888b 1200->1201 1202 7ff7bc20888e-7ff7bc2088a0 1200->1202 1201->1202 1204 7ff7bc2088a2-7ff7bc2088d2 1202->1204 1205 7ff7bc2088d4-7ff7bc2088d9 1202->1205 1206 7ff7bc2088fa-7ff7bc208906 HeapFree 1203->1206 1207 7ff7bc20890c-7ff7bc20890f 1203->1207 1204->1203 1205->1204 1208 7ff7bc2088db-7ff7bc2088e5 1205->1208 1206->1207 1207->1192 1209 7ff7bc208915 1207->1209 1208->1199 1208->1204 1209->1179
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: FileHandle$CloseFindInformation$ErrorFirstFreeHeapLast
    • String ID: C:\Windows\Debug\b.cache
    • API String ID: 3677867274-1668539190
    • Opcode ID: 5796192b94fb54c2aaebf824a863f1ca5f029585796110c00edb96b25ddf7d91
    • Instruction ID: 2ef0c2307bba35fa4b7695ae5152d05f1172192cd1b98cf446790588a1cecedf
    • Opcode Fuzzy Hash: 5796192b94fb54c2aaebf824a863f1ca5f029585796110c00edb96b25ddf7d91
    • Instruction Fuzzy Hash: A6917132A047858AF7309F69E8843EEB3A1FB55398F508125CF991BB98DF3CA581C350

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1255 7ff7bc201b10-7ff7bc201b6a call 7ff7bc218b80 call 7ff7bc2199c0 1260 7ff7bc201b6c-7ff7bc201b7c GetModuleHandleW 1255->1260 1261 7ff7bc201b98-7ff7bc201bc2 FormatMessageW 1255->1261 1262 7ff7bc201b95 1260->1262 1263 7ff7bc201b7e-7ff7bc201b93 1260->1263 1264 7ff7bc201e9c-7ff7bc201f3b GetLastError call 7ff7bc1f3b90 1261->1264 1265 7ff7bc201bc8-7ff7bc201bcf 1261->1265 1262->1261 1263->1261 1274 7ff7bc201fe5 1264->1274 1266 7ff7bc202166-7ff7bc202175 call 7ff7bc227120 1265->1266 1267 7ff7bc201bd5-7ff7bc201bf0 call 7ff7bc215820 1265->1267 1272 7ff7bc20217a-7ff7bc2021b4 call 7ff7bc226f10 1266->1272 1267->1272 1277 7ff7bc201bf6-7ff7bc201c30 1267->1277 1283 7ff7bc2021b6-7ff7bc2021c6 HeapFree 1272->1283 1284 7ff7bc2021cc-7ff7bc2021dd 1272->1284 1275 7ff7bc201fe8-7ff7bc201ffb 1274->1275 1279 7ff7bc201c65-7ff7bc201c80 1277->1279 1280 7ff7bc201c32 1277->1280 1281 7ff7bc201c86-7ff7bc201c8b 1279->1281 1282 7ff7bc201d40-7ff7bc201d55 1279->1282 1285 7ff7bc201e5b-7ff7bc201e76 1280->1285 1286 7ff7bc201c91-7ff7bc201c94 1281->1286 1287 7ff7bc201f40-7ff7bc201f48 1281->1287 1288 7ff7bc201ce9-7ff7bc201cfa 1282->1288 1289 7ff7bc201d57-7ff7bc201d5e 1282->1289 1283->1284 1290 7ff7bc201e7c-7ff7bc201e86 1285->1290 1291 7ff7bc201f67-7ff7bc201fde call 7ff7bc1f3b90 1285->1291 1286->1287 1293 7ff7bc201c9a-7ff7bc201cac 1286->1293 1300 7ff7bc201f60 1287->1300 1301 7ff7bc201f4a-7ff7bc201f5a HeapFree 1287->1301 1294 7ff7bc201d80-7ff7bc201d8a 1288->1294 1295 7ff7bc201d00-7ff7bc201d2d 1288->1295 1296 7ff7bc201d64-7ff7bc201d6f call 7ff7bc1f3ae0 1289->1296 1297 7ff7bc201c47-7ff7bc201c5f 1289->1297 1298 7ff7bc20211c 1290->1298 1299 7ff7bc201e8c-7ff7bc201e97 1290->1299 1291->1274 1293->1287 1304 7ff7bc201cb2-7ff7bc201ce7 1293->1304 1309 7ff7bc201dcc-7ff7bc201e1b 1294->1309 1310 7ff7bc201d8c-7ff7bc201dc8 1294->1310 1305 7ff7bc201d33 1295->1305 1306 7ff7bc201e1d-7ff7bc201e32 call 7ff7bc226f30 1295->1306 1296->1294 1297->1279 1297->1285 1302 7ff7bc20211e-7ff7bc202129 1298->1302 1308 7ff7bc202019-7ff7bc202024 1299->1308 1300->1291 1301->1300 1302->1275 1304->1288 1304->1289 1311 7ff7bc201e39-7ff7bc201e55 call 7ff7bc219d80 1305->1311 1306->1311 1313 7ff7bc202026-7ff7bc20202e 1308->1313 1314 7ff7bc202030-7ff7bc202039 1308->1314 1309->1306 1309->1311 1310->1306 1316 7ff7bc201dca 1310->1316 1311->1279 1311->1285 1319 7ff7bc202099-7ff7bc2020a1 1313->1319 1320 7ff7bc202060-7ff7bc202068 1314->1320 1321 7ff7bc20203b-7ff7bc202044 1314->1321 1316->1311 1322 7ff7bc202010-7ff7bc202013 1319->1322 1323 7ff7bc2020a7-7ff7bc2020ab 1319->1323 1327 7ff7bc20207d-7ff7bc202093 1320->1327 1325 7ff7bc202046-7ff7bc20205e 1321->1325 1326 7ff7bc20206a-7ff7bc20206e 1321->1326 1322->1298 1322->1308 1323->1322 1328 7ff7bc2020b1-7ff7bc2020b8 1323->1328 1329 7ff7bc202072-7ff7bc20207a 1325->1329 1326->1329 1327->1298 1327->1319 1330 7ff7bc20210f-7ff7bc202115 1328->1330 1331 7ff7bc2020ba-7ff7bc2020c5 1328->1331 1329->1327 1334 7ff7bc20212e-7ff7bc202131 1330->1334 1335 7ff7bc202117-7ff7bc20211a 1330->1335 1332 7ff7bc2020e5-7ff7bc2020e9 1331->1332 1333 7ff7bc2020c7-7ff7bc2020ca 1331->1333 1339 7ff7bc202100-7ff7bc202109 1332->1339 1340 7ff7bc2020eb-7ff7bc2020ef 1332->1340 1337 7ff7bc2020d0-7ff7bc2020d4 1333->1337 1338 7ff7bc201ffc-7ff7bc202005 1333->1338 1334->1302 1336 7ff7bc202133-7ff7bc202136 1334->1336 1335->1302 1336->1302 1341 7ff7bc202138-7ff7bc20213c 1336->1341 1337->1330 1343 7ff7bc2020d6-7ff7bc2020dd 1337->1343 1338->1330 1342 7ff7bc20200b 1338->1342 1339->1322 1339->1330 1340->1330 1344 7ff7bc2020f1-7ff7bc2020f8 1340->1344 1341->1302 1345 7ff7bc20213e-7ff7bc202164 call 7ff7bc2271a0 1341->1345 1342->1322 1343->1322 1346 7ff7bc2020e3 1343->1346 1344->1322 1347 7ff7bc2020fe 1344->1347 1345->1266 1346->1330 1347->1330
    APIs
    Strings
    • NTDLL.DLL, xrefs: 00007FF7BC201B6C
    • assertion failed: self.is_char_boundary(new_len)/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\alloc\src\string.rs, xrefs: 00007FF7BC20214C
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: FormatHandleMessageModule
    • String ID: NTDLL.DLL$assertion failed: self.is_char_boundary(new_len)/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\alloc\src\string.rs
    • API String ID: 2046974992-908490256
    • Opcode ID: 4d683401d145d04b8b0d3254484aac74a3dce92407b105a9123b0a38d3545261
    • Instruction ID: 922604085b950f60187cd45c61e9a67b2158d9b530f72265c2ee40a5a0a94114
    • Opcode Fuzzy Hash: 4d683401d145d04b8b0d3254484aac74a3dce92407b105a9123b0a38d3545261
    • Instruction Fuzzy Hash: 40F1A432A096C249F7319F29D8047F9A751FB26798F848137DB8D0AB9DDF789285D320

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: ErrorFileObjectSingleStatusWaitWrite
    • String ID:
    • API String ID: 3447438843-0
    • Opcode ID: 955f07289bb48e6222bce8d37c28d9ea8498b0f49b00e53e090563fdb6ae2b94
    • Instruction ID: 66387c17aaa5e96b8b2f4aa0116a4f508d0c5a81ae2c5ed0be23c917741147cc
    • Opcode Fuzzy Hash: 955f07289bb48e6222bce8d37c28d9ea8498b0f49b00e53e090563fdb6ae2b94
    • Instruction Fuzzy Hash: 52218432A18B8586F7109B69F4503AAB3A5EB95350F50C235E7DD46BA8EF7CE1C4CB10

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1122 7ff7bc206a00-7ff7bc206a3b call 7ff7bc200f00 1125 7ff7bc206a3d-7ff7bc206a42 1122->1125 1126 7ff7bc206a47-7ff7bc206a7f call 7ff7bc206c60 1122->1126 1127 7ff7bc206c11-7ff7bc206c28 1125->1127 1130 7ff7bc206a81-7ff7bc206a84 1126->1130 1131 7ff7bc206a89-7ff7bc206a93 1126->1131 1130->1127 1132 7ff7bc206a95-7ff7bc206a97 1131->1132 1133 7ff7bc206a9f-7ff7bc206aa1 1131->1133 1134 7ff7bc206aa3-7ff7bc206aab 1132->1134 1135 7ff7bc206a99-7ff7bc206a9d 1132->1135 1133->1134 1136 7ff7bc206ac9-7ff7bc206acd 1133->1136 1139 7ff7bc206add-7ff7bc206ae1 1134->1139 1140 7ff7bc206aad-7ff7bc206aaf 1134->1140 1135->1139 1137 7ff7bc206ab1-7ff7bc206abe 1136->1137 1138 7ff7bc206acf-7ff7bc206ad3 1136->1138 1144 7ff7bc206ac4 1137->1144 1145 7ff7bc206bff-7ff7bc206c0b HeapFree 1137->1145 1138->1137 1141 7ff7bc206ad5-7ff7bc206ad9 1138->1141 1142 7ff7bc206af3-7ff7bc206af5 1139->1142 1143 7ff7bc206ae3-7ff7bc206ae5 1139->1143 1140->1137 1140->1139 1141->1137 1146 7ff7bc206adb 1141->1146 1147 7ff7bc206af7-7ff7bc206aff 1142->1147 1149 7ff7bc206b06-7ff7bc206b16 1142->1149 1143->1147 1148 7ff7bc206ae7-7ff7bc206aef 1143->1148 1144->1127 1145->1127 1146->1139 1150 7ff7bc206b01-7ff7bc206b04 1147->1150 1152 7ff7bc206b18-7ff7bc206b1c 1147->1152 1148->1150 1151 7ff7bc206af1 1148->1151 1149->1150 1149->1152 1153 7ff7bc206b58-7ff7bc206b98 CreateFileW 1150->1153 1151->1152 1154 7ff7bc206b1e-7ff7bc206b3a 1152->1154 1155 7ff7bc206b3c-7ff7bc206b3e 1152->1155 1156 7ff7bc206be4-7ff7bc206bfd GetLastError 1153->1156 1157 7ff7bc206b9a-7ff7bc206ba0 1153->1157 1154->1153 1158 7ff7bc206b40-7ff7bc206b42 1155->1158 1159 7ff7bc206b4b-7ff7bc206b4d 1155->1159 1156->1127 1156->1145 1162 7ff7bc206ba2-7ff7bc206ba6 1157->1162 1163 7ff7bc206bdb-7ff7bc206be0 1157->1163 1160 7ff7bc206b44-7ff7bc206b49 1158->1160 1161 7ff7bc206b53 1158->1161 1159->1137 1159->1161 1160->1153 1161->1153 1162->1163 1164 7ff7bc206ba8-7ff7bc206bb3 GetLastError 1162->1164 1163->1145 1165 7ff7bc206be2 1163->1165 1164->1163 1166 7ff7bc206bb5-7ff7bc206bd9 SetFileInformationByHandle 1164->1166 1165->1127 1166->1163 1167 7ff7bc206c29-7ff7bc206c45 GetLastError CloseHandle 1166->1167 1168 7ff7bc206c59-7ff7bc206c5c 1167->1168 1169 7ff7bc206c47-7ff7bc206c53 HeapFree 1167->1169 1168->1127 1169->1168
    APIs
      • Part of subcall function 00007FF7BC200F00: HeapFree.KERNEL32 ref: 00007FF7BC201029
    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,?,?,C:\Windows\Debug\b.cache,?,00007FF7BC20866A), ref: 00007FF7BC206C29
    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,?,?,C:\Windows\Debug\b.cache,?,00007FF7BC20866A), ref: 00007FF7BC206C3C
    • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,?,?,C:\Windows\Debug\b.cache,?,00007FF7BC20866A), ref: 00007FF7BC206C53
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: FreeHeap$CloseErrorHandleLast
    • String ID: C:\Windows\Debug\b.cache
    • API String ID: 1415190448-1668539190
    • Opcode ID: 74c8f011379a3549005a8422be962403b0e3a36ac7212c50cd21c35511baf40c
    • Instruction ID: 377baf1b59b7533d09ab30ecab01623841e8675f33e87f0140adeae349d4b888
    • Opcode Fuzzy Hash: 74c8f011379a3549005a8422be962403b0e3a36ac7212c50cd21c35511baf40c
    • Instruction Fuzzy Hash: 6061F6A190C25646FB606B2996413F9AB90AF67B94F94C132DF5E177CCCE3DE884C720

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1210 7ff7bc1f2920-7ff7bc1f293b call 7ff7bc2187e0 1213 7ff7bc1f293d-7ff7bc1f294a 1210->1213 1214 7ff7bc1f299a-7ff7bc1f29ae call 7ff7bc2187e0 1210->1214 1213->1214 1216 7ff7bc1f294c-7ff7bc1f294f 1213->1216 1219 7ff7bc1f29b0-7ff7bc1f29bd 1214->1219 1220 7ff7bc1f2a0d-7ff7bc1f2a21 call 7ff7bc2187e0 1214->1220 1216->1214 1218 7ff7bc1f2951-7ff7bc1f2969 1216->1218 1226 7ff7bc1f296b-7ff7bc1f2970 1218->1226 1227 7ff7bc1f2988-7ff7bc1f2994 HeapFree 1218->1227 1219->1220 1222 7ff7bc1f29bf-7ff7bc1f29c2 1219->1222 1230 7ff7bc1f2a23-7ff7bc1f2a30 1220->1230 1231 7ff7bc1f2a80-7ff7bc1f2a99 call 7ff7bc2073f0 1220->1231 1222->1220 1225 7ff7bc1f29c4-7ff7bc1f29dc 1222->1225 1236 7ff7bc1f29de-7ff7bc1f29e3 1225->1236 1237 7ff7bc1f29fb-7ff7bc1f2a07 HeapFree 1225->1237 1228 7ff7bc1f2976-7ff7bc1f2982 HeapFree 1226->1228 1229 7ff7bc1f2972 1226->1229 1227->1214 1228->1227 1229->1228 1230->1231 1232 7ff7bc1f2a32-7ff7bc1f2a35 1230->1232 1238 7ff7bc1f2a9e-7ff7bc1f2aa1 1231->1238 1232->1231 1235 7ff7bc1f2a37-7ff7bc1f2a4f 1232->1235 1246 7ff7bc1f2a51-7ff7bc1f2a56 1235->1246 1247 7ff7bc1f2a6e-7ff7bc1f2a7a HeapFree 1235->1247 1239 7ff7bc1f29e5 1236->1239 1240 7ff7bc1f29e9-7ff7bc1f29f5 HeapFree 1236->1240 1237->1220 1241 7ff7bc1f2aa3-7ff7bc1f2ab0 1238->1241 1242 7ff7bc1f2ab7-7ff7bc1f2abe 1238->1242 1239->1240 1240->1237 1241->1242 1244 7ff7bc1f2ab2-7ff7bc1f2ab5 1241->1244 1244->1242 1245 7ff7bc1f2abf-7ff7bc1f2ad7 1244->1245 1251 7ff7bc1f2af6-7ff7bc1f2b09 HeapFree 1245->1251 1252 7ff7bc1f2ad9-7ff7bc1f2ade 1245->1252 1248 7ff7bc1f2a5c-7ff7bc1f2a68 HeapFree 1246->1248 1249 7ff7bc1f2a58 1246->1249 1247->1231 1248->1247 1249->1248 1253 7ff7bc1f2ae4-7ff7bc1f2af0 HeapFree 1252->1253 1254 7ff7bc1f2ae0 1252->1254 1253->1251 1254->1253
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: FreeHeap$DeleteFile
    • String ID: C:\Windows\Debug\pay.exe[exec] $C:\Windows\Sysmon64.sysC:\Windows\Debug\b.cache
    • API String ID: 3719452183-883891438
    • Opcode ID: 648f40e87a3a67498d6af36e687083245c408357acd022bd2d68ec26150df7a9
    • Instruction ID: c31c519ae7d9ec85e78493f184549732d6c1906b2660fc2a5132f40ccaf2fa5e
    • Opcode Fuzzy Hash: 648f40e87a3a67498d6af36e687083245c408357acd022bd2d68ec26150df7a9
    • Instruction Fuzzy Hash: 35519165B09A4681FA14EB5AE5453B8A392EFA6B90F89C031CF1D577ACDF3CD442C320

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: ErrorExceptionGuaranteeHandlerLastStackThreadVectored
    • String ID: ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs$main
    • API String ID: 1207050972-2091503091
    • Opcode ID: dfdb4e87f092b255c515ec56ced92a11e0b940eb2f6b6ca17041038ed7d0a86f
    • Instruction ID: 15902a61252522389f8dd839065b0a117eb136f0f150d872e26a1f21ccc5058e
    • Opcode Fuzzy Hash: dfdb4e87f092b255c515ec56ced92a11e0b940eb2f6b6ca17041038ed7d0a86f
    • Instruction Fuzzy Hash: 50518D62E18B4688F710ABA8E8503FDA3A5BB66354F90C135CB4D6A79CDF7C9095C320

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1390 7ff7bc2187e0-7ff7bc21880e call 7ff7bc200f00 1393 7ff7bc21889b-7ff7bc2188a5 1390->1393 1394 7ff7bc218814-7ff7bc218847 call 7ff7bc206c60 1390->1394 1394->1393 1397 7ff7bc218849-7ff7bc218854 DeleteFileW 1394->1397 1398 7ff7bc218871-7ff7bc218884 GetLastError 1397->1398 1399 7ff7bc218856-7ff7bc218859 1397->1399 1402 7ff7bc218898 1398->1402 1403 7ff7bc218886-7ff7bc218892 HeapFree 1398->1403 1400 7ff7bc21885b-7ff7bc218867 HeapFree 1399->1400 1401 7ff7bc21886d-7ff7bc21886f 1399->1401 1400->1401 1401->1393 1402->1393 1403->1402
    APIs
      • Part of subcall function 00007FF7BC200F00: HeapFree.KERNEL32 ref: 00007FF7BC201029
    • DeleteFileW.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF7BC1F2938), ref: 00007FF7BC21884C
    • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF7BC1F2938), ref: 00007FF7BC218867
    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF7BC1F2938), ref: 00007FF7BC218871
    • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF7BC1F2938), ref: 00007FF7BC218892
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: FreeHeap$DeleteErrorFileLast
    • String ID:
    • API String ID: 1166609798-0
    • Opcode ID: 3f11c54b601b35f42eb0c6b817f30543dba6dce3a726dd26b873697eed452d20
    • Instruction ID: 23a28a7c5f85dae06b4314d80bdd504fff458b9a100ae1ec7bf3107d0aad9f6f
    • Opcode Fuzzy Hash: 3f11c54b601b35f42eb0c6b817f30543dba6dce3a726dd26b873697eed452d20
    • Instruction Fuzzy Hash: 59110A25E0CA5581FA10AB1AE8441E9E361AFEAFD0F898131EF5D17B6CDE3CD4418720

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_release_startup_lock
    • String ID:
    • API String ID: 3058843127-0
    • Opcode ID: a53aeb83fb362745e92f1308b851b4be0b3ac8df36c49d980486a2af274f56fc
    • Instruction ID: 076109ed5abd1e5b7820a8b8366a9eceb4b1814fa532beae06c7b03e9f4adda1
    • Opcode Fuzzy Hash: a53aeb83fb362745e92f1308b851b4be0b3ac8df36c49d980486a2af274f56fc
    • Instruction Fuzzy Hash: 0F312B21A0824286FA14BB2CD8913F9A391AFA7784FD58434EB4D4B3DFDE7CA5448270

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: FormatFreeHandleHeapMessageModule
    • String ID: }0x$OscodekindmessageKindErrorCustomerror (os error )
    • API String ID: 3599032235-2409297627
    • Opcode ID: 86b7598a11edca7d32f97b95f18b1462b13d7ad85f12e48f097111f8dcbba088
    • Instruction ID: 09b6f102aebb68c12e659a02f61c013f8d114131d0a919dced0ce0b43be9450e
    • Opcode Fuzzy Hash: 86b7598a11edca7d32f97b95f18b1462b13d7ad85f12e48f097111f8dcbba088
    • Instruction Fuzzy Hash: DF417E66B18A5689FB10EB69D4407EC7B70AB5AB88F804136CF4D27B69CF3CD645C320

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: FreeHeapThread$CurrentDescription
    • String ID:
    • API String ID: 2762239883-0
    • Opcode ID: 6baee0de14b630ea9e238a644f8e62af97798e8afe6627601fc3d4f3ffd1fa68
    • Instruction ID: 830f3780105408e98f3b90531ee29de092949305084be9b6376eec2a1773b40d
    • Opcode Fuzzy Hash: 6baee0de14b630ea9e238a644f8e62af97798e8afe6627601fc3d4f3ffd1fa68
    • Instruction Fuzzy Hash: BF012951A08A4A81FA10B71AF4043ADE761AFA7BD0FD48032DF0D277ACDE2CD5868710

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1511 7ff7bc1f3b90-7ff7bc1f3bb2 1512 7ff7bc1f3c7d-7ff7bc1f3c82 1511->1512 1513 7ff7bc1f3bb8-7ff7bc1f3bc4 1511->1513 1516 7ff7bc1f3c84-7ff7bc1f3ca2 call 7ff7bc1f4c50 1512->1516 1514 7ff7bc1f3bc6-7ff7bc1f3bcb 1513->1514 1515 7ff7bc1f3bcd-7ff7bc1f3bda 1513->1515 1517 7ff7bc1f3bfc-7ff7bc1f3bff 1514->1517 1518 7ff7bc1f3be0-7ff7bc1f3bfa 1515->1518 1522 7ff7bc1f3ca7-7ff7bc1f3ca9 1516->1522 1520 7ff7bc1f3c01-7ff7bc1f3c14 1517->1520 1521 7ff7bc1f3c2d-7ff7bc1f3c32 1517->1521 1518->1517 1518->1518 1523 7ff7bc1f3c20-7ff7bc1f3c2b 1520->1523 1526 7ff7bc1f3c34-7ff7bc1f3c46 1521->1526 1527 7ff7bc1f3c4f-7ff7bc1f3c52 1521->1527 1524 7ff7bc1f3cc3-7ff7bc1f3ceb call 7ff7bc227470 1522->1524 1525 7ff7bc1f3cab-7ff7bc1f3cc2 1522->1525 1523->1521 1523->1523 1533 7ff7bc1f3ced-7ff7bc1f3d16 call 7ff7bc1f3a10 1524->1533 1526->1512 1529 7ff7bc1f3c48-7ff7bc1f3c4a 1526->1529 1527->1512 1530 7ff7bc1f3c54 1527->1530 1529->1512 1532 7ff7bc1f3c4c 1529->1532 1530->1533 1534 7ff7bc1f3c5a-7ff7bc1f3c6e call 7ff7bc215820 1530->1534 1532->1527 1540 7ff7bc1f3d2b-7ff7bc1f3d34 1533->1540 1541 7ff7bc1f3d18-7ff7bc1f3d25 HeapFree 1533->1541 1534->1516 1539 7ff7bc1f3c70-7ff7bc1f3c78 call 7ff7bc226f10 1534->1539 1539->1512 1541->1540
    APIs
    • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000001,?,?,?,00007FF7BC1F25A4), ref: 00007FF7BC1F3D25
    Strings
    • a formatting trait implementation returned an errorlibrary\alloc\src\fmt.rs, xrefs: 00007FF7BC1F3CCF
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID: a formatting trait implementation returned an errorlibrary\alloc\src\fmt.rs
    • API String ID: 3298025750-3246017335
    • Opcode ID: e06e292ca42a74a3870381d6474eef80ecab71b2a2ab64c53d59d02fcaefcf40
    • Instruction ID: 8eaba0334998156b1bb825220df4d1821927cf23692e439efd6c27d734c89be4
    • Opcode Fuzzy Hash: e06e292ca42a74a3870381d6474eef80ecab71b2a2ab64c53d59d02fcaefcf40
    • Instruction Fuzzy Hash: 4C41A5A2E04A4945FF10AB58E8543F8A364FF66394FC8C631DF1D16698DF7CD194C220

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1543 7ff7bc2073f0-7ff7bc20744e call 7ff7bc206a00 1546 7ff7bc207450-7ff7bc207453 1543->1546 1547 7ff7bc207458-7ff7bc20745f 1543->1547 1548 7ff7bc207524-7ff7bc207537 1546->1548 1549 7ff7bc207465-7ff7bc20747b 1547->1549 1550 7ff7bc207517 1547->1550 1551 7ff7bc20749c-7ff7bc2074a5 call 7ff7bc200230 1549->1551 1552 7ff7bc20751a-7ff7bc20751e CloseHandle 1550->1552 1554 7ff7bc2074aa-7ff7bc2074af 1551->1554 1552->1548 1555 7ff7bc2074b1-7ff7bc2074c0 1554->1555 1556 7ff7bc2074d0-7ff7bc2074d7 1554->1556 1555->1556 1557 7ff7bc2074d9-7ff7bc2074df 1556->1557 1558 7ff7bc207538-7ff7bc20753b 1556->1558 1559 7ff7bc2074e1-7ff7bc2074ee 1557->1559 1560 7ff7bc20753d-7ff7bc207584 call 7ff7bc227020 CloseHandle 1557->1560 1558->1552 1559->1551 1562 7ff7bc2074f0 1559->1562 1562->1550
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5514469a56f24b8deb41b0aa8db4f51faeae5f1f00987259b3bd6e97293158be
    • Instruction ID: 7e1dc2c64da192376f5678d2d5b19af9b762d4fa1b899f76590e91ebaff29aac
    • Opcode Fuzzy Hash: 5514469a56f24b8deb41b0aa8db4f51faeae5f1f00987259b3bd6e97293158be
    • Instruction Fuzzy Hash: 0931C822F1965594F701DB69A8047EDAB70BB25BA8F848532DE0C17798CF78D586C320
    APIs
    • CloseHandle.KERNELBASE(?,?,00000001,?,?,?,00000001,00000002,00000001,?,00007FF7BC1F25C0), ref: 00007FF7BC20751E
    • CloseHandle.KERNEL32(?,?,00000000,00000001,?,?,?,00000001,?,?,?,00000001,00000002,00000001,?,00007FF7BC1F25C0), ref: 00007FF7BC20756D
      • Part of subcall function 00007FF7BC200230: NtWriteFile.NTDLL ref: 00007FF7BC20027D
      • Part of subcall function 00007FF7BC200230: WaitForSingleObject.KERNEL32 ref: 00007FF7BC200292
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: CloseHandle$FileObjectSingleWaitWrite
    • String ID:
    • API String ID: 1197516534-0
    • Opcode ID: c2a394939975c5385155312e737bb6feae2b03989bf40223705a97c30feb1c17
    • Instruction ID: 14d8cdce40b2f6efe97d5231c4c8e44ef35bd84621b191b15dca2ba54b1d622f
    • Opcode Fuzzy Hash: c2a394939975c5385155312e737bb6feae2b03989bf40223705a97c30feb1c17
    • Instruction Fuzzy Hash: 36F0C812F1860945F912A75DA8413FC97606F16FE9F404433CF0C17748CE7CE4C28220
    APIs
    • CloseHandle.KERNELBASE(?,?,00000001,?,?,?,00000001,00000002,00000001,?,00007FF7BC1F25C0), ref: 00007FF7BC20751E
      • Part of subcall function 00007FF7BC200230: NtWriteFile.NTDLL ref: 00007FF7BC20027D
      • Part of subcall function 00007FF7BC200230: WaitForSingleObject.KERNEL32 ref: 00007FF7BC200292
    • CloseHandle.KERNEL32(?,?,00000000,00000001,?,?,?,00000001,?,?,?,00000001,00000002,00000001,?,00007FF7BC1F25C0), ref: 00007FF7BC20756D
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: CloseHandle$FileObjectSingleWaitWrite
    • String ID:
    • API String ID: 1197516534-0
    • Opcode ID: 0dc99002625e40f21f450e38f5f5fe04962034ca88a6d7483f5f9f0e8ee8e813
    • Instruction ID: 342082ac794172f5d9d31b7b6add8e349144947d23cd812d6f2384188d94d55a
    • Opcode Fuzzy Hash: 0dc99002625e40f21f450e38f5f5fe04962034ca88a6d7483f5f9f0e8ee8e813
    • Instruction Fuzzy Hash: AEF09023F18A1486F702E768E8513AD6764BB11BA8F404436CF0D17758CF38E4D28220
    APIs
    • CloseHandle.KERNELBASE(?,?,00000001,?,?,?,00000001,00000002,00000001,?,00007FF7BC1F25C0), ref: 00007FF7BC20751E
    • CloseHandle.KERNEL32(?,?,00000000,00000001,?,?,?,00000001,?,?,?,00000001,00000002,00000001,?,00007FF7BC1F25C0), ref: 00007FF7BC20756D
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: CloseHandle
    • String ID:
    • API String ID: 2962429428-0
    • Opcode ID: c9fb2924f1cdda838a45035efe7a2c96366cda1922bb4551d332a6eaf018c9f6
    • Instruction ID: 1e974f9bb058a3ab4c5082f893e9f390caa0b235540287de2150c95b608adbfa
    • Opcode Fuzzy Hash: c9fb2924f1cdda838a45035efe7a2c96366cda1922bb4551d332a6eaf018c9f6
    • Instruction Fuzzy Hash: 9AE06D23F0AA5945FE02A769A9500F997606B55FE4B848472CF0D23B589F38E4C38220
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: AddressErrorLastProc$Current$FreeHeapMutexProcess$CaptureCloseContextCreateDirectoryEntryFunctionHandleLibraryLoadLookupObjectReleaseSingleWait
    • String ID: ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs$SymAddrIncludeInlineTrace$SymGetOptions$SymInitializeW$SymSetOptions$dbghelp.dll
    • API String ID: 2343345281-1634453497
    • Opcode ID: e179861b1648cb7c051f4fc5105cdfc64c61a980d5268fa4ae04cbabc74c1742
    • Instruction ID: ecfc9210fb20736c12699952a772529d3031a6cf7a097b691e4432116badc726
    • Opcode Fuzzy Hash: e179861b1648cb7c051f4fc5105cdfc64c61a980d5268fa4ae04cbabc74c1742
    • Instruction Fuzzy Hash: 7E325021A09BC688E770AF29DC443F963A0FB66759F848135CB5D5B798EF3C9245C720
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: AddressProc$CurrentProcess
    • String ID: ($($SymAddrIncludeInlineTrace$SymFromAddrW$SymFromInlineContextW$SymGetLineFromAddrW64$SymGetLineFromInlineContextW$SymQueryInlineTrace$X$X
    • API String ID: 2190909847-3202392857
    • Opcode ID: 13d30a5d6f6064d8e4caec754976019cb8802399ed2beacfb975e3ada03743c9
    • Instruction ID: feb045fae12bd2e3cbf14c3111be92341b971dc148f77f071ddf7a0183655747
    • Opcode Fuzzy Hash: 13d30a5d6f6064d8e4caec754976019cb8802399ed2beacfb975e3ada03743c9
    • Instruction Fuzzy Hash: F662CF2191CAC686FB25AB18E4553FAB364FBA6390F808136EB8E03798DF3DD545C750
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f4b7f1bb953da3238e8ff0da96104060795636b06b9cb53735873d4db676d6ee
    • Instruction ID: fd33a11cd804348701906212351de3ea44eede358f0821531e5b08213db4f007
    • Opcode Fuzzy Hash: f4b7f1bb953da3238e8ff0da96104060795636b06b9cb53735873d4db676d6ee
    • Instruction Fuzzy Hash: FB428362A047C185EB35AF29DC443E9A3A5FB66B98F848136DF1C5B798CF7C9285C310
    APIs
    Strings
    • ,(><&*@, xrefs: 00007FF7BC1F32F8
    • ExitStatussrc\lib.rsC:\Windows\Debug\fail.txtwlQYLoPCil3niI7x8CvR9EtNtL/aeaHrZ23LP3fAsJogVTIzdnZ5Pi09ZVeHFkiB[dec] , xrefs: 00007FF7BC1F3286
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID: ,(><&*@$ExitStatussrc\lib.rsC:\Windows\Debug\fail.txtwlQYLoPCil3niI7x8CvR9EtNtL/aeaHrZ23LP3fAsJogVTIzdnZ5Pi09ZVeHFkiB[dec]
    • API String ID: 3298025750-2880284916
    • Opcode ID: d34abe99ee85a8d81092baebeb2a3be5bca439f4974624b47a44ae069c6c5bcd
    • Instruction ID: f87189cac7a884b26b1e4fe77ed98f9b769afe29cace8dcd8e758280537368f0
    • Opcode Fuzzy Hash: d34abe99ee85a8d81092baebeb2a3be5bca439f4974624b47a44ae069c6c5bcd
    • Instruction Fuzzy Hash: C412D6A1B1964982EA55AB1AF4043B9A795FB66BE0FC88531CF1D677D8CE3CE441C320
    APIs
    Strings
    • ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs, xrefs: 00007FF7BC211876
    • RUST_MIN_STACKfatal runtime error: assertion failed: thread_info.stack_guard.get().is_none() && thread_info.thread.get().is_none(), xrefs: 00007FF7BC2113E8
    • failed to spawn thread, xrefs: 00007FF7BC211833
    • cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs, xrefs: 00007FF7BC2118B1
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: Handle$Close$CreateCurrentDuplicateErrorFreeHeapLastProcessThread
    • String ID: ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs$RUST_MIN_STACKfatal runtime error: assertion failed: thread_info.stack_guard.get().is_none() && thread_info.thread.get().is_none()$cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs$failed to spawn thread
    • API String ID: 302064629-2049688190
    • Opcode ID: 5c3aa810bde16558ab61a2e3f7b964e9e2c6a2fa20747e712a247823885c5cb3
    • Instruction ID: 5366d4957231f7a4221703116671246f9aa6a0c682124d2bf069a49dc5e9d5e2
    • Opcode Fuzzy Hash: 5c3aa810bde16558ab61a2e3f7b964e9e2c6a2fa20747e712a247823885c5cb3
    • Instruction Fuzzy Hash: 4F029022A09B8285FB11AB29D8403F9A7A1FB66788F84C535DB4D07B9DDF7CE445C360
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: ErrorLast$FullNamePath
    • String ID: ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs$\\?\\\?\UNC\
    • API String ID: 2482867836-3002053107
    • Opcode ID: 9de0db11645004223b34e73f359ac36371c9122c59b718ae8da97775cdc01e1c
    • Instruction ID: bf083b267c7770ce6f07b9b25f4b6e075d2b1bafb64d453592a991265c57074a
    • Opcode Fuzzy Hash: 9de0db11645004223b34e73f359ac36371c9122c59b718ae8da97775cdc01e1c
    • Instruction Fuzzy Hash: 6912AF62E08A8685F770AF19D9443F8A3A5FB26B94F80C136DF5D4B798DF389585C320
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: CryptCurrentFreeHeapProcessRandom
    • String ID:
    • API String ID: 1323412823-0
    • Opcode ID: 017971231658408b556b61c2cb63df5b05b7af43835d05adea0601a85bad8706
    • Instruction ID: 54c9fb022e4a38a55f6683079705af8e4e0c189bb11f2fe9feeb7645bcde8f07
    • Opcode Fuzzy Hash: 017971231658408b556b61c2cb63df5b05b7af43835d05adea0601a85bad8706
    • Instruction Fuzzy Hash: EC22A222A08AC189E760DF29DC003EA67A0FB5679CF948235EB6D477DDDF78D5458320
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: CloseEnvironmentHandleStrings
    • String ID:
    • API String ID: 1140201626-0
    • Opcode ID: 77e72ca62734a68266d704608df4450f7570c309645dea6245818f786da84e92
    • Instruction ID: 4963b66358d84323bfc4fb99fc4a9ffb362b04484175bf6372a2ad1edf3956c4
    • Opcode Fuzzy Hash: 77e72ca62734a68266d704608df4450f7570c309645dea6245818f786da84e92
    • Instruction Fuzzy Hash: 83427162A05BC189FB70AF29D8453FA63A0FB56798F848136CB6D5B7D8DF789241C310
    APIs
    • InitializeProcThreadAttributeList.KERNEL32(?,?,?,?,?,?,?,?,00000000,00000002,00000004,00000004,?,?,00007FF7BC20CE7C), ref: 00007FF7BC211E87
    • HeapReAlloc.KERNEL32(?,?,?,?,?,?,?,?,00000000,00000002,00000004,00000004,?,?,00007FF7BC20CE7C), ref: 00007FF7BC211F0A
    • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF7BC21223B
      • Part of subcall function 00007FF7BC215820: GetProcessHeap.KERNEL32(?,?,?,?,00007FF7BC1FF0AD,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF7BC215837
    • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,00000000,00000002,00000004,00000004,?,?,00007FF7BC20CE7C), ref: 00007FF7BC211F36
    • InitializeProcThreadAttributeList.KERNEL32(?,?,?,?,?,?,?,?,00000000,00000002,00000004,00000004,?,?,00007FF7BC20CE7C), ref: 00007FF7BC211F4E
    • UpdateProcThreadAttribute.KERNEL32(?,?,?,?,?,?,?,?,00000000,00000002,00000004,00000004,?,?,00007FF7BC20CE7C), ref: 00007FF7BC211FBA
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: Heap$AttributeProcThread$FreeInitializeList$AllocProcessUpdate
    • String ID:
    • API String ID: 2216397699-0
    • Opcode ID: e53489ee4274e7c4be6ec7bd31fcc1242f5e101a0b888f9e7c67b0317bd42381
    • Instruction ID: 4cc5209be337eb5a3c15b36904fdac1892277df2fe8c842373ba7c715937cae1
    • Opcode Fuzzy Hash: e53489ee4274e7c4be6ec7bd31fcc1242f5e101a0b888f9e7c67b0317bd42381
    • Instruction Fuzzy Hash: FEA1E925F18A5585EA14AB5EDC047F9A3A1BF6ABB4F948231EF2D173D8DE3D9041C220
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 3140674995-0
    • Opcode ID: af00a380bd108058a5f6b938f01f43a4e6bd13d564c60caa60252e7e250b45ca
    • Instruction ID: e4610015b12e608e900ff99bad82d3d285d3026ac463b2484509034ab0c7f700
    • Opcode Fuzzy Hash: af00a380bd108058a5f6b938f01f43a4e6bd13d564c60caa60252e7e250b45ca
    • Instruction Fuzzy Hash: 6E319272608B8589EB60AF68E8403EDB365FB95744F848139DB4D47B98DF3CC548C720
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
    • String ID:
    • API String ID: 1239891234-0
    • Opcode ID: 04ed512f23599af0a347c671bdc6bc3996e67deb4400620a88918fab9d843f5e
    • Instruction ID: 2117f5b019e28c521b8ea65eeea2502a417fccf9ded55834aa738322da6d0ea6
    • Opcode Fuzzy Hash: 04ed512f23599af0a347c671bdc6bc3996e67deb4400620a88918fab9d843f5e
    • Instruction Fuzzy Hash: A5317F32618B8185EB60EF29E8442EEB3A4FB95754F904135EB9D47B98DF38C545CB10
    APIs
    Strings
    • assertion failed: idx < CAPACITY/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\alloc\src\collections\btree\node.rsassertion failed: edge.height == self.height - 1, xrefs: 00007FF7BC20FF22
    • assertion failed: edge.height == self.node.height - 1, xrefs: 00007FF7BC20FDB5
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: FreeHeap$CompareOrdinalString
    • String ID: assertion failed: edge.height == self.node.height - 1$assertion failed: idx < CAPACITY/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\alloc\src\collections\btree\node.rsassertion failed: edge.height == self.height - 1
    • API String ID: 3984308579-1420224799
    • Opcode ID: 315e935e0afb3f92c3c381ca3d263db4b97b37bcf75cd4ed15db78d80ccfcace
    • Instruction ID: 8b12a72dcb98ae7fba6ad12f826d0963d91d4c2c77c107c7056ceeb5306c4160
    • Opcode Fuzzy Hash: 315e935e0afb3f92c3c381ca3d263db4b97b37bcf75cd4ed15db78d80ccfcace
    • Instruction Fuzzy Hash: FCB2C232908BC585E7629F28D8457E973A4FF69788F459222DF8C17769EF38A2D5C300
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
    • String ID:
    • API String ID: 2933794660-0
    • Opcode ID: bf77ed9bb4f44f4367d8aaf785dcc34d19ac6d3f24457b74f1320783341c77e1
    • Instruction ID: 67621e186bc914b89f5469d2137cbc32a92ef192885764d6b5f85d2d926f9d01
    • Opcode Fuzzy Hash: bf77ed9bb4f44f4367d8aaf785dcc34d19ac6d3f24457b74f1320783341c77e1
    • Instruction Fuzzy Hash: 13114F22B14B0589EB00EB64E8452E873A4F76A758F841A31DB2D86768DF3CD1948350
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID:
    • String ID: ,(><&*@$SizeLimitExhausted$called `Result::unwrap()` on an `Err` value
    • API String ID: 0-3044266859
    • Opcode ID: 919d02489e86dee6ee5af8ec1b10f307c7738dff768c3888ddd1a2566d9161ff
    • Instruction ID: bfbea401f5e805aa964d047e210c560e01dbac443728c9f8a1ec31931f0bf540
    • Opcode Fuzzy Hash: 919d02489e86dee6ee5af8ec1b10f307c7738dff768c3888ddd1a2566d9161ff
    • Instruction Fuzzy Hash: 577246A2A1C59A81EA35BF1CB404AB9E755AB23790FC4C231DB5E267DCDE3DE540D320
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: ExceptionRaise_clrfp
    • String ID:
    • API String ID: 15204871-0
    • Opcode ID: b072ad7d98caaf0f51c4c16e5e4e561c34b9f2202122b8ab130ad6c6231e2640
    • Instruction ID: 6a01a2a292b1328cae0d451fc819b15a61992b76f46106f06ef9f8f1719da937
    • Opcode Fuzzy Hash: b072ad7d98caaf0f51c4c16e5e4e561c34b9f2202122b8ab130ad6c6231e2640
    • Instruction Fuzzy Hash: 85B17B73600B898BEB15CF2DC9463A87BA0F745B48F58C921DB9D8B7A8CB39D451C710
    Strings
    • ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs, xrefs: 00007FF7BC1F746D
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID:
    • String ID: ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs
    • API String ID: 0-3449088094
    • Opcode ID: 56347dc2f99ceb86dad3b301cc21006c8033dfa34a95fabfed49c5dc476ecc07
    • Instruction ID: 12fe33324c8d89faa6fe819a329989a28ce68b70b6992d17f0687998b209b025
    • Opcode Fuzzy Hash: 56347dc2f99ceb86dad3b301cc21006c8033dfa34a95fabfed49c5dc476ecc07
    • Instruction Fuzzy Hash: 13F15EA2B1C6A941FB50EB29E414BB99755BB22B90FC0C231DF5E17BC8DE3CE5458360
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID:
    • String ID: punycode{-}0
    • API String ID: 0-2450133883
    • Opcode ID: 3e65c861ce83e9dffb726d1d5c200b3d5866791d32555dd33f3c3a7af79bc62b
    • Instruction ID: a9d4dbed571322428a71e53a3e56ccfd4cc338f674d0699dfca498033fc805c6
    • Opcode Fuzzy Hash: 3e65c861ce83e9dffb726d1d5c200b3d5866791d32555dd33f3c3a7af79bc62b
    • Instruction Fuzzy Hash: 2DE1E3A2B1874982FB609B1AB44476AA795FBA7790F84C131DF4D13BD8DE3CE445C720
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 88d822d1eb0e5264bbe4a530db525bd6adf2d53be2a577bebb393a630bca7bde
    • Instruction ID: 7c7c15203906e400a013f15b7e0bafb22aabd3d4db05925351776d71ba55f383
    • Opcode Fuzzy Hash: 88d822d1eb0e5264bbe4a530db525bd6adf2d53be2a577bebb393a630bca7bde
    • Instruction Fuzzy Hash: 7E51C622B086C145FB20AB7AEC445EABBA1BB56794F948135EF6C67B9DCE3CD401C710
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo
    • String ID:
    • API String ID: 3215553584-0
    • Opcode ID: e28a7900140fc26a6ae33d79343b1e6a32e33cbb80f5f0d38021bc220e0e252d
    • Instruction ID: db13f74a52c96e81101fef498f79b74e929798396b06067f58250a8a08e175e4
    • Opcode Fuzzy Hash: e28a7900140fc26a6ae33d79343b1e6a32e33cbb80f5f0d38021bc220e0e252d
    • Instruction Fuzzy Hash: 37410B7354C2828FD702CF78CC9669D7BB0AB9AF08789D065C7818378AD66CB461EB11
    Strings
    • ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs, xrefs: 00007FF7BC203730
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID:
    • String ID: ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs
    • API String ID: 0-3449088094
    • Opcode ID: c86a272cf28a89693941e5c4c77f14062295d8c241ff74f78dc21223008ed3d6
    • Instruction ID: 772370c33de985a8be86ae9b3558b83d16419c3ad3598358d65ac1463a505819
    • Opcode Fuzzy Hash: c86a272cf28a89693941e5c4c77f14062295d8c241ff74f78dc21223008ed3d6
    • Instruction Fuzzy Hash: ECC168D2D0C69604F732AA6C94007F9EB81AB27771FD4D332CB6D177D8CE6C98819628
    Strings
    • ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs, xrefs: 00007FF7BC211077
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID:
    • String ID: ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs
    • API String ID: 0-3449088094
    • Opcode ID: 4a910e5124cc5774d142c4301eefe1bc09809f402f3e125efb366fb81f041762
    • Instruction ID: a62acb7e59c3635755b59da25eaeabce003ca6bee6e4c9e7b674e14d353f8aab
    • Opcode Fuzzy Hash: 4a910e5124cc5774d142c4301eefe1bc09809f402f3e125efb366fb81f041762
    • Instruction Fuzzy Hash: 91C12852E2CA5241EA796A1DD9022BAE7A1FF66790F80D131DF9F077D8EE7CE5408210
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID:
    • String ID: ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs
    • API String ID: 0-3449088094
    • Opcode ID: f1365f076186717028ece41abb6c4e959fb992e67ad3cffbd1342937347f7b29
    • Instruction ID: dd6cdade22342bf7f728c2960ac15d855a962923e4735c19268ed6608f117161
    • Opcode Fuzzy Hash: f1365f076186717028ece41abb6c4e959fb992e67ad3cffbd1342937347f7b29
    • Instruction Fuzzy Hash: A3B13362B1865581FB24DB19E0603F8A760FBA6B94F909232DB9E17BE8CE7DC541C710
    Strings
    • ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs, xrefs: 00007FF7BC1F7520
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID:
    • String ID: ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs
    • API String ID: 0-3449088094
    • Opcode ID: 4f8db72c49c6d322292b7ac3bcd7d5c32df27eb22d7aadda318209e1911aeee5
    • Instruction ID: 3b6f0d5e359755d4b1e63bb38a096bdd9e5e75dc559e62a39d50831154ebb400
    • Opcode Fuzzy Hash: 4f8db72c49c6d322292b7ac3bcd7d5c32df27eb22d7aadda318209e1911aeee5
    • Instruction Fuzzy Hash: 4C91EA92E18A9981F610AF1CE0005BDE754FB66B94F949631DF5E23798CB3CE5A2C370
    APIs
    • HeapFree.KERNEL32(?,?,00000000,00000000,?,?,?,00000000,00000000,?,00000000,00000000,00000000,00000000,?,00007FF7BC2098E8), ref: 00007FF7BC20329D
      • Part of subcall function 00007FF7BC215820: GetProcessHeap.KERNEL32(?,?,?,?,00007FF7BC1FF0AD,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF7BC215837
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: Heap$FreeProcess
    • String ID:
    • API String ID: 3859560861-0
    • Opcode ID: bea59ab7aa73efa1988e053b0575dfef5fbd8976b2e41216db2a786c28e8cbb4
    • Instruction ID: d75a26bf9c5ad22e2ff8c31a275b87b52e57699bfcda218237839e80c1f37027
    • Opcode Fuzzy Hash: bea59ab7aa73efa1988e053b0575dfef5fbd8976b2e41216db2a786c28e8cbb4
    • Instruction Fuzzy Hash: C6614452F19A4199FB10A76D98013FDAB60AB2A3A8F84C536DF5D077CACE3C9185C324
    Strings
    • ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs, xrefs: 00007FF7BC21D606
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: ErrorFreeHeapLast
    • String ID: ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs
    • API String ID: 485612231-3449088094
    • Opcode ID: 89a24ec388c35d2dc06fad72842640dd4d6ed97e04d998712c3fdd2efb5b42c6
    • Instruction ID: 9cb2be07fe722864f7908ce425d9c28092847bd85488229a58aca2b8dd41882d
    • Opcode Fuzzy Hash: 89a24ec388c35d2dc06fad72842640dd4d6ed97e04d998712c3fdd2efb5b42c6
    • Instruction Fuzzy Hash: 1B41E262714A9586EF08DF6EED545A9A3A1AB59FD0F89D032EF0D87B5CDE3CD4428300
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: HeapProcess
    • String ID:
    • API String ID: 54951025-0
    • Opcode ID: e6bfa68522c9155e5f88e8bb28e9840ba8f2d4566d67a69f73464c376a1af0f9
    • Instruction ID: 53638c30012c22f1b3e8fa00e082e3db1bb009ae06a03342a2eca135622c486f
    • Opcode Fuzzy Hash: e6bfa68522c9155e5f88e8bb28e9840ba8f2d4566d67a69f73464c376a1af0f9
    • Instruction Fuzzy Hash: BCB09220E07A06C6EA487B1E6C8A29463A5BFA9B00FC88078C20C44328DF2C20A95720
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5c790383e15cad51f34c7560ab8a95f83bdedd4d9d4300652b785661bd400b18
    • Instruction ID: 3f7b0f24b825814ef484d591ddca9f71bb9755ec3fcc2c647ccdb0ebf6f76e8f
    • Opcode Fuzzy Hash: 5c790383e15cad51f34c7560ab8a95f83bdedd4d9d4300652b785661bd400b18
    • Instruction Fuzzy Hash: 3CC10422F1C68242FE64A728A5057F9D792AF72784FD4C133DB8D02B9DDE6DE5858320
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b6c2f911e371cb75a3aed87efc73798c5a5262a6cf790cff90cf4e8e59d67609
    • Instruction ID: b6c58f17b5c65d2245405479fab5943ba693bfaca7806738f733a4353495c098
    • Opcode Fuzzy Hash: b6c2f911e371cb75a3aed87efc73798c5a5262a6cf790cff90cf4e8e59d67609
    • Instruction Fuzzy Hash: 56B179D6F39BEA02E713563C6402AB597005FB77E4A40D322FFE471FE9DB18A6428214
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 751063ff9f6a74047a4e7670127f2ac16f3fe1ac040384f837d0cd51f658fce5
    • Instruction ID: 359bf10efe55ea887348bc26c300f42f5489342dddd19f060eb79524c0ecfda8
    • Opcode Fuzzy Hash: 751063ff9f6a74047a4e7670127f2ac16f3fe1ac040384f837d0cd51f658fce5
    • Instruction Fuzzy Hash: 21613692E297AA42FB23573D2541B748A505F777A4E44C331EFB9B1FE8DB18E6434200
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c811c595791a1cb5b4f61768abb1f32bf8b3410c8abb329994fa25137cd73b50
    • Instruction ID: cf485fc13ef998f8f5b9c620d976b415055a1023ba56d1ca3acbf6a03c940974
    • Opcode Fuzzy Hash: c811c595791a1cb5b4f61768abb1f32bf8b3410c8abb329994fa25137cd73b50
    • Instruction Fuzzy Hash: 85F06871B182558FDBA4AF2CA40266977D0FB58384F84C539DA8D83B18D63C90518F14
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a27bc3559bb755f74a976f4cc487aa3fc0794bc8f385e46cb093bab5210b6f78
    • Instruction ID: e9b3ba554d462c97c26248a9a1c0ced905cf9172af3a8aa5a0ab6db94a0a4608
    • Opcode Fuzzy Hash: a27bc3559bb755f74a976f4cc487aa3fc0794bc8f385e46cb093bab5210b6f78
    • Instruction Fuzzy Hash: 21A0022190CC06D0E604BB0CEC561F0B334EB76330BD08271D66D45A789F3CA8C0CB21
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: Heap$CloseFreeHandle$ErrorLastObjectProcessSingleWait
    • String ID: ,(><&*@$ExitStatussrc\lib.rsC:\Windows\Debug\fail.txtwlQYLoPCil3niI7x8CvR9EtNtL/aeaHrZ23LP3fAsJogVTIzdnZ5Pi09ZVeHFkiB[dec] $\pay.exe
    • API String ID: 2854259727-3544524065
    • Opcode ID: 22743c575b351dc8129c4d77156beb12b5037d421705670aa851a08fdba761ba
    • Instruction ID: f4fb1b5ba92961df9442504cab1cf6b1f91943182f470b59eb33bf1f05b454ae
    • Opcode Fuzzy Hash: 22743c575b351dc8129c4d77156beb12b5037d421705670aa851a08fdba761ba
    • Instruction Fuzzy Hash: 13C18F7260CB8581E760AB19F4443EAB3A1FB96B94F848135DB8D17BA8CF3CD589C710
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: ConsoleErrorLastWrite$ByteCharMultiWide
    • String ID: }0x$()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs$Utf8Errorvalid_up_toerror_lenNoneSome
    • API String ID: 1956605914-1433589378
    • Opcode ID: 2c8f39181c2a85f3241578f204b3b65764471460f9e593faeafd03aaf6abdb1c
    • Instruction ID: c04bb1cc2ea5541659d3ab791dadff5c1cb480187f77ae893cecf0adf7f2128a
    • Opcode Fuzzy Hash: 2c8f39181c2a85f3241578f204b3b65764471460f9e593faeafd03aaf6abdb1c
    • Instruction Fuzzy Hash: 5B81E872A0864286F724AB19E4503F9E761FBA6790F948136DB8D07B9CDF7CD185C720
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: AddressFreeLibraryProc
    • String ID: ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs$api-ms-$ext-ms-
    • API String ID: 3013587201-1428261835
    • Opcode ID: 27854819192bb1e705469596f86641bf1167ab03ea361a23070c21164a03724a
    • Instruction ID: 9e28a2107608a707c8b3ed2a498826d85ef2b243781bd580992e7f163ab729e3
    • Opcode Fuzzy Hash: 27854819192bb1e705469596f86641bf1167ab03ea361a23070c21164a03724a
    • Instruction Fuzzy Hash: FD41E622B1960245EB15EB1EA8409F5A394BF66BE0F89C535DF0D4B78CEE3CE845C360
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: ErrorLastSleep
    • String ID:
    • API String ID: 1458359878-0
    • Opcode ID: c3114bd37775269af682f2c252222103b554aa250cd46148b11147cdffbc5023
    • Instruction ID: 9fc5f1ba8fd31801f4ed94a0983e97f4c44a9681e656b0706a78e259252e4fc0
    • Opcode Fuzzy Hash: c3114bd37775269af682f2c252222103b554aa250cd46148b11147cdffbc5023
    • Instruction Fuzzy Hash: 80814D22604AC699E731AF29EC017F963A0FB55798F448135DF9D4BB9CCF789286D310
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: Lock$ReleaseShared$AcquireExclusive
    • String ID: ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs$Box<dyn Any><unnamed>$cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs
    • API String ID: 546267457-4078811413
    • Opcode ID: 7913979b8a614973f40d5c4fe42bcbdbbeb8e871fb8e91b831b46dd071c9e552
    • Instruction ID: bc5706e6b1bed5729e477d8c22d6bbd1d8134c48dadd1f1c089ea78c54f5bf03
    • Opcode Fuzzy Hash: 7913979b8a614973f40d5c4fe42bcbdbbeb8e871fb8e91b831b46dd071c9e552
    • Instruction Fuzzy Hash: 46127B22A19B8588EB11EF28D8403E8B7A0FBA6758F848135EF4D07798DF7CE145C360
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
    • String ID: csm$csm$csm
    • API String ID: 849930591-393685449
    • Opcode ID: 4e30c55de0b91dc77b64dbf08deb131f22dc990f80f41aa0cb1b3e4eda5b2450
    • Instruction ID: 1ce6dce49a892ebfae53383fde1761dc5e5af8e51e7db784365d0daf04fcd2c4
    • Opcode Fuzzy Hash: 4e30c55de0b91dc77b64dbf08deb131f22dc990f80f41aa0cb1b3e4eda5b2450
    • Instruction Fuzzy Hash: 37E18276A087418AEB20AF69D8402EDB7B0FB66B98F908135DF4D57B59CF38E191C710
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID: <unnamed>$RUST_BACKTRACEfailed to write the buffered data$cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs$lluf$mluf
    • API String ID: 3298025750-386205353
    • Opcode ID: ad4fd9229cbc064930d2eea97f2ef1a141b8a082a1b23fc3ce9959d1092e6d71
    • Instruction ID: fd8fc10596f14433ccd6ba72aa8aa87d6f559b4dbfac597067bbf222b52963f0
    • Opcode Fuzzy Hash: ad4fd9229cbc064930d2eea97f2ef1a141b8a082a1b23fc3ce9959d1092e6d71
    • Instruction Fuzzy Hash: A1618026A09B4289FB11EB28D8503F9B3A1EBA6B44F848036DF4D07798DF2CE505C361
    APIs
    Strings
    • ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs, xrefs: 00007FF7BC21319D
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: FreeHeap$ErrorGuaranteeLastStackThread
    • String ID: ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs
    • API String ID: 3680998240-3449088094
    • Opcode ID: ab0d3568aa3cbcf3e3b46fa43bed7482bb2dc37e116a5abeba2f0eeadbdce59c
    • Instruction ID: d48be243e7c138e631b08c50089f225911784893f3ba85b6e992ad7720ff3c7a
    • Opcode Fuzzy Hash: ab0d3568aa3cbcf3e3b46fa43bed7482bb2dc37e116a5abeba2f0eeadbdce59c
    • Instruction Fuzzy Hash: AF41BF72E04A4199E700EBA9EC442EC6771FB9AB14F948535CF1D277A8CF38D586C350
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: ErrorFreeHeapLast$EnvironmentVariable
    • String ID:
    • API String ID: 3632352037-0
    • Opcode ID: bb4f76b3cb8763905ed651b88062100f09515afee3cecab56c85ba32dc11819f
    • Instruction ID: cb05fdafb1f7ce08325a7e6e7d1d83d0f236ead4536e56a4b382093af1ee124b
    • Opcode Fuzzy Hash: bb4f76b3cb8763905ed651b88062100f09515afee3cecab56c85ba32dc11819f
    • Instruction Fuzzy Hash: F081B462A04AC649F731AF69D8043F8A364FB267A8F808132DF5D1B798DF7C9285C314
    APIs
    Strings
    • ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs, xrefs: 00007FF7BC20013C
    • called `Result::unwrap()` on an `Err` value, xrefs: 00007FF7BC20019E
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: Handle$CloseConsoleErrorLastMode
    • String ID: ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs$called `Result::unwrap()` on an `Err` value
    • API String ID: 1170577072-3684545863
    • Opcode ID: bc3e78dff97b7d666ab68dddaff9203c98874487c4416f027db038d95eaf353b
    • Instruction ID: 7e3b000bae287245e93a894313c42433542cd7bb4aa13ca82a0c0fae4706416b
    • Opcode Fuzzy Hash: bc3e78dff97b7d666ab68dddaff9203c98874487c4416f027db038d95eaf353b
    • Instruction Fuzzy Hash: 2DA1AF22E08B5694FB14AB68E8503FCA760BB26758FC4C532DF5D16789DF7CA189C320
    APIs
    • LoadLibraryExW.KERNEL32(?,?,?,00007FF7BC21C3EE,?,?,?,00007FF7BC21C0E0,?,?,00000001,00007FF7BC21A6C9), ref: 00007FF7BC21C1C1
    • GetLastError.KERNEL32(?,?,?,00007FF7BC21C3EE,?,?,?,00007FF7BC21C0E0,?,?,00000001,00007FF7BC21A6C9), ref: 00007FF7BC21C1CF
    • LoadLibraryExW.KERNEL32(?,?,?,00007FF7BC21C3EE,?,?,?,00007FF7BC21C0E0,?,?,00000001,00007FF7BC21A6C9), ref: 00007FF7BC21C1F9
    • FreeLibrary.KERNEL32(?,?,?,00007FF7BC21C3EE,?,?,?,00007FF7BC21C0E0,?,?,00000001,00007FF7BC21A6C9), ref: 00007FF7BC21C23F
    • GetProcAddress.KERNEL32(?,?,?,00007FF7BC21C3EE,?,?,?,00007FF7BC21C0E0,?,?,00000001,00007FF7BC21A6C9), ref: 00007FF7BC21C24B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: Library$Load$AddressErrorFreeLastProc
    • String ID: api-ms-
    • API String ID: 2559590344-2084034818
    • Opcode ID: d849d5af33cf5d27236ec855a684fe5224e24a7e688637480540ad7396150497
    • Instruction ID: cb041d0c7643b626663e0999eee7d32aca9236de7350a8cedf13802c0dc8cd47
    • Opcode Fuzzy Hash: d849d5af33cf5d27236ec855a684fe5224e24a7e688637480540ad7396150497
    • Instruction Fuzzy Hash: C631C125B1A64292EA51BB4BEC006F5A398BF66FA0F898135DF5D0B748DE3CE4408324
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: Value$ErrorLast
    • String ID:
    • API String ID: 2506987500-0
    • Opcode ID: 4fe95d4d3905b78d08af88f8e4435670123950fd55690bb86d07bec13c73ceeb
    • Instruction ID: ef28e3e3b1b717fe460541ffc11f60b24e28154618d77e27f48e8d180965fbef
    • Opcode Fuzzy Hash: 4fe95d4d3905b78d08af88f8e4435670123950fd55690bb86d07bec13c73ceeb
    • Instruction Fuzzy Hash: 91216020E0C68245F559B72D9E495F9D3425FA6BF0FD4C634EB3E067CEDE2CA8118221
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
    • String ID: CONOUT$
    • API String ID: 3230265001-3130406586
    • Opcode ID: cfe0876a18880eed2b5065f9e4bc5c31461504362fa45e9579eed542a4a1a70f
    • Instruction ID: f81de149e6cec0abdda08be4ac34ccd1884d6d40eda377d3dec40fe541ba2956
    • Opcode Fuzzy Hash: cfe0876a18880eed2b5065f9e4bc5c31461504362fa45e9579eed542a4a1a70f
    • Instruction Fuzzy Hash: EF11DA31718A4586E350AB1AE8443A9E3A0FBAAFE0F848234DF5E47798CF3DD5148754
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: AddressProc$HandleModule
    • String ID: WaitOnAddress$WakeByAddressSingle$api-ms-win-core-synch-l1-2-0
    • API String ID: 667068680-1826242509
    • Opcode ID: a929de60061fe27fb78bc8b6119db4c2cdbd057ea0e36910b7ddfbe7c18c880d
    • Instruction ID: b569085468b113bbc767d2efcbc4bc33609b0325add142a725c12a44cfd64d2c
    • Opcode Fuzzy Hash: a929de60061fe27fb78bc8b6119db4c2cdbd057ea0e36910b7ddfbe7c18c880d
    • Instruction Fuzzy Hash: 76F05E24A0E65A82FD15BB09B9441F4A3A46F66B80FC4C034CF0C0A368FF6CB559C220
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: CloseHandle$ErrorFileLastSleepWrite
    • String ID:
    • API String ID: 3761358819-0
    • Opcode ID: 3db292af499a8d9b18f179c301415b2cf4b4f4a6c249e98091d7b32f2ca36ebc
    • Instruction ID: 7195cf002e7226aebc4bf4970e081f59a03e13ff3432b8a8b42ab030c91aaf23
    • Opcode Fuzzy Hash: 3db292af499a8d9b18f179c301415b2cf4b4f4a6c249e98091d7b32f2ca36ebc
    • Instruction Fuzzy Hash: 01418422A089C684E731AF29EC017F96761FB55798F448132DF4C1BB9CCF389596D310
    APIs
    • GetLastError.KERNEL32(?,?,?,00007FF7BC21E95D,?,?,?,?,00007FF7BC21D3D8,?,?,?,?,00007FF7BC21890C), ref: 00007FF7BC21E2BB
    • FlsSetValue.KERNEL32(?,?,?,00007FF7BC21E95D,?,?,?,?,00007FF7BC21D3D8,?,?,?,?,00007FF7BC21890C), ref: 00007FF7BC21E2F1
    • FlsSetValue.KERNEL32(?,?,?,00007FF7BC21E95D,?,?,?,?,00007FF7BC21D3D8,?,?,?,?,00007FF7BC21890C), ref: 00007FF7BC21E31E
    • FlsSetValue.KERNEL32(?,?,?,00007FF7BC21E95D,?,?,?,?,00007FF7BC21D3D8,?,?,?,?,00007FF7BC21890C), ref: 00007FF7BC21E32F
    • FlsSetValue.KERNEL32(?,?,?,00007FF7BC21E95D,?,?,?,?,00007FF7BC21D3D8,?,?,?,?,00007FF7BC21890C), ref: 00007FF7BC21E340
    • SetLastError.KERNEL32(?,?,?,00007FF7BC21E95D,?,?,?,?,00007FF7BC21D3D8,?,?,?,?,00007FF7BC21890C), ref: 00007FF7BC21E35B
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: Value$ErrorLast
    • String ID:
    • API String ID: 2506987500-0
    • Opcode ID: 67955062e48bf263f98f707bfd5dccc33806f6317d67472e428eac5be223accd
    • Instruction ID: f5b7a020aebc7c4ffc1690ea8243f03cdc83fcf99cbd8dfcdabd2d6a09e4d3aa
    • Opcode Fuzzy Hash: 67955062e48bf263f98f707bfd5dccc33806f6317d67472e428eac5be223accd
    • Instruction Fuzzy Hash: C8114C20A0C68241F658B7299E591F993425FAB7B0FD4C634EB3E167CEDE2CA4114221
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
    • String ID: csm$f
    • API String ID: 2395640692-629598281
    • Opcode ID: d0c4db7e466bca9918b2fe5c0fce57947247f9530faf3c6b1cfe8640c0ebe1be
    • Instruction ID: 978dc7bcb5b3c4a670b7f1dcaf6e8e3fcffdc939ff8da30e8f5640b81291906d
    • Opcode Fuzzy Hash: d0c4db7e466bca9918b2fe5c0fce57947247f9530faf3c6b1cfe8640c0ebe1be
    • Instruction Fuzzy Hash: B051C232B09642CAEB15EF19D840AA9B395FF62B98FA1C130DB1E4774CDF38E8408710
    APIs
    • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF7BC1FF986), ref: 00007FF7BC1FFA2C
    • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF7BC1FF986), ref: 00007FF7BC1FFAE3
    • ReleaseSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF7BC1FF986), ref: 00007FF7BC1FFB24
    • ReleaseSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7BC1FF986), ref: 00007FF7BC1FFB78
    Strings
    • lock count overflow in reentrant mutexlibrary\std\src\sync\remutex.rs, xrefs: 00007FF7BC1FFA0D
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: ExclusiveLock$Release$AcquireFreeHeap
    • String ID: lock count overflow in reentrant mutexlibrary\std\src\sync\remutex.rs
    • API String ID: 2563869513-2303981482
    • Opcode ID: 57a2554a40511ac4daf8159f8b3a5940003af9393d545a9423a3ab4ae8f18c02
    • Instruction ID: cd3fe82487685946876e3404f3da566d2aaf71eb2ee12477f2c1641d74fbd3f2
    • Opcode Fuzzy Hash: 57a2554a40511ac4daf8159f8b3a5940003af9393d545a9423a3ab4ae8f18c02
    • Instruction Fuzzy Hash: B7515961E1CA4698F700FB2CE8403F8A3A4ABB6B14FC48131CB5D567A9CF7CA595C360
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs$NtCreateKeyedEvent$ntdll
    • API String ID: 1646373207-3469080096
    • Opcode ID: 8af669f8dbe2c5dfc59aceefb7fe7c3aa4c9ada6e237ab79abc9066fa44c08a8
    • Instruction ID: 6357497514333019a32b7cda09c96d5e7f273e90265d104a6d9b4a6e56c7dcb0
    • Opcode Fuzzy Hash: 8af669f8dbe2c5dfc59aceefb7fe7c3aa4c9ada6e237ab79abc9066fa44c08a8
    • Instruction Fuzzy Hash: 6911B422F19B0998EB00EB59F8806E4A364BB6A750FC4C235DF1C167A8EF7C9585C310
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: AddressFreeHandleLibraryModuleProc
    • String ID: CorExitProcess$mscoree.dll
    • API String ID: 4061214504-1276376045
    • Opcode ID: 0d13557986f02a0bff807fb49ceb4b6ee4d0b3276596377211a1255dbd02131c
    • Instruction ID: 1dfba36b94c0bce8d095c5c7d1c6869b8af07c4b513430481dd338cdb0cde33f
    • Opcode Fuzzy Hash: 0d13557986f02a0bff807fb49ceb4b6ee4d0b3276596377211a1255dbd02131c
    • Instruction Fuzzy Hash: C5F04F21A0864681EA14AB2CE8453B9A320BFA6761FD48236DB6D4A3E8CF2CD044C730
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: _set_statfp
    • String ID:
    • API String ID: 1156100317-0
    • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
    • Instruction ID: beec5400c6c041fc0fbe7d974327d44f3546951e09f86d00f430d633a5191c08
    • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
    • Instruction Fuzzy Hash: 5C119023E4CA1281F764356CD6453F59240AF76374EC88734E76E0E3EF8E6CA8418120
    APIs
    • FlsGetValue.KERNEL32(?,?,?,00007FF7BC21E4DB,?,?,00000000,00007FF7BC21E776,?,?,?,?,?,00007FF7BC21E702), ref: 00007FF7BC21E393
    • FlsSetValue.KERNEL32(?,?,?,00007FF7BC21E4DB,?,?,00000000,00007FF7BC21E776,?,?,?,?,?,00007FF7BC21E702), ref: 00007FF7BC21E3B2
    • FlsSetValue.KERNEL32(?,?,?,00007FF7BC21E4DB,?,?,00000000,00007FF7BC21E776,?,?,?,?,?,00007FF7BC21E702), ref: 00007FF7BC21E3DA
    • FlsSetValue.KERNEL32(?,?,?,00007FF7BC21E4DB,?,?,00000000,00007FF7BC21E776,?,?,?,?,?,00007FF7BC21E702), ref: 00007FF7BC21E3EB
    • FlsSetValue.KERNEL32(?,?,?,00007FF7BC21E4DB,?,?,00000000,00007FF7BC21E776,?,?,?,?,?,00007FF7BC21E702), ref: 00007FF7BC21E3FC
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: Value
    • String ID:
    • API String ID: 3702945584-0
    • Opcode ID: 0710a204add404583144b8574cef90928c15d834f179e5606aedd2138e741efe
    • Instruction ID: 6d01ec8f6e3a670ab07c058d53801faa8ff500fcc6a6ff955ed1311b9cb59162
    • Opcode Fuzzy Hash: 0710a204add404583144b8574cef90928c15d834f179e5606aedd2138e741efe
    • Instruction Fuzzy Hash: B3114D20E0C28241FA59B72A9E451F993425FA67F0E94C234EB2D567DDDE2CE8524221
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: Value
    • String ID:
    • API String ID: 3702945584-0
    • Opcode ID: c19338286669fd7890b81c4e32f339c25c8031f1638704835a7fb2fbd58c78a3
    • Instruction ID: c559823fcaf734e19e51209697bff4e2ed32720ba48eadd033f980184b770b56
    • Opcode Fuzzy Hash: c19338286669fd7890b81c4e32f339c25c8031f1638704835a7fb2fbd58c78a3
    • Instruction Fuzzy Hash: A9113614E0C24345F959B7698D2A5F993420FA77B0ED48734EB3E0A3CAED2CB8118222
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: ErrorHandleLast$CurrentDuplicateProcess
    • String ID:
    • API String ID: 3697983210-0
    • Opcode ID: a707c001ef8fc5e6b2a769b1592f268f80d4b5a40cdf2ab2fde69c3731988af0
    • Instruction ID: db5782822d252c1be4cc9d270ecc3e6f0c1647691aa89be2792781c9e3acb6c6
    • Opcode Fuzzy Hash: a707c001ef8fc5e6b2a769b1592f268f80d4b5a40cdf2ab2fde69c3731988af0
    • Instruction Fuzzy Hash: 1C118221A0865585FB20BBA9F8493FDA360AB267A4F848635DF2E467C8CF7D9055C360
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: ErrorLast$ObjectProcessSingleTerminateWait
    • String ID:
    • API String ID: 536955195-0
    • Opcode ID: b06682182554f1d77a9b201431c6783ec3460f533654e893d6b5785a88925550
    • Instruction ID: 214821b8cec2ec6b4cd71bd08df3223d34c5c14957bcb308cb3a6cdb09804b4e
    • Opcode Fuzzy Hash: b06682182554f1d77a9b201431c6783ec3460f533654e893d6b5785a88925550
    • Instruction Fuzzy Hash: F7019620E1850681F760BB2DE8462F9D3919FA6B90FD08170CA4E4679CDE2CD486C730
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: CallEncodePointerTranslator
    • String ID: MOC$RCC
    • API String ID: 3544855599-2084237596
    • Opcode ID: 35b0e96caac7321839730969dc3ae66b295e26b62928a05a88648b484be64640
    • Instruction ID: d7ef4bbf04232634f475ff0e0a1027a4d56918302a94c1b8ed9776b0572e246d
    • Opcode Fuzzy Hash: 35b0e96caac7321839730969dc3ae66b295e26b62928a05a88648b484be64640
    • Instruction Fuzzy Hash: 53617B76A08A458AEB10EF69E8403EDB7B0FB55B88F448225EF4D17B99CF78E145C710
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
    • String ID: csm$csm
    • API String ID: 3896166516-3733052814
    • Opcode ID: 503667ffc01cbe35b3a27d909b320673403a8951783089335a5ca17b21e53f36
    • Instruction ID: b892395a21075d47df70745112654fc23f2188e20417e8b21cfecdd7387fd8c9
    • Opcode Fuzzy Hash: 503667ffc01cbe35b3a27d909b320673403a8951783089335a5ca17b21e53f36
    • Instruction Fuzzy Hash: D451C37A90824186EB34AF29D8443A9B7A0FB62F94F958135DB5C47BD9CF3CE451C710
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: NtWaitForKeyedEvent$ntdll
    • API String ID: 1646373207-2815205136
    • Opcode ID: 8f065e93f007aaf045e29141d6bb34a5b78a247f85a89a50bc01e2ce17672e55
    • Instruction ID: 41f3d16c1c57d0ce92c52c4beb01f567676737a6f55cad12cfc8f8654147b328
    • Opcode Fuzzy Hash: 8f065e93f007aaf045e29141d6bb34a5b78a247f85a89a50bc01e2ce17672e55
    • Instruction Fuzzy Hash: 0A11B921A18B4591EA10EB09F840395E7A4FFA5784FC08135EF8D57B68EF7CD545C710
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: NtReleaseKeyedEvent$ntdll
    • API String ID: 1646373207-31681898
    • Opcode ID: 9aba7d101d3a49aca37f8cb9c45d9598934dbe9e6ebb36da2264a44d70f7e170
    • Instruction ID: 3e92039c07a9a7d0c90349898d591f2a87f273f161e348da72073078ec880487
    • Opcode Fuzzy Hash: 9aba7d101d3a49aca37f8cb9c45d9598934dbe9e6ebb36da2264a44d70f7e170
    • Instruction Fuzzy Hash: 7DF08250B0961950E915EB0BBC819A4D3A47F6ABD1FC4C435CE0C57778EE7CA546C310
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: SetThreadDescription$kernel32
    • API String ID: 1646373207-1950310818
    • Opcode ID: 7f6e083fe5b4a8fad8fd13f0e868e29969a0c1481af2f33aed203f5cc6ffa33d
    • Instruction ID: 5add9b09110b0ff0d99c7e8cd0e4ba78bde2daea84573943bd71adc34d3b7dd3
    • Opcode Fuzzy Hash: 7f6e083fe5b4a8fad8fd13f0e868e29969a0c1481af2f33aed203f5cc6ffa33d
    • Instruction Fuzzy Hash: 7CE06510F0960541FD09BB0DAC841E0D3606F7ABD1BC4C036CE0C17768EE6CA54AC320
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: FileWrite$ConsoleErrorLastOutput
    • String ID:
    • API String ID: 2718003287-0
    • Opcode ID: 57c5a4d5ddb0c8c2a0012b8ff27468da82cd1945dc0ad48b72b5bf65e989f06c
    • Instruction ID: 93828a384681eea18abd0e3f28130768cb63fb5d248d3d99ea5c1502e20867ff
    • Opcode Fuzzy Hash: 57c5a4d5ddb0c8c2a0012b8ff27468da82cd1945dc0ad48b72b5bf65e989f06c
    • Instruction Fuzzy Hash: 31D11632B086818AEB10DF69D4402ECB7B5FB65798B908236CF5D5BB9DDE38E406C310
    APIs
    • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF7BC2247CB,00000000), ref: 00007FF7BC2248FC
    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF7BC2247CB,00000000), ref: 00007FF7BC224987
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: ConsoleErrorLastMode
    • String ID:
    • API String ID: 953036326-0
    • Opcode ID: 835e2de12b0829f99cc6f531b9e23aec45acd53e2205226898b4ce0687045bef
    • Instruction ID: 92086efd091d225c869b0295ba2dad4bc1e92fae4f96e81a75a51b2e5f9f7950
    • Opcode Fuzzy Hash: 835e2de12b0829f99cc6f531b9e23aec45acd53e2205226898b4ce0687045bef
    • Instruction Fuzzy Hash: 0091B532E1865186FB50EF6D94502FDABA0FB66788F948135DF4E6A78CCE38D441C724
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: CloseHandle$ErrorFileLastSleepWrite
    • String ID:
    • API String ID: 3761358819-0
    • Opcode ID: c85bc528515be8f4e142057ec52bf39f317eb3bd0c1efe5fcc62ec3a48194a26
    • Instruction ID: cc7b9b5c4a2ee9a4ad1a8c28b63729dab5389ae5de18b863182fe5b8b49834da
    • Opcode Fuzzy Hash: c85bc528515be8f4e142057ec52bf39f317eb3bd0c1efe5fcc62ec3a48194a26
    • Instruction Fuzzy Hash: 0731B222A08AC688E731AF29DC057F967A1FB55798F448132DF4C1BB9CCF389186D710
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: CloseHandle$ErrorFileLastSleepWrite
    • String ID:
    • API String ID: 3761358819-0
    • Opcode ID: c7d7a8c47848d60bb537140da09670ae25f7c1c2b7c0eba6cfab248e6fafe539
    • Instruction ID: 024c368ecf3cdf1cd71737e4e49edc957393b664002b017e8a0d28ecc57d5923
    • Opcode Fuzzy Hash: c7d7a8c47848d60bb537140da09670ae25f7c1c2b7c0eba6cfab248e6fafe539
    • Instruction Fuzzy Hash: ED31A222A08AC688E731AF29DC057F967A1FB55798F448131DF8C1BB9CCF389196D714
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: CloseHandle$ErrorFileLastSleepWrite
    • String ID:
    • API String ID: 3761358819-0
    • Opcode ID: 75e1caeaa96a27c15c4cf29abbe83e3d1b8fe70e64608befafb32cf3dc960c3c
    • Instruction ID: b1bf8991b81c4f7277c57a0fbd50f9e7dcab463b23aa09f6e540b78ad4227718
    • Opcode Fuzzy Hash: 75e1caeaa96a27c15c4cf29abbe83e3d1b8fe70e64608befafb32cf3dc960c3c
    • Instruction Fuzzy Hash: 5531AF22A08AC688E731AF29DC047F967A1FB55798F448131DE8C1BB9CCF389286D710
    APIs
      • Part of subcall function 00007FF7BC21F910: GetOEMCP.KERNEL32(?,?,?,?,?,?,FFFFFFFD,00007FF7BC21FC4C), ref: 00007FF7BC21F93A
    • IsValidCodePage.KERNEL32(?,?,()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs,00000001,?,00000000,?,00007FF7BC21FD7D), ref: 00007FF7BC220021
    • GetCPInfo.KERNEL32(?,?,()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs,00000001,?,00000000,?,00007FF7BC21FD7D), ref: 00007FF7BC220065
    Strings
    • ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs, xrefs: 00007FF7BC21FFC4
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: CodeInfoPageValid
    • String ID: ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs
    • API String ID: 546120528-3449088094
    • Opcode ID: 4ad679a0ec5e930f58c604e91c648edc90627324575f535735a95d3dcbb7e775
    • Instruction ID: a18e1c5c4830912b7d5d8b8fe6d46a8602d4a76536b16468614ab5baee310685
    • Opcode Fuzzy Hash: 4ad679a0ec5e930f58c604e91c648edc90627324575f535735a95d3dcbb7e775
    • Instruction Fuzzy Hash: 6681C472A0868286F768AF1D94401F9F7A1EB66740FC4C136CB9E4B798DE3DE545C720
    APIs
    • _invalid_parameter_noinfo.LIBCMT ref: 00007FF7BC21CB02
      • Part of subcall function 00007FF7BC21E9EC: HeapFree.KERNEL32(?,?,?,00007FF7BC22122A,?,?,?,00007FF7BC221267,?,?,00000000,00007FF7BC22178D,?,?,FFFFFFFE,00007FF7BC2216BF), ref: 00007FF7BC21EA02
      • Part of subcall function 00007FF7BC21E9EC: GetLastError.KERNEL32(?,?,?,00007FF7BC22122A,?,?,?,00007FF7BC221267,?,?,00000000,00007FF7BC22178D,?,?,FFFFFFFE,00007FF7BC2216BF), ref: 00007FF7BC21EA0C
    Strings
    • C:\Users\user\Desktop\fxc.exe, xrefs: 00007FF7BC21CB13
    • ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs, xrefs: 00007FF7BC21CADA
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: ErrorFreeHeapLast_invalid_parameter_noinfo
    • String ID: ()/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\core\src\str\pattern.rs$C:\Users\user\Desktop\fxc.exe
    • API String ID: 2724796048-1783189390
    • Opcode ID: 145c55661eab690a821310d1bea06efac10a14fa46ffae3c36c9229ac4bded4c
    • Instruction ID: 7df65f56de13b6f28c46b4dd216dfaab86434071c894f174e9f868b9252d505d
    • Opcode Fuzzy Hash: 145c55661eab690a821310d1bea06efac10a14fa46ffae3c36c9229ac4bded4c
    • Instruction Fuzzy Hash: A5415F36A08B5285E754FF2EDC810FCA794AB66794B948035EB8E43B89DE3CE5518320
    APIs
    Strings
    • <unnamed>, xrefs: 00007FF7BC217DD2
    • cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs, xrefs: 00007FF7BC217E6E
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: LockRelease$ExclusiveShared
    • String ID: <unnamed>$cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs
    • API String ID: 279184637-616897820
    • Opcode ID: 819ee0de80142f7b42e4f6a09428c92a38e4975cba76368b54aff0cbf535c805
    • Instruction ID: b7775016fb21e12fddd163eaf413b18f010a08469c11a00a298e2e796ffa29ea
    • Opcode Fuzzy Hash: 819ee0de80142f7b42e4f6a09428c92a38e4975cba76368b54aff0cbf535c805
    • Instruction Fuzzy Hash: 90515C25A09B4188EB11AF28D8503F9B7A4EBAAB98F848032DF4D03759DF3CE505C360
    APIs
    Strings
    • <unnamed>, xrefs: 00007FF7BC217DD2
    • cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs, xrefs: 00007FF7BC217E6E
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: LockRelease$ExclusiveShared
    • String ID: <unnamed>$cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs
    • API String ID: 279184637-616897820
    • Opcode ID: 3853aad5fb1508a667e4b2bc62b596613128215376ec651538d725a432014f97
    • Instruction ID: 7fe3218ccfcb42123f2ab8bafd43cea97521785693d0f5bc3138c1bb7223d6b6
    • Opcode Fuzzy Hash: 3853aad5fb1508a667e4b2bc62b596613128215376ec651538d725a432014f97
    • Instruction Fuzzy Hash: 71513C25A09B4189EB51AF28D8502F9B7A4EBAAB98F948032DF4D03759DF3CE545C360
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: ErrorFileLastWrite
    • String ID: U
    • API String ID: 442123175-4171548499
    • Opcode ID: e4e6fb404c3c47e4c650737dd0576a2508adeee33a755ed0e4052ca8837e072a
    • Instruction ID: bb461aceaf78ccc07b79d4ffad4ac274dfeb6e8ba9e2093a43cbf2e9f1f58198
    • Opcode Fuzzy Hash: e4e6fb404c3c47e4c650737dd0576a2508adeee33a755ed0e4052ca8837e072a
    • Instruction Fuzzy Hash: 6041B362618A4186EB20AF29E4447F9B7A0FBA9794F818131EF4D8B758DF3CD445C750
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: ExceptionFileHeaderRaise
    • String ID: csm
    • API String ID: 2573137834-1018135373
    • Opcode ID: bb960c809cbb2dab76c1b40bd6011a697851df4bac8c04083f6bca4eb3472f56
    • Instruction ID: 0b877ef8bd15f28f47b92ddf76d0c277e930509109f6063f371ce5d3b217b9d7
    • Opcode Fuzzy Hash: bb960c809cbb2dab76c1b40bd6011a697851df4bac8c04083f6bca4eb3472f56
    • Instruction Fuzzy Hash: 07115E36608B8482EB209B19E840299B7E4FB99B94F588230DFCD0775CDF3CD5518700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1824570649.00007FF7BC1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7BC1F0000, based on PE: true
    • Associated: 00000000.00000002.1824558619.00007FF7BC1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824592978.00007FF7BC229000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824610189.00007FF7BC23D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1824622439.00007FF7BC23F000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7bc1f0000_fxc.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID:
    • API String ID: 3298025750-0
    • Opcode ID: 8542b6887c440662ea1a5174381c6ddcac829784b0b3aa166601a1f08894c0ec
    • Instruction ID: b253c7f8b2f783e305059a8df64096dccbb88f1c5c7bda98ae833033f0ca7de5
    • Opcode Fuzzy Hash: 8542b6887c440662ea1a5174381c6ddcac829784b0b3aa166601a1f08894c0ec
    • Instruction Fuzzy Hash: 76A16F22E08BC589F721DF29D8443F967A1FB66788F859132DB8D0A759DF38E585C310