Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe
Analysis ID:1543315
MD5:f52111c3f5e33838bfa369b625f086c3
SHA1:cf35eab7bf011cf4331b580afa86b545bbdd68e1
SHA256:97a39344d4d8701faf884af706aedee5edc5d9529713a33c744241297c655144
Tags:exe
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Queries memory information (via WMI often done to detect virtual machines)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
PE file contains sections with non-standard names
Program does not show much activity (idle)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeAvira: detected
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeReversingLabs: Detection: 55%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: unity.pdb source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719418C90 GetFileInformationByHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,FindFirstFileW,FindClose,HeapFree,0_2_00007FF719418C90
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719434E6C FindFirstFileExA,FindClose,0_2_00007FF719434E6C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719434F7C FindFirstFileExA,FindClose,FindNextFileA,0_2_00007FF719434F7C
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1814540889.000002454262E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1803263854.00000245421FA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1803264069.0000024541EC9000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1817495447.0000024541F8B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1814540889.000002454262E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1803263854.00000245421FA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1803264069.0000024541EC9000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1817495447.0000024541F8B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1803264069.0000024541E95000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1814540889.000002454262E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1803263854.00000245421FA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1817495447.0000024541F57000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1803264069.0000024541EC9000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1817495447.0000024541F8B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1814540889.000002454262E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1803263854.00000245421FA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1803264069.0000024541EC9000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1817495447.0000024541F8B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1817495447.0000024541F57000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com1.3.6.1.5.5.7.48.2http://cacerts.digicert.com/DigiCertGlobalRootG2.crt
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1803264069.0000024541EC9000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1817495447.0000024541F8B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1814540889.000002454262E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1803263854.00000245421FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819267483.0000024542823000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1803263854.00000245423EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1814540889.00000245425EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1814540889.00000245425EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819267483.000002454258C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1803263854.0000024542155000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1814540889.0000024542589000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.com
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1803263854.000002454239F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1814540889.00000245427D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719427CE5 GetProcessTimes,GetLastError,GetSystemTimes,GetLastError,GetProcessIoCounters,OpenProcessToken,GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,GetLastError,GetLastError,CloseHandle,GetLastError,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,HeapFree,HeapFree,GetLastError,K32GetModuleFileNameExW,GetLastError,CloseHandle,HeapFree,ReadProcessMemory,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,HeapFree,VirtualQueryEx,ReadProcessMemory,HeapFree,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,HeapFree,ReadProcessMemory,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,HeapFree,RtlFreeHeap,GetProcessHeap,HeapFree,0_2_00007FF719427CE5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719429620 NtQueryInformationProcess,GetErrorInfo,NtQueryInformationProcess,HeapFree,HeapFree,0_2_00007FF719429620
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7194240F5 PdhOpenQueryA,ProcessPrng,PdhCollectQueryData,HeapFree,NtQuerySystemInformation,GetErrorInfo,NtQuerySystemInformation,GetErrorInfo,RtlFreeHeap,0_2_00007FF7194240F5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7194149E0 NtWriteFile,WaitForSingleObject,RtlNtStatusToDosError,0_2_00007FF7194149E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719427CE50_2_00007FF719427CE5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF71942B5100_2_00007FF71942B510
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7193F93680_2_00007FF7193F9368
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7194283910_2_00007FF719428391
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7194153A00_2_00007FF7194153A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF71943B3D00_2_00007FF71943B3D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719429EB00_2_00007FF719429EB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719411D930_2_00007FF719411D93
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7193F15300_2_00007FF7193F1530
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7194240F50_2_00007FF7194240F5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7193F27600_2_00007FF7193F2760
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7193F47900_2_00007FF7193F4790
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF71942AF200_2_00007FF71942AF20
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7194247400_2_00007FF719424740
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7193F6FBF0_2_00007FF7193F6FBF
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7193F2A600_2_00007FF7193F2A60
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719421A900_2_00007FF719421A90
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719413A200_2_00007FF719413A20
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719439A200_2_00007FF719439A20
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719410A400_2_00007FF719410A40
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719406AF00_2_00007FF719406AF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF71943A2D00_2_00007FF71943A2D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF71943D2D00_2_00007FF71943D2D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF71941E9700_2_00007FF71941E970
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7193FF9900_2_00007FF7193FF990
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7193F39300_2_00007FF7193F3930
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7194071E00_2_00007FF7194071E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7193FF2000_2_00007FF7193FF200
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7194394680_2_00007FF719439468
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7193F94960_2_00007FF7193F9496
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF71940CC300_2_00007FF71940CC30
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7193F6D000_2_00007FF7193F6D00
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719434B900_2_00007FF719434B90
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719429B800_2_00007FF719429B80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719411D930_2_00007FF719411D93
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7193F2BF00_2_00007FF7193F2BF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7193F3BF00_2_00007FF7193F3BF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7194094000_2_00007FF719409400
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719419BD00_2_00007FF719419BD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7194033D00_2_00007FF7194033D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7193FFE600_2_00007FF7193FFE60
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719434E6C0_2_00007FF719434E6C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7194266600_2_00007FF719426660
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF71941561B0_2_00007FF71941561B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF71943C7100_2_00007FF71943C710
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7194046D00_2_00007FF7194046D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7193F4ED00_2_00007FF7193F4ED0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7193F4D400_2_00007FF7193F4D40
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719411D400_2_00007FF719411D40
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719416DF00_2_00007FF719416DF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7193F65F00_2_00007FF7193F65F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7194215E00_2_00007FF7194215E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719430DE40_2_00007FF719430DE4
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7193FDDC00_2_00007FF7193FDDC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7194208600_2_00007FF719420860
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7194048200_2_00007FF719404820
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF71941604A0_2_00007FF71941604A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7194088E00_2_00007FF7194088E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7193F31100_2_00007FF7193F3110
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719408F200_2_00007FF719408F20
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF71942DFF00_2_00007FF71942DFF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF71943DFB00_2_00007FF71943DFB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7194207A00_2_00007FF7194207A0
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1818609021.0000024541F5B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1820175168.0000024541F9B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819722499.0000024541F9B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819722499.0000024541F81000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1823003152.0000024541F0F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815034458.00000245422EB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1817794161.0000024541F0F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805558953.0000024541F14000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ;.VBP
Source: classification engineClassification label: mal68.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF71942B510 CoCreateInstance,SysFreeString,CoSetProxyBlanket,GetErrorInfo,GetErrorInfo,SysFreeString,GetErrorInfo,0_2_00007FF71942B510
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeReversingLabs: Detection: 55%
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeSection loaded: pdh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeSection loaded: perfos.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeSection loaded: profapi.dllJump to behavior
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: unity.pdb source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeStatic PE information: section name: .voltbl
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeStatic PE information: section name: _RDATA
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_PortConnector
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-27769
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeAPI coverage: 8.6 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719418C90 GetFileInformationByHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,FindFirstFileW,FindClose,HeapFree,0_2_00007FF719418C90
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719434E6C FindFirstFileExA,FindClose,0_2_00007FF719434E6C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719434F7C FindFirstFileExA,FindClose,FindNextFileA,0_2_00007FF719434F7C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719411D93 HeapFree,HeapFree,HeapFree,GetSystemInfo,HeapFree,WakeByAddressAll,WakeByAddressSingle,CloseHandle,HeapFree,HeapFree,HeapFree,HeapFree,WakeByAddressSingle,WakeByAddressSingle,HeapFree,0_2_00007FF719411D93
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1800922574.0000024540529000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1801172127.000002454055A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6242WorkflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O T
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DHyper-V Virtual Machine Bus Pipesb
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V VM Vid Partitionll
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration Service
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.00000245421F4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.00000245403CC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.000002454215C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.00000245421F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Virtual Processor
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1801136691.000002454050D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ons/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O TLB Flushes Base4972Hyper-V Hypervisor Root Virtual Processor4974Total Run Time4976Hypervisor Run Time4978Remote Node Run Time4980Normalized Run Time4982Ideal Cpu4984Hypercalls/sec4986Hypercalls Cost4988Page Invalidations/sec4990Page Invalidations Cost4992Control Register Accesses/sec4994Control Register Accesses Cost4996IO Instructions/sec4998IO Instructions Cost5000HLT Instructions/sec5002HLT Instructions Cost5004MWAIT Instructions/sec5006MWAIT Instructions Cost5008CPUID Instructions/sec5010CPUID Instructions Cost5012MSR Accesses/sec5014MSR Accesses Cost5016Other Intercepts/sec5018Other Intercepts Cost5020External Interrupts/sec5022External Interrupts Cost5024Pending Interrupts/sec5026Pending Interrupts Cost5028Emulated Instructions/sec5030Emulated Instructions Cost5032Debug Register Accesses/sec5034Debug Register Accesses Cost5036Page Fault Intercepts/sec5038Page Fault Intercepts Cost5040NMI Interrupts/sec5042NMI Interrupts Cost5044Guest Page Table Maps/sec5046Large Page TLB Fills/sec5048Small Page TLB Fills/sec5050Reflected Guest Page Faults/sec5052APIC MMIO Accesses/sec5054IO Intercept Messages/sec5056Memory Intercept Messages/sec5058APIC EOI Accesses/sec5060Other Messages/sec5062Page Table Allocations/sec5064Logical Processor Migrations/sec5066Address Space Evictions/sec5068Address Space Switches/sec5070Address Domain Flushes/sec5072Address Space Flushes/sec5074Global GVA Range Flushes/sec5076Local Flushed GVA Ranges/sec5078Page Table Evictions/sec5080Page Table Reclamations/sec5082Page Table Resets/sec5084Page Table V
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: THyper-V Hypervisor Root Virtual Processor
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V rdvphgmoagrdjmj Bus
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1801396380.000002454055C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O TLB Flushes Base4972Hyper-V Hypervisor Root Virtual Processor4974Total Run Time4976Hypervisor Run Time4978Remote Node Run Time4980Normalized Run Time4982Ideal Cpu4984Hypercalls/sec4986Hypercalls Cost4988Page Invalidations/sec4990Page Invalidations Cost4992Control Register Accesses/sec4994Control Register Accesses Cost4996IO Instructions/sec4998IO Instructions Cost5000HLT Instructions/sec5002HLT Instructions Cost5004MWAIT Instructions/sec5006MWAIT Instructions Cost5008CPUID Instructions/sec5010CPUID Instructions Cost5012MSR Accesses/sec5014MSR Accesses Cost5016Other Intercepts/sec5018Other Intercepts Cost5020External Interrupts/sec5022External Interrupts Cost5024Pending Interrupts/sec5026Pending Interrupts Cost5028Emulated Instructions/sec5030Emulated Instructions Costitio
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: THyper-V Hypervisor Root Virtual Processor
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Logical Processorllui
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: JHyper-V Hypervisor Logical Processor
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DHyper-V Hypervisor Root Partition
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1803264069.0000024541E95000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1814540889.000002454262E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1803263854.00000245421FA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1817495447.0000024541F57000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration Servicem
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1796266108.00000245404A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshotaile
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Virtual Machine Bus Pipes!
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1801172127.000002454058C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1801644029.000002454058C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshotince
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Hyper-V Hypervisor*
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.00000245421F4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.00000245403CC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.000002454215C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.00000245421F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Partition}
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V VM Vid Partitiony
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Partition
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VHyper-V Dynamic Memory Integration Service
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.00000245421F4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.00000245403CC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.000002454215C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.00000245421F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration Servicex
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.00000245421F4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.000002454215C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.00000245421F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Virtual Machine Bus Pipes
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1803263854.00000245421FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000I}~"
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1814540889.0000024542731000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000}io
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X2Hyper-V VM Vid Partition+
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1803263854.00000245421FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.00000245403CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Virtual Machine Bus Pipes:
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisorq
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: JHyper-V Hypervisor Logical Processor
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.00000245421F4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.00000245403CC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.000002454215C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.00000245421F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Logical Processor.mui
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sWDHyper-V Hypervisor Root Partitiond
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VHyper-V Dynamic Memory Integration Serviceh!
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V rdvphgmoagrdjmj Bus Pipes
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1814540889.0000024542731000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000'
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1814540889.0000024542608000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1803263854.00000245421D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWT`
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.00000245421F4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.00000245403CC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.000002454215C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.00000245421F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1796266108.00000245404A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6242WorkflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O T
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Hyper-V HypervisorL8
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 2Hyper-V VM Vid Partition
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000002.1822174043.0000024540443000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1805165798.00000245421D8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1815410473.000002454226B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819395964.000002454226B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AlDHyper-V Virtual Machine Bus Pipesui
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF71942F3B8 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF71942F3B8
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719427CE5 GetProcessTimes,GetLastError,GetSystemTimes,GetLastError,GetProcessIoCounters,OpenProcessToken,GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,GetLastError,GetLastError,CloseHandle,GetLastError,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,HeapFree,HeapFree,GetLastError,K32GetModuleFileNameExW,GetLastError,CloseHandle,HeapFree,ReadProcessMemory,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,HeapFree,VirtualQueryEx,ReadProcessMemory,HeapFree,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,HeapFree,ReadProcessMemory,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,HeapFree,RtlFreeHeap,GetProcessHeap,HeapFree,0_2_00007FF719427CE5
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7194343E0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7194343E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF71942F3A8 SetUnhandledExceptionFilter,0_2_00007FF71942F3A8
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF71942F3B8 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF71942F3B8
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7194337DC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7194337DC
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeMemory allocated: page read and write | page guardJump to behavior
Source: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1814540889.00000245426F4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1818864972.00000245422ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719439280 cpuid 0_2_00007FF719439280
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719421A90 ProcessPrng,GetCurrentProcessId,ProcessPrng,HeapFree,CreateNamedPipeW,GetLastError,ProcessPrng,HeapFree,HeapFree,HeapFree,CloseHandle,HeapFree,HeapFree,0_2_00007FF719421A90
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF719427CE5 GetProcessTimes,GetLastError,GetSystemTimes,GetLastError,GetProcessIoCounters,OpenProcessToken,GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,GetLastError,GetLastError,CloseHandle,GetLastError,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,HeapFree,HeapFree,GetLastError,K32GetModuleFileNameExW,GetLastError,CloseHandle,HeapFree,ReadProcessMemory,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,HeapFree,VirtualQueryEx,ReadProcessMemory,HeapFree,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,HeapFree,ReadProcessMemory,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,HeapFree,RtlFreeHeap,GetProcessHeap,HeapFree,0_2_00007FF719427CE5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeCode function: 0_2_00007FF7194299B0 RtlGetVersion,0_2_00007FF7194299B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT displayName FROM AntiVirusProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts211
Windows Management Instrumentation
1
DLL Side-Loading
2
Process Injection
1
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
2
Process Injection
LSASS Memory231
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets15
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe55%ReversingLabsWin64.Trojan.Generic
SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe100%AviraTR/Crypt.Agent.khjso
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://api.msn.com/v1/news/Feed/Windows?0%URL Reputationsafe
https://api.msn.com/0%URL Reputationsafe
https://android.notify.windows.com/iOS0%URL Reputationsafe
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://api.msn.com/v1/news/Feed/Windows?SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1814540889.00000245425EA000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://api.msn.com/SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1814540889.00000245425EA000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://wns.windows.com/SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1803263854.000002454239F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1814540889.00000245427D3000.00000004.00000020.00020000.00000000.sdmpfalse
    unknown
    https://android.notify.windows.com/iOSSecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1819267483.0000024542823000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1803263854.00000245423EC000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppSecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1814540889.000002454262E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, 00000000.00000003.1803263854.00000245421FA000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1543315
    Start date and time:2024-10-27 16:56:18 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 21s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:5
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe
    Detection:MAL
    Classification:mal68.evad.winEXE@1/0@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 95%
    • Number of executed functions: 44
    • Number of non-executed functions: 95
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Stop behavior analysis, all processes terminated
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
    • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtEnumerateKey calls found.
    • Report size getting too big, too many NtOpenKey calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • Report size getting too big, too many NtReadVirtualMemory calls found.
    • VT rate limit hit for: SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe
    No simulations
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32+ executable (GUI) x86-64, for MS Windows
    Entropy (8bit):7.603847748500581
    TrID:
    • Win64 Executable GUI (202006/5) 92.65%
    • Win64 Executable (generic) (12005/4) 5.51%
    • Generic Win/DOS Executable (2004/3) 0.92%
    • DOS Executable Generic (2002/1) 0.92%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe
    File size:958'976 bytes
    MD5:f52111c3f5e33838bfa369b625f086c3
    SHA1:cf35eab7bf011cf4331b580afa86b545bbdd68e1
    SHA256:97a39344d4d8701faf884af706aedee5edc5d9529713a33c744241297c655144
    SHA512:ed17dcadff2b252f017450291339d84f30e55bb726760e80d09030e3496930606d649431b025bedb4061c0f4667919159d7413391cb06f2da165bc9b8795b589
    SSDEEP:24576:rE1DjSZB7niaSim76H+cWTuwWc0B02bVk0ZD:rkiZB7iaSiHx0F0B04Go
    TLSH:F715D047E66290FCD02AC4F48746A532F6717C164B2479FB9B90BB212F22FD06A3DB15
    File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d....A.g.........."............................@..........................................`........................................
    Icon Hash:00928e8e8686b000
    Entrypoint:0x14003efc0
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x671041DD [Wed Oct 16 22:44:45 2024 UTC]
    TLS Callbacks:0x40024d20, 0x1
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:dac20a408a16d396d39804339c3d3c76
    Instruction
    dec eax
    sub esp, 28h
    call 00007F7F9CB9D540h
    dec eax
    add esp, 28h
    jmp 00007F7F9CB9D157h
    int3
    int3
    dec eax
    sub esp, 28h
    call 00007F7F9CB9D2F4h
    dec eax
    neg eax
    sbb eax, eax
    neg eax
    dec eax
    dec eax
    add esp, 28h
    ret
    int3
    inc eax
    push ebx
    dec eax
    sub esp, 20h
    dec eax
    cmp dword ptr [000A9A16h], FFFFFFFFh
    dec eax
    mov ebx, ecx
    jne 00007F7F9CB9D2E9h
    call 00007F7F9CB9F0B5h
    jmp 00007F7F9CB9D2F1h
    dec eax
    mov edx, ebx
    dec eax
    lea ecx, dword ptr [000A9A00h]
    call 00007F7F9CB9F020h
    xor edx, edx
    test eax, eax
    dec eax
    cmove edx, ebx
    dec eax
    mov eax, edx
    dec eax
    add esp, 20h
    pop ebx
    ret
    int3
    int3
    dec eax
    sub esp, 18h
    dec esp
    mov eax, ecx
    mov eax, 00005A4Dh
    cmp word ptr [FFFC0FC5h], ax
    jne 00007F7F9CB9D35Ah
    dec eax
    arpl word ptr [FFFC0FF8h], cx
    dec eax
    lea edx, dword ptr [FFFC0FB5h]
    dec eax
    add ecx, edx
    cmp dword ptr [ecx], 00004550h
    jne 00007F7F9CB9D341h
    mov eax, 0000020Bh
    cmp word ptr [ecx+18h], ax
    jne 00007F7F9CB9D336h
    dec esp
    sub eax, edx
    movzx eax, word ptr [ecx+14h]
    dec eax
    lea edx, dword ptr [ecx+18h]
    dec eax
    add edx, eax
    movzx eax, word ptr [ecx+06h]
    dec eax
    lea ecx, dword ptr [eax+eax*4]
    dec esp
    lea ecx, dword ptr [edx+ecx*8]
    dec eax
    mov dword ptr [esp], edx
    dec ecx
    cmp edx, ecx
    je 00007F7F9CB9D2FAh
    mov ecx, dword ptr [edx+0Ch]
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0xe4bd80x104.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0xea0000x1ab8.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0xf00000x71c.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0xe4ad00x1c.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0xe23500x28.rdata
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xdd6800x138.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0xe51f00x510.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x4dc160x4de0072dbd1eca204158d6a6b3c531ab4b762False0.5278422201043339data6.42086706229049IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x4f0000x989a40x98a009f9751104e37437506e10a112552dc51False0.9461890868140869Matlab v4 mat-file (little endian) \3426\032?, rows 953267991, columns 15108740587.916905090012734IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0xe80000x1b900xa00cd95d90f21e02094de23b65dadbe06e3False0.146484375data1.9052885798327395IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0xea0000x1ab80x1c00f11b762d6390b1270b6590c3c3cd2357False0.4898158482142857data5.435059595682391IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .gfids0xec0000x800x200b43242d35411407b1f6852a45cd5edaaFalse0.22265625data1.4582740264106036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .tls0xed0000x890x200f73b9c36b3b22255f2ae96abc9a50361False0.037109375data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .voltbl0xee0000x2a0x200eae09b4822d39f484dfe9175c88bb635False0.107421875data0.7001115316230119
    _RDATA0xef0000xf40x2005108344696762df5721526031cbb35c6False0.310546875data2.381296399543655IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0xf00000x71c0x8002500d08c07fc63ba4a5be0ac4dd8eb08False0.56005859375data5.183843895441525IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    DLLImport
    bcryptprimitives.dllProcessPrng
    api-ms-win-core-synch-l1-2-0.dllWaitOnAddress, WakeByAddressAll, WakeByAddressSingle
    ntdll.dllNtQueryInformationProcess, NtQuerySystemInformation, NtWriteFile, RtlCaptureContext, RtlGetVersion, RtlLookupFunctionEntry, RtlNtStatusToDosError, RtlUnwindEx, RtlVirtualUnwind
    ADVAPI32.dllCopySid, GetLengthSid, GetTokenInformation, IsValidSid, OpenProcessToken
    KERNEL32.dllAddVectoredExceptionHandler, CloseHandle, CompareStringOrdinal, CompareStringW, CreateFileW, CreateNamedPipeW, CreateProcessW, CreateThread, CreateWaitableTimerExW, DeleteCriticalSection, DeleteProcThreadAttributeList, DuplicateHandle, EnterCriticalSection, ExitProcess, FindClose, FindFirstFileExA, FindFirstFileW, FindNextFileA, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetComputerNameExW, GetConsoleCP, GetConsoleMode, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetEnvironmentStringsW, GetEnvironmentVariableW, GetFileAttributesW, GetFileInformationByHandle, GetFileInformationByHandleEx, GetFileType, GetFullPathNameW, GetLastError, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetProcessIoCounters, GetProcessTimes, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemDirectoryW, GetSystemInfo, GetSystemTimeAsFileTime, GetSystemTimePreciseAsFileTime, GetSystemTimes, GetTempPathW, GetTickCount64, GetWindowsDirectoryW, GlobalMemoryStatusEx, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeProcThreadAttributeList, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, K32GetPerformanceInfo, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, LocalFree, MultiByteToWideChar, OpenProcess, QueryPerformanceCounter, QueryPerformanceFrequency, RaiseException, ReadFileEx, ReadProcessMemory, SetEnvironmentVariableA, SetFileInformationByHandle, SetFilePointerEx, SetLastError, SetStdHandle, SetThreadStackGuarantee, SetUnhandledExceptionFilter, SetWaitableTimer, Sleep, SleepEx, SwitchToThread, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, UpdateProcThreadAttribute, VirtualQueryEx, WaitForSingleObject, WideCharToMultiByte, WriteConsoleW, WriteFile, WriteFileEx
    powrprof.dllCallNtPowerInformation
    ole32.dllCoCreateInstance, CoInitializeEx, CoInitializeSecurity, CoSetProxyBlanket, PropVariantClear
    shell32.dllCommandLineToArgvW
    oleaut32.dllGetErrorInfo, SafeArrayAccessData, SafeArrayDestroy, SafeArrayUnaccessData, SysAllocStringLen, SysFreeString, SysStringLen, VariantClear
    psapi.dllGetModuleFileNameExW
    pdh.dllPdhAddEnglishCounterW, PdhCloseQuery, PdhCollectQueryData, PdhGetFormattedCounterValue, PdhOpenQueryA, PdhRemoveCounter
    propsys.dllPropVariantToBSTR, VariantToPropVariant
    No network behavior found

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:11:57:35
    Start date:27/10/2024
    Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe"
    Imagebase:0x7ff7193f0000
    File size:958'976 bytes
    MD5 hash:F52111C3F5E33838BFA369B625F086C3
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:6.6%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:65%
      Total number of Nodes:1187
      Total number of Limit Nodes:93
      execution_graph 26558 7ff719426188 26560 7ff71942621f 26558->26560 26559 7ff71942630a 26572 7ff719426890 26559->26572 26560->26559 26562 7ff71942642d 26560->26562 26563 7ff7194262fd 26560->26563 26564 7ff71942634f 26560->26564 26581 7ff71943dc70 21 API calls 26562->26581 26563->26559 26566 7ff71942644b 26563->26566 26582 7ff71943de60 108 API calls 26566->26582 26568 7ff719426322 26568->26564 26569 7ff7194263ea HeapFree 26568->26569 26570 7ff719426390 HeapFree 26568->26570 26580 7ff719426470 9 API calls 26568->26580 26569->26570 26570->26564 26570->26568 26573 7ff719426a2c 26572->26573 26574 7ff719426951 26572->26574 26578 7ff7194272ac 26573->26578 26587 7ff71943cc80 67 API calls 26573->26587 26583 7ff719425970 26574->26583 26577 7ff71942762b 26578->26577 26579 7ff719426890 67 API calls 26578->26579 26579->26577 26580->26568 26581->26568 26582->26568 26585 7ff7194259d3 26583->26585 26586 7ff719426190 26585->26586 26588 7ff719423dc0 26585->26588 26586->26573 26587->26578 26589 7ff719423dd8 GetProcessHeap 26588->26589 26590 7ff719423dd1 HeapAlloc 26588->26590 26592 7ff71943c702 26589->26592 26593 7ff71943c6e6 HeapAlloc 26589->26593 26590->26589 26592->26585 26594 7ff71943c2a9 26595 7ff71943c2ab 26594->26595 26600 7ff719411a76 26595->26600 26597 7ff71943c2df 26598 7ff71943c2d6 WakeByAddressAll 26598->26597 26608 7ff719411d40 26600->26608 26602 7ff719411bdd 26602->26597 26602->26598 26604 7ff719411b1c 26604->26602 26606 7ff719411bcb HeapFree 26604->26606 26607 7ff719411bb9 HeapFree 26604->26607 26606->26602 26607->26606 26609 7ff7194121bf 26608->26609 26675 7ff71943c0e0 26609->26675 26612 7ff71943c0e0 4 API calls 26613 7ff719412241 26612->26613 26614 7ff719423dc0 HeapAlloc GetProcessHeap HeapAlloc 26613->26614 26615 7ff71941241a 26613->26615 26660 7ff719412d56 26613->26660 26614->26613 26616 7ff71943c0e0 4 API calls 26615->26616 26617 7ff7194124a8 26616->26617 26618 7ff71943c0e0 4 API calls 26617->26618 26620 7ff7194124b9 26618->26620 26619 7ff719423dc0 HeapAlloc GetProcessHeap HeapAlloc 26619->26620 26620->26619 26621 7ff7194125de 26620->26621 26620->26660 26623 7ff719423dc0 3 API calls 26621->26623 26641 7ff719412661 abort 26621->26641 26621->26660 26622 7ff71941357b 26655 7ff719412cff 26622->26655 26697 7ff719424050 HeapFree HeapFree HeapFree 26622->26697 26623->26641 26626 7ff7194126d6 HeapFree 26626->26641 26627 7ff7194135a3 26628 7ff7194135fe 26627->26628 26629 7ff7194135ec HeapFree 26627->26629 26631 7ff71941362a HeapFree 26628->26631 26632 7ff71941363c 26628->26632 26629->26628 26630 7ff719411abe 26630->26604 26674 7ff719423df0 12 API calls 26630->26674 26631->26632 26633 7ff71941367a 26632->26633 26634 7ff719413668 HeapFree 26632->26634 26633->26630 26635 7ff7194136a6 HeapFree 26633->26635 26634->26633 26635->26630 26636 7ff719413868 26638 7ff7194138cd HeapFree 26636->26638 26639 7ff71941387f 26636->26639 26638->26639 26640 7ff71941389a 26638->26640 26639->26640 26704 7ff719424050 HeapFree HeapFree HeapFree 26639->26704 26644 7ff7194138a8 26640->26644 26706 7ff719424050 HeapFree HeapFree HeapFree 26640->26706 26641->26622 26641->26626 26641->26636 26642 7ff719423dc0 HeapAlloc GetProcessHeap HeapAlloc 26641->26642 26650 7ff719412f8e HeapFree 26641->26650 26652 7ff719412cb1 WakeByAddressAll 26641->26652 26641->26655 26641->26660 26662 7ff719413354 26641->26662 26666 7ff7194136e2 26641->26666 26667 7ff719413485 CloseHandle 26641->26667 26669 7ff719412a00 26641->26669 26679 7ff719422140 26641->26679 26688 7ff719410a40 26641->26688 26693 7ff71943c480 WaitOnAddress GetLastError 26641->26693 26694 7ff7194191c0 HeapFree HeapFree 26641->26694 26642->26641 26647 7ff719413715 26644->26647 26705 7ff719423df0 12 API calls 26644->26705 26701 7ff719413960 HeapFree HeapFree HeapFree HeapFree HeapFree 26647->26701 26649 7ff71941384a 26649->26627 26703 7ff719423df0 12 API calls 26649->26703 26650->26641 26652->26641 26653 7ff719412ccd WakeByAddressSingle 26652->26653 26653->26641 26698 7ff719413960 HeapFree HeapFree HeapFree HeapFree HeapFree 26655->26698 26656 7ff7194137e5 WakeByAddressSingle 26658 7ff71941373b 26656->26658 26658->26649 26658->26656 26659 7ff71941383c WakeByAddressSingle 26658->26659 26658->26660 26702 7ff71943c480 WaitOnAddress GetLastError 26658->26702 26659->26658 26661 7ff71943c540 10 API calls 26661->26669 26662->26660 26707 7ff7194191c0 HeapFree HeapFree 26662->26707 26668 7ff7194136fb 26666->26668 26699 7ff719410ca0 7 API calls 26666->26699 26667->26669 26668->26647 26700 7ff719410dd0 HeapFree HeapFree 26668->26700 26669->26641 26669->26655 26669->26661 26695 7ff719410dd0 HeapFree HeapFree 26669->26695 26696 7ff719410ca0 7 API calls 26669->26696 26674->26604 26676 7ff71943c111 26675->26676 26678 7ff71941222b 26675->26678 26676->26678 26708 7ff7193f5de0 26676->26708 26678->26612 26680 7ff719423dc0 3 API calls 26679->26680 26681 7ff719422165 26680->26681 26682 7ff71942216e CreateThread 26681->26682 26683 7ff719422214 26681->26683 26684 7ff719422207 26682->26684 26686 7ff7194221a8 26682->26686 26684->26641 26685 7ff7194221e0 HeapFree GetLastError 26685->26684 26686->26685 26687 7ff7194221ce HeapFree 26686->26687 26687->26685 26689 7ff719423dc0 3 API calls 26688->26689 26690 7ff719410a7a abort 26689->26690 26691 7ff719410c67 26690->26691 26692 7ff719410c78 HeapFree 26690->26692 26691->26641 26692->26691 26693->26641 26694->26641 26695->26669 26696->26669 26697->26655 26698->26627 26699->26668 26700->26647 26701->26658 26702->26658 26703->26627 26704->26640 26705->26647 26706->26644 26707->26660 26709 7ff7193f5df3 26708->26709 26710 7ff7193f5e11 26708->26710 26709->26710 26711 7ff7193f5dfa RtlReAllocateHeap 26709->26711 26712 7ff7193f5e27 26710->26712 26713 7ff719423dc0 3 API calls 26710->26713 26711->26712 26712->26678 26713->26712 26714 7ff7193f6fbf 26872 7ff71942aaa0 GlobalMemoryStatusEx 26714->26872 26716 7ff7193f6fc7 GetComputerNameExW 26717 7ff7193f6feb 26716->26717 26718 7ff7193f701a GetLastError 26716->26718 26720 7ff719423dc0 3 API calls 26717->26720 26722 7ff7193f700c 26717->26722 26718->26717 26718->26722 26719 7ff7193f7031 GetComputerNameExW 26721 7ff7193f7083 GetLastError 26719->26721 26729 7ff7193f705d 26719->26729 26720->26722 26725 7ff7193f708e HeapFree 26721->26725 26731 7ff7193f70a0 26721->26731 26722->26719 26723 7ff7193f9a25 HeapFree 26722->26723 26728 7ff7193f9a9e 26723->26728 26724 7ff7193f7081 26995 7ff7193fdb40 6 API calls 26724->26995 26725->26731 26963 7ff719419570 26728->26963 26729->26724 26732 7ff7193f997f 26729->26732 26730 7ff7193f70da 26730->26731 26733 7ff7193f70fa HeapFree 26730->26733 26735 7ff7193f71c7 26731->26735 26739 7ff7193f8112 26731->26739 27008 7ff71943e8a0 19 API calls 26732->27008 26733->26731 26875 7ff71942b440 CoInitializeEx 26735->26875 26736 7ff7193f999e abort 26740 7ff7193f99e7 GetErrorInfo 26736->26740 26741 7ff719419570 22 API calls 26739->26741 26742 7ff7193f9a10 26740->26742 26865 7ff7193f823b 26741->26865 26744 7ff7193f9a1b 26742->26744 26745 7ff7193f9a27 SysFreeString 26742->26745 26743 7ff7193f71dc 26743->26723 26880 7ff71942b510 CoCreateInstance 26743->26880 26747 7ff7193f9a35 SysFreeString 26744->26747 26748 7ff7193f9a20 26744->26748 26745->26747 26745->26748 26747->26723 26751 7ff7193f9a43 HeapFree 26747->26751 26748->26723 26748->26751 26750 7ff7193f92e5 26754 7ff7193f4790 26 API calls 26750->26754 26757 7ff7193f9a57 26751->26757 26752 7ff719419570 22 API calls 26766 7ff7193f9b90 26752->26766 26753 7ff7193f92df HeapFree 26753->26750 26758 7ff7193f92f2 26754->26758 26755 7ff7193f72c3 26760 7ff71942b510 15 API calls 26755->26760 26756 7ff7193f72b1 HeapFree 26756->26755 26757->26723 27009 7ff7193f4560 HeapFree HeapFree 26757->27009 26759 7ff7193fa386 26990 7ff719423d50 26759->26990 26762 7ff7193f72e0 26760->26762 26762->26723 26765 7ff719423dc0 3 API calls 26762->26765 26764 7ff7193fa38b 26768 7ff7193f7316 26765->26768 26766->26752 26766->26759 26767 7ff719423d50 59 API calls 26766->26767 26767->26766 26768->26723 26769 7ff719423dc0 3 API calls 26768->26769 26770 7ff7193f7383 26769->26770 26770->26723 26771 7ff719423dc0 3 API calls 26770->26771 26772 7ff7193f7430 26771->26772 26772->26723 26773 7ff719423dc0 3 API calls 26772->26773 26774 7ff7193f74cf 26773->26774 26774->26723 26775 7ff719423dc0 3 API calls 26774->26775 26776 7ff7193f759c 26775->26776 26776->26723 26777 7ff719423dc0 3 API calls 26776->26777 26778 7ff7193f764b 26777->26778 26778->26723 26779 7ff719423dc0 3 API calls 26778->26779 26780 7ff7193f76fe 26779->26780 26780->26723 26781 7ff719423dc0 3 API calls 26780->26781 26782 7ff7193f77ca 26781->26782 26782->26723 26783 7ff719423dc0 3 API calls 26782->26783 26784 7ff7193f7876 26783->26784 26784->26723 26785 7ff719423dc0 3 API calls 26784->26785 26841 7ff7193f7933 26785->26841 26786 7ff7193f8255 26787 7ff7193f8267 HeapFree 26786->26787 26788 7ff7193f9354 HeapFree 26786->26788 26790 7ff7193f828e 26787->26790 26788->26786 26789 7ff719423dc0 HeapAlloc GetProcessHeap HeapAlloc 26789->26841 26791 7ff71942b510 15 API calls 26790->26791 26793 7ff7193f8436 26791->26793 26792 7ff71942af20 8 API calls 26792->26841 26793->26723 26894 7ff7193f2760 26793->26894 26795 7ff7193f86a1 26797 7ff7193f86ca 26795->26797 26798 7ff7193f86b8 HeapFree 26795->26798 26796 7ff7193f7bde SysFreeString 26796->26841 26801 7ff71942b510 15 API calls 26797->26801 26798->26797 26799 7ff7193f7bec SysFreeString 26799->26841 26800 7ff7193f7bff HeapFree 26800->26841 26806 7ff7193f86f2 26801->26806 26803 7ff7193f8293 GetErrorInfo 26805 7ff7193f82c3 26803->26805 26804 7ff7193f8557 26804->26723 26804->26795 27001 7ff7193f4560 HeapFree HeapFree 26804->27001 26811 7ff7193f82fb 26805->26811 27000 7ff7193f4680 HeapFree 26805->27000 26806->26723 26808 7ff7193f2760 41 API calls 26806->26808 26809 7ff7193f87c6 26808->26809 26809->26723 26922 7ff7193f1210 26809->26922 26811->26723 26813 7ff7193f83c1 26811->26813 26814 7ff7193f83aa HeapFree 26811->26814 26812 7ff7193f8831 26816 7ff719423dc0 3 API calls 26812->26816 26819 7ff7193f8838 26812->26819 26815 7ff7193f83f4 HeapFree 26813->26815 26817 7ff7193f91d4 HeapFree 26813->26817 26814->26813 26815->26790 26831 7ff7193f885b 26816->26831 26817->26813 26818 7ff7193f7e40 GetErrorInfo 26818->26841 26820 7ff7193f8a06 26819->26820 26825 7ff7193f89f1 HeapFree 26819->26825 26822 7ff7193f8a1d 26820->26822 26823 7ff7193f8a0b HeapFree 26820->26823 26821 7ff7193f1210 3 API calls 26821->26831 26826 7ff7193f8a41 26822->26826 27002 7ff7193f4560 HeapFree HeapFree 26822->27002 26823->26822 26824 7ff7193f1530 26 API calls 26824->26841 26825->26819 26827 7ff7193f8a5b 26826->26827 26828 7ff7193f8a49 HeapFree 26826->26828 26832 7ff71942b510 15 API calls 26827->26832 26828->26827 26830 7ff719439980 4 API calls 26830->26831 26831->26723 26831->26819 26831->26821 26831->26830 26836 7ff7193f8a83 26832->26836 26834 7ff7193f833d 26834->26811 26835 7ff7193f8342 HeapFree 26834->26835 26835->26811 26836->26723 26838 7ff7193f2760 41 API calls 26836->26838 26837 7ff7193f80bb HeapFree 26837->26841 26844 7ff7193f8b66 26838->26844 26839 7ff7193f8093 HeapFree 26839->26841 26840 7ff7193f80f6 HeapFree 26840->26841 26841->26723 26841->26740 26841->26742 26841->26757 26841->26786 26841->26787 26841->26789 26841->26792 26841->26796 26841->26799 26841->26800 26841->26803 26841->26805 26841->26811 26841->26818 26841->26824 26841->26834 26841->26837 26841->26839 26841->26840 26841->26841 26842 7ff7193f8048 HeapFree 26841->26842 26996 7ff719439980 26841->26996 26842->26841 26843 7ff7193f8bb1 26845 7ff7193f8bb6 HeapFree 26843->26845 26847 7ff7193f8bc8 26843->26847 26844->26723 26844->26843 27003 7ff7193f4560 HeapFree HeapFree 26844->27003 26845->26847 26848 7ff71942aaa0 2 API calls 26847->26848 26849 7ff7193f8bee 26848->26849 26926 7ff7193f4790 26849->26926 26851 7ff7193f8c03 26852 7ff71942aaa0 2 API calls 26851->26852 26853 7ff7193f8c1b GetTickCount64 26852->26853 26854 7ff7193f4790 26 API calls 26853->26854 26855 7ff7193f8c31 26854->26855 26856 7ff71942b510 15 API calls 26855->26856 26857 7ff7193f8c4b 26856->26857 26857->26723 26858 7ff7193f2760 41 API calls 26857->26858 26859 7ff7193f8d57 26858->26859 26859->26723 26871 7ff7193f8d62 26859->26871 26860 7ff7193f91e8 26861 7ff7193f9171 26860->26861 27007 7ff7193f4560 HeapFree HeapFree 26860->27007 26862 7ff7193f9233 HeapFree 26861->26862 26863 7ff7193f9186 26861->26863 26862->26863 26863->26728 26863->26865 26865->26750 26865->26753 26867 7ff7193f9131 27005 7ff7193f4560 HeapFree HeapFree 26867->27005 26869 7ff7193f913e 26869->26861 27006 7ff7193f4560 HeapFree HeapFree 26869->27006 26871->26860 26871->26861 26871->26867 27004 7ff7193f4560 HeapFree HeapFree 26871->27004 26873 7ff71942aae7 K32GetPerformanceInfo 26872->26873 26874 7ff71942ab2e 26873->26874 26874->26716 26876 7ff71942b457 CoInitializeSecurity 26875->26876 26877 7ff71942b4cd GetErrorInfo 26875->26877 26878 7ff71942b4ba 26876->26878 26879 7ff71942b498 GetErrorInfo 26876->26879 26877->26878 26878->26743 26879->26878 26881 7ff71942b561 26880->26881 26882 7ff71942b623 GetErrorInfo 26880->26882 26893 7ff7193f7280 26881->26893 27010 7ff71942af20 26881->27010 26882->26893 26885 7ff71942b657 GetErrorInfo 26887 7ff71942b679 26885->26887 26886 7ff71942b5c1 26886->26887 26888 7ff71942b5cf 26886->26888 26889 7ff71942b687 SysFreeString 26887->26889 26887->26893 26890 7ff71942b5dd CoSetProxyBlanket 26888->26890 26891 7ff71942b5d4 SysFreeString 26888->26891 26889->26893 26892 7ff71942b6b0 GetErrorInfo 26890->26892 26890->26893 26891->26890 26892->26893 26893->26755 26893->26756 26895 7ff71942af20 8 API calls 26894->26895 26896 7ff7193f2790 26895->26896 26897 7ff71942af20 8 API calls 26896->26897 26898 7ff7193f279e 26897->26898 26899 7ff7193f27dd 26898->26899 26900 7ff7193f290a GetErrorInfo 26898->26900 26901 7ff7193f27eb 26899->26901 26902 7ff7193f2935 26899->26902 26900->26902 26903 7ff7193f27f0 SysFreeString 26901->26903 26904 7ff7193f27f9 26901->26904 26905 7ff7193f2949 26902->26905 26906 7ff7193f2940 SysFreeString 26902->26906 26903->26904 26907 7ff7193f27fe SysFreeString 26904->26907 26908 7ff7193f2807 26904->26908 26909 7ff7193f294e SysFreeString 26905->26909 26912 7ff7193f2957 26905->26912 26906->26905 26907->26908 27024 7ff7193f1000 26908->27024 26909->26912 26912->26804 26913 7ff719423dc0 3 API calls 26918 7ff7193f283d 26913->26918 26914 7ff7193f2a17 26915 7ff7193f1000 29 API calls 26915->26918 26916 7ff7193f2962 26916->26912 26919 7ff7193f29a1 26916->26919 27036 7ff7193f4560 HeapFree HeapFree 26916->27036 26917 7ff719439980 4 API calls 26917->26918 26918->26914 26918->26915 26918->26916 26918->26917 26919->26912 26920 7ff7193f29a6 HeapFree 26919->26920 26920->26912 26923 7ff7193f122a 26922->26923 26924 7ff719423dc0 3 API calls 26923->26924 26925 7ff7193f136a 26923->26925 26924->26925 26925->26812 26927 7ff7193f4a5f 26926->26927 26953 7ff7193f47b5 26926->26953 26928 7ff7193f4a7d HeapFree 26927->26928 26945 7ff7193f4a6b 26927->26945 26931 7ff7193f4a78 26928->26931 26928->26945 26929 7ff7193f4a2a 26929->26927 26930 7ff7193f4a49 RtlFreeHeap 26929->26930 26930->26927 26932 7ff7193f4b2e HeapFree 26931->26932 26941 7ff7193f4b40 26931->26941 26932->26941 26933 7ff7193f4850 HeapFree 26933->26953 26934 7ff7193f4c17 26934->26851 26935 7ff7193f4ac0 HeapFree 26935->26945 26936 7ff7193f4bda 26938 7ff7193f4bf0 CloseHandle 26936->26938 26939 7ff7193f4bfa 26936->26939 26937 7ff7193f4ad7 HeapFree 26937->26945 26938->26939 26943 7ff7193f4c1c GetLastError 26938->26943 26946 7ff7193f4c33 PdhCloseQuery 26939->26946 26955 7ff7193f4c0b 26939->26955 26940 7ff7193f4b00 HeapFree 26944 7ff7193f4b16 HeapFree 26940->26944 26940->26945 26941->26934 26941->26936 26950 7ff7193f4b85 PdhRemoveCounter 26941->26950 26942 7ff7193f48ba HeapFree 26942->26953 26943->26946 26943->26955 26944->26945 26945->26931 26945->26935 26945->26937 26945->26940 26945->26944 26946->26934 26946->26955 26947 7ff7193f4890 HeapFree 26947->26953 26948 7ff7193f4900 HeapFree 26949 7ff7193f4922 HeapFree 26948->26949 26948->26953 26949->26953 26950->26936 26950->26941 26951 7ff7193f4cd8 26951->26934 26952 7ff7193f4cfd HeapFree 26951->26952 26953->26929 26953->26933 26953->26942 26953->26947 26953->26948 26953->26949 26954 7ff7193f498a RtlFreeHeap 26953->26954 26956 7ff7193f4960 RtlFreeHeap 26953->26956 26957 7ff7193f49d0 HeapFree 26953->26957 26958 7ff7193f49f2 HeapFree 26953->26958 26960 7ff7193f4a1c 26953->26960 26954->26953 26955->26934 26955->26951 26959 7ff7193f4cc6 HeapFree 26955->26959 26956->26953 26957->26953 26957->26958 26958->26953 26959->26955 27075 7ff7193f5d90 CloseHandle 26960->27075 26964 7ff71941958d 26963->26964 26972 7ff71941963a 26963->26972 26965 7ff7194195bb 26964->26965 26967 7ff7194195b6 26964->26967 26964->26972 26966 7ff7194195e5 26965->26966 26965->26972 26970 7ff7194198e9 26966->26970 26976 7ff7194195f9 26966->26976 27080 7ff71943c540 10 API calls 26967->27080 26969 7ff7194198dd 27082 7ff71943c480 WaitOnAddress GetLastError 26969->27082 27083 7ff71943c480 WaitOnAddress GetLastError 26970->27083 26971 7ff719419635 26971->26766 26972->26969 26972->26971 26975 7ff719419665 26972->26975 26975->26971 26977 7ff719419721 26975->26977 26985 7ff719419771 HeapFree 26975->26985 26987 7ff71941975f HeapFree 26975->26987 26978 7ff71941962c 26976->26978 26981 7ff719419805 HeapFree 26976->26981 26984 7ff7194197f3 HeapFree 26976->26984 26977->26971 26982 7ff71941979d WakeByAddressSingle 26977->26982 26978->26971 26979 7ff719419823 26978->26979 26983 7ff7194198ba HeapFree 26978->26983 26986 7ff7194198a8 HeapFree 26978->26986 26980 7ff71941982b WakeByAddressSingle 26979->26980 26988 7ff719419834 26979->26988 26980->26988 26981->26978 26982->26971 26983->26980 26983->26988 26984->26981 26985->26977 26986->26983 26987->26985 26988->26971 27081 7ff7194191c0 HeapFree HeapFree 26988->27081 27084 7ff719423d60 26990->27084 26992 7ff719423d59 27089 7ff719423db0 ExitProcess 26992->27089 26995->26730 26997 7ff719439990 26996->26997 26999 7ff719439a04 26996->26999 26998 7ff7193f5de0 4 API calls 26997->26998 26997->26999 26998->26999 26999->26841 27000->26811 27001->26804 27002->26822 27003->26844 27004->26871 27005->26869 27006->26869 27007->26860 27008->26736 27009->26757 27011 7ff71942af4a 27010->27011 27013 7ff71942af35 27010->27013 27011->26885 27011->26886 27012 7ff71942b208 27013->27012 27014 7ff719423dc0 3 API calls 27013->27014 27015 7ff71942affe 27014->27015 27015->27012 27016 7ff71942b150 27015->27016 27023 7ff71943e800 HeapAlloc GetProcessHeap HeapAlloc HeapReAlloc 27015->27023 27016->27012 27018 7ff71942b190 27016->27018 27020 7ff71942b16c SysAllocStringLen 27016->27020 27018->27011 27019 7ff71942b195 HeapFree 27018->27019 27019->27011 27020->27012 27021 7ff71942b180 SysStringLen 27020->27021 27021->27018 27022 7ff71942b1ff SysFreeString 27021->27022 27022->27012 27023->27015 27025 7ff7193f1045 27024->27025 27026 7ff7193f104b 27025->27026 27027 7ff7193f10c8 GetErrorInfo 27025->27027 27028 7ff7193f10e8 27026->27028 27029 7ff7193f1056 27026->27029 27027->27028 27030 7ff7193f107e 27028->27030 27032 7ff7193f1113 27028->27032 27029->27030 27037 7ff7193f1530 27029->27037 27034 7ff7193f10a0 27030->27034 27035 7ff7193f11c6 HeapFree 27030->27035 27071 7ff7193f4680 HeapFree 27032->27071 27034->26912 27034->26913 27035->27034 27036->26916 27039 7ff7193f159b 27037->27039 27038 7ff7193f168f GetErrorInfo 27052 7ff7193f16b4 27038->27052 27039->27038 27040 7ff7193f16c1 SafeArrayDestroy 27039->27040 27046 7ff7193f15cc 27039->27046 27041 7ff7193f251f GetErrorInfo 27040->27041 27042 7ff7193f170f 27040->27042 27044 7ff7193f2542 27041->27044 27047 7ff7193f176c ProcessPrng 27042->27047 27042->27052 27068 7ff7193f1739 27042->27068 27043 7ff7193f24f4 SafeArrayDestroy 27043->27041 27043->27042 27050 7ff7193f25f3 HeapFree 27044->27050 27044->27052 27045 7ff7193f168d 27045->27038 27046->27043 27046->27045 27048 7ff7193f166d HeapReAlloc 27046->27048 27049 7ff7193f24ea 27046->27049 27047->27068 27048->27043 27048->27045 27049->27043 27050->27052 27051 7ff7193f2406 27051->27052 27053 7ff7193f268b HeapFree 27051->27053 27052->27030 27053->27052 27054 7ff7193f23ec 27054->27051 27055 7ff7193f24d9 HeapFree 27054->27055 27055->27054 27056 7ff719423dc0 3 API calls 27056->27068 27057 7ff7193f1965 GetProcessHeap HeapAlloc 27057->27045 27063 7ff7193f198e 27057->27063 27058 7ff7193f1b80 GetErrorInfo 27059 7ff7193f2073 VariantClear 27058->27059 27058->27068 27067 7ff7193f20f8 27059->27067 27059->27068 27060 7ff7193f2474 HeapFree 27061 7ff7193f248b 27060->27061 27074 7ff7193f4560 HeapFree HeapFree 27061->27074 27062 7ff7193f20cb GetProcessHeap HeapFree 27062->27067 27062->27068 27063->27068 27066 7ff7193f20fd VariantClear 27066->27068 27067->27060 27067->27061 27068->27045 27068->27054 27068->27056 27068->27057 27068->27058 27068->27059 27068->27062 27068->27066 27068->27067 27070 7ff7193f234d HeapFree 27068->27070 27072 7ff7193f67e0 HeapFree HeapReAlloc HeapAlloc GetProcessHeap HeapAlloc 27068->27072 27073 7ff71943a2d0 HeapAlloc GetProcessHeap HeapAlloc HeapFree abort 27068->27073 27070->27068 27071->27034 27072->27068 27073->27068 27074->27054 27076 7ff7193f5da6 27075->27076 27077 7ff7193f5dae GetLastError 27075->27077 27078 7ff7193f4a25 RtlFreeHeap 27076->27078 27079 7ff7193f5dc1 HeapFree 27076->27079 27077->27076 27077->27078 27078->26929 27079->27078 27080->26965 27081->26971 27082->26970 27083->26971 27085 7ff719423d6f 27084->27085 27086 7ff719423d74 27084->27086 27085->26992 27090 7ff71943c180 58 API calls 27086->27090 27088 7ff719423d9d 27088->26992 27090->27088 27091 7ff719428391 27092 7ff7194283a8 27091->27092 27093 7ff7194283c2 27092->27093 27110 7ff71942859e 27092->27110 27177 7ff71943df61 58 API calls 27092->27177 27095 7ff7194283d8 27093->27095 27096 7ff719428cc1 27093->27096 27145 7ff719429620 NtQueryInformationProcess 27095->27145 27098 7ff7194293f0 6 API calls 27096->27098 27103 7ff719428cce 27098->27103 27099 7ff719428dcf VirtualQueryEx 27101 7ff719428e27 27099->27101 27102 7ff719428df4 27099->27102 27100 7ff7194283e5 27104 7ff71942857f 27100->27104 27115 7ff7194284f3 HeapFree 27100->27115 27106 7ff719428e75 27101->27106 27116 7ff719428e60 HeapFree 27101->27116 27157 7ff7194293f0 27102->27157 27118 7ff719428cd8 27103->27118 27178 7ff7194294f0 CommandLineToArgvW 27103->27178 27109 7ff71942858a HeapFree 27104->27109 27104->27110 27111 7ff719428e85 HeapFree 27106->27111 27120 7ff719428e99 27106->27120 27109->27110 27110->27099 27110->27120 27111->27120 27113 7ff719428ec0 27125 7ff719428f1d HeapFree 27113->27125 27134 7ff719428f32 27113->27134 27114 7ff719428d6c 27114->27110 27119 7ff719428d77 HeapFree 27114->27119 27115->27100 27116->27101 27117 7ff719428d18 HeapFree 27117->27118 27118->27114 27122 7ff719428d57 HeapFree 27118->27122 27119->27110 27121 7ff719423dc0 3 API calls 27120->27121 27123 7ff719429041 GetProcessHeap 27120->27123 27124 7ff7194290f0 27121->27124 27122->27118 27130 7ff7194292c8 HeapFree 27123->27130 27131 7ff7194292e0 GetLastError 27123->27131 27124->27123 27126 7ff7194290f9 ReadProcessMemory 27124->27126 27125->27113 27133 7ff71942912d 27126->27133 27127 7ff719428f82 27127->27120 27128 7ff71942905b RtlFreeHeap 27127->27128 27128->27120 27130->27131 27132 7ff7194292da 27130->27132 27135 7ff7194153a0 19 API calls 27133->27135 27134->27123 27134->27127 27167 7ff7194153a0 27134->27167 27173 7ff719429760 27134->27173 27136 7ff719429179 27135->27136 27138 7ff71942925a 27136->27138 27139 7ff7194291ab 27136->27139 27142 7ff719429279 HeapFree 27138->27142 27143 7ff719429265 HeapFree 27138->27143 27140 7ff7194291f0 27139->27140 27141 7ff7194291d5 HeapFree 27139->27141 27140->27142 27141->27140 27142->27123 27143->27142 27146 7ff71942967c 27145->27146 27147 7ff719429651 GetErrorInfo 27145->27147 27148 7ff719423dc0 3 API calls 27146->27148 27152 7ff719429727 27146->27152 27147->27146 27149 7ff7194296bd 27148->27149 27150 7ff719429755 27149->27150 27151 7ff7194296c6 NtQueryInformationProcess 27149->27151 27153 7ff7194296eb 27151->27153 27154 7ff719429715 HeapFree 27151->27154 27152->27100 27155 7ff7194294f0 21 API calls 27153->27155 27154->27152 27156 7ff719429701 HeapFree 27155->27156 27156->27152 27158 7ff7194294e9 27157->27158 27159 7ff719429412 27157->27159 27159->27158 27160 7ff719423dc0 3 API calls 27159->27160 27161 7ff719429447 27160->27161 27161->27158 27162 7ff719429450 ReadProcessMemory 27161->27162 27163 7ff71942947c 27162->27163 27164 7ff719429496 GetLastError 27162->27164 27165 7ff719428e16 27163->27165 27166 7ff7194294b6 HeapFree 27163->27166 27164->27166 27165->27101 27165->27113 27166->27165 27168 7ff7194153b5 27167->27168 27171 7ff7194153d3 27167->27171 27169 7ff719423dc0 3 API calls 27168->27169 27168->27171 27169->27171 27170 7ff7194155db 27170->27134 27171->27170 27184 7ff71943e8a0 19 API calls 27171->27184 27174 7ff719429773 27173->27174 27175 7ff7194297e7 27173->27175 27174->27175 27185 7ff71942c650 27174->27185 27175->27134 27177->27093 27179 7ff719428d13 27178->27179 27181 7ff71942951d 27178->27181 27179->27117 27179->27118 27180 7ff7194295c8 LocalFree 27180->27179 27181->27180 27182 7ff7194153a0 19 API calls 27181->27182 27183 7ff719429760 4 API calls 27181->27183 27182->27181 27183->27181 27184->27171 27186 7ff71942c667 27185->27186 27187 7ff71942c685 27185->27187 27186->27187 27188 7ff71942c66e RtlReAllocateHeap 27186->27188 27189 7ff71942c697 27187->27189 27190 7ff71942c6b5 27187->27190 27193 7ff71942c6a1 27187->27193 27188->27193 27192 7ff719423dc0 3 API calls 27189->27192 27191 7ff719423dc0 3 API calls 27190->27191 27191->27193 27192->27193 27193->27175 27194 7ff7193f1c9d VariantToPropVariant 27195 7ff7193f1e03 GetErrorInfo PropVariantClear 27194->27195 27196 7ff7193f1d10 PropVariantToBSTR 27194->27196 27201 7ff7193f1ea5 27195->27201 27197 7ff7193f1e6c GetErrorInfo 27196->27197 27198 7ff7193f1d79 27196->27198 27199 7ff7193f1e97 PropVariantClear 27197->27199 27200 7ff7193f1e8e SysFreeString 27197->27200 27198->27199 27199->27201 27200->27199 27202 7ff7193f1f4c SysFreeString 27201->27202 27219 7ff7193f184e 27201->27219 27202->27219 27203 7ff7193f168d GetErrorInfo 27215 7ff7193f16b4 27203->27215 27205 7ff7193f20fd VariantClear 27205->27219 27206 7ff7193f2073 VariantClear 27211 7ff7193f20f8 27206->27211 27206->27219 27208 7ff7193f2474 HeapFree 27209 7ff7193f248b 27208->27209 27227 7ff7193f4560 HeapFree HeapFree 27209->27227 27210 7ff7193f20cb GetProcessHeap HeapFree 27210->27211 27210->27219 27211->27208 27211->27209 27213 7ff7193f2498 27214 7ff7193f2680 27213->27214 27217 7ff7193f24d9 HeapFree 27213->27217 27214->27215 27216 7ff7193f268b HeapFree 27214->27216 27216->27215 27217->27213 27219->27203 27219->27205 27219->27206 27219->27210 27219->27211 27219->27213 27220 7ff7193f234d HeapFree 27219->27220 27221 7ff719423dc0 3 API calls 27219->27221 27222 7ff7193f1965 GetProcessHeap HeapAlloc 27219->27222 27223 7ff7193f1b80 GetErrorInfo 27219->27223 27225 7ff7193f67e0 HeapFree HeapReAlloc HeapAlloc GetProcessHeap HeapAlloc 27219->27225 27226 7ff71943a2d0 HeapAlloc GetProcessHeap HeapAlloc HeapFree abort 27219->27226 27220->27219 27221->27219 27222->27203 27224 7ff7193f198e 27222->27224 27223->27206 27223->27219 27224->27219 27225->27219 27226->27219 27227->27213 27228 7ff719411d93 27241 7ff719411dad 27228->27241 27229 7ff719411e1c HeapFree 27242 7ff719411e2b 27229->27242 27230 7ff71941217a GetSystemInfo 27231 7ff7194121bf 27230->27231 27232 7ff71943c0e0 4 API calls 27231->27232 27234 7ff71941222b 27232->27234 27233 7ff719411eae 27233->27230 27235 7ff719411ebc HeapFree 27233->27235 27244 7ff719413354 27233->27244 27236 7ff71943c0e0 4 API calls 27234->27236 27235->27230 27240 7ff719412241 27236->27240 27237 7ff719412116 27238 7ff71941215b HeapFree 27237->27238 27239 7ff719412170 27237->27239 27238->27239 27239->27230 27239->27231 27243 7ff719423dc0 HeapAlloc GetProcessHeap HeapAlloc 27240->27243 27246 7ff71941241a 27240->27246 27275 7ff719412d56 27240->27275 27241->27229 27241->27237 27241->27242 27242->27230 27242->27233 27242->27237 27243->27240 27244->27275 27317 7ff7194191c0 HeapFree HeapFree 27244->27317 27247 7ff71943c0e0 4 API calls 27246->27247 27248 7ff7194124a8 27247->27248 27249 7ff71943c0e0 4 API calls 27248->27249 27251 7ff7194124b9 27249->27251 27250 7ff719423dc0 HeapAlloc GetProcessHeap HeapAlloc 27250->27251 27251->27250 27252 7ff7194125de 27251->27252 27251->27275 27254 7ff719423dc0 3 API calls 27252->27254 27252->27275 27293 7ff719412661 abort 27252->27293 27253 7ff71941357b 27255 7ff719412cff 27253->27255 27307 7ff719424050 HeapFree HeapFree HeapFree 27253->27307 27254->27293 27308 7ff719413960 HeapFree HeapFree HeapFree HeapFree HeapFree 27255->27308 27258 7ff7194126d6 HeapFree 27258->27293 27259 7ff7194135a3 27260 7ff7194135fe 27259->27260 27261 7ff7194135ec HeapFree 27259->27261 27263 7ff71941362a HeapFree 27260->27263 27264 7ff71941363c 27260->27264 27261->27260 27262 7ff7194136b8 27263->27264 27265 7ff71941367a 27264->27265 27266 7ff719413668 HeapFree 27264->27266 27265->27262 27267 7ff7194136a6 HeapFree 27265->27267 27266->27265 27267->27262 27268 7ff719413868 27270 7ff7194138cd HeapFree 27268->27270 27271 7ff71941387f 27268->27271 27269 7ff719410a40 4 API calls 27269->27293 27270->27271 27272 7ff71941389a 27270->27272 27271->27272 27314 7ff719424050 HeapFree HeapFree HeapFree 27271->27314 27274 7ff7194138a8 27272->27274 27316 7ff719424050 HeapFree HeapFree HeapFree 27272->27316 27302 7ff719413715 27274->27302 27315 7ff719423df0 12 API calls 27274->27315 27278 7ff719423dc0 HeapAlloc GetProcessHeap HeapAlloc 27278->27293 27280 7ff71941384a 27280->27259 27313 7ff719423df0 12 API calls 27280->27313 27281 7ff719412f8e HeapFree 27281->27293 27283 7ff719412cb1 WakeByAddressAll 27284 7ff719412ccd WakeByAddressSingle 27283->27284 27283->27293 27284->27293 27286 7ff7194137e5 WakeByAddressSingle 27288 7ff71941373b 27286->27288 27288->27275 27288->27280 27288->27286 27289 7ff71941383c WakeByAddressSingle 27288->27289 27312 7ff71943c480 WaitOnAddress GetLastError 27288->27312 27289->27288 27290 7ff71943c540 10 API calls 27297 7ff719412a00 27290->27297 27292 7ff719422140 7 API calls 27292->27293 27293->27244 27293->27253 27293->27255 27293->27258 27293->27268 27293->27269 27293->27275 27293->27278 27293->27281 27293->27283 27293->27292 27294 7ff7194136e2 27293->27294 27295 7ff719413485 CloseHandle 27293->27295 27293->27297 27303 7ff71943c480 WaitOnAddress GetLastError 27293->27303 27304 7ff7194191c0 HeapFree HeapFree 27293->27304 27296 7ff7194136fb 27294->27296 27309 7ff719410ca0 7 API calls 27294->27309 27295->27297 27296->27302 27310 7ff719410dd0 HeapFree HeapFree 27296->27310 27297->27255 27297->27290 27297->27293 27305 7ff719410dd0 HeapFree HeapFree 27297->27305 27306 7ff719410ca0 7 API calls 27297->27306 27311 7ff719413960 HeapFree HeapFree HeapFree HeapFree HeapFree 27302->27311 27303->27293 27304->27293 27305->27297 27306->27297 27307->27255 27308->27259 27309->27296 27310->27302 27311->27288 27312->27288 27313->27259 27314->27272 27315->27302 27316->27274 27317->27275 27318 7ff7194240f5 PdhOpenQueryA 27319 7ff71942411c 27318->27319 27320 7ff71942413d 27318->27320 27319->27320 27321 7ff719424160 ProcessPrng 27319->27321 27322 7ff7194243cd 27320->27322 27323 7ff719423dc0 3 API calls 27320->27323 27321->27320 27324 7ff719424522 27322->27324 27325 7ff7194243e1 PdhCollectQueryData 27322->27325 27327 7ff71942422c 27323->27327 27326 7ff7194243f6 27325->27326 27339 7ff719424406 27325->27339 27375 7ff71942a5f0 PdhGetFormattedCounterValue 27326->27375 27329 7ff719424543 27327->27329 27330 7ff719423dc0 3 API calls 27327->27330 27333 7ff719423dc0 3 API calls 27329->27333 27331 7ff719424274 27330->27331 27331->27329 27349 7ff719429eb0 27331->27349 27332 7ff71942449a 27332->27324 27377 7ff719429b80 6 API calls 27332->27377 27342 7ff71942458c NtQuerySystemInformation 27333->27342 27338 7ff7194244c1 27338->27324 27343 7ff719424513 HeapFree 27338->27343 27339->27329 27339->27332 27376 7ff71942a5f0 PdhGetFormattedCounterValue 27339->27376 27340 7ff719424615 GetErrorInfo 27341 7ff719424750 27340->27341 27340->27342 27345 7ff719424ed9 RtlFreeHeap 27341->27345 27347 7ff719424edf 27341->27347 27342->27340 27343->27324 27344 7ff7194242be 27344->27322 27346 7ff7193fd6c0 HeapReAlloc HeapAlloc GetProcessHeap HeapAlloc 27344->27346 27348 7ff719429eb0 27 API calls 27344->27348 27345->27347 27346->27344 27348->27344 27350 7ff719429f06 27349->27350 27359 7ff719429f22 27349->27359 27351 7ff719423dc0 3 API calls 27350->27351 27365 7ff71942a5e1 27350->27365 27360 7ff719429ffb 27351->27360 27352 7ff71942a26e PdhAddEnglishCounterW 27353 7ff71942a325 27352->27353 27362 7ff71942a26c 27352->27362 27358 7ff719423dc0 3 API calls 27353->27358 27353->27365 27366 7ff71942a353 27353->27366 27354 7ff71942a2ba 27356 7ff71942a2cd HeapFree 27354->27356 27372 7ff71942a2e0 27354->27372 27355 7ff71942a2a6 HeapFree 27355->27354 27356->27372 27357 7ff71942a2e6 HeapFree 27374 7ff71942a2f8 27357->27374 27358->27366 27359->27352 27359->27362 27360->27359 27360->27365 27378 7ff71943e8a0 19 API calls 27360->27378 27362->27354 27362->27355 27363 7ff71942a55e 27379 7ff71943dfb0 HeapAlloc GetProcessHeap HeapAlloc HeapFree abort 27363->27379 27366->27363 27366->27365 27367 7ff71942a487 27366->27367 27368 7ff71942a4a7 27367->27368 27369 7ff71942a495 HeapFree 27367->27369 27370 7ff71942a4c7 HeapFree 27368->27370 27371 7ff71942a4db 27368->27371 27369->27368 27370->27371 27371->27372 27373 7ff71942a4eb HeapFree 27371->27373 27372->27357 27372->27374 27373->27372 27374->27344 27375->27339 27376->27339 27377->27338 27378->27360 27379->27365 27380 7ff7193f9496 27381 7ff7193f94a5 27380->27381 27382 7ff7193f72c3 27380->27382 27383 7ff71942b510 15 API calls 27382->27383 27384 7ff7193f72e0 27383->27384 27385 7ff7193f9a25 HeapFree 27384->27385 27387 7ff719423dc0 3 API calls 27384->27387 27388 7ff7193f9a9e 27385->27388 27389 7ff7193f7316 27387->27389 27390 7ff719419570 22 API calls 27388->27390 27389->27385 27391 7ff719423dc0 3 API calls 27389->27391 27400 7ff7193f9b90 27390->27400 27392 7ff7193f7383 27391->27392 27392->27385 27393 7ff719423dc0 3 API calls 27392->27393 27396 7ff7193f7430 27393->27396 27394 7ff7193fa386 27395 7ff719423d50 59 API calls 27394->27395 27398 7ff7193fa38b 27395->27398 27396->27385 27399 7ff719423dc0 3 API calls 27396->27399 27397 7ff719419570 22 API calls 27397->27400 27402 7ff7193f74cf 27399->27402 27400->27394 27400->27397 27401 7ff719423d50 59 API calls 27400->27401 27401->27400 27402->27385 27403 7ff719423dc0 3 API calls 27402->27403 27404 7ff7193f759c 27403->27404 27404->27385 27405 7ff719423dc0 3 API calls 27404->27405 27406 7ff7193f764b 27405->27406 27406->27385 27407 7ff719423dc0 3 API calls 27406->27407 27408 7ff7193f76fe 27407->27408 27408->27385 27409 7ff719423dc0 3 API calls 27408->27409 27410 7ff7193f77ca 27409->27410 27410->27385 27411 7ff719423dc0 3 API calls 27410->27411 27412 7ff7193f7876 27411->27412 27412->27385 27413 7ff719423dc0 3 API calls 27412->27413 27478 7ff7193f7933 27413->27478 27414 7ff7193f8255 27415 7ff7193f8267 HeapFree 27414->27415 27416 7ff7193f9354 HeapFree 27414->27416 27418 7ff7193f828e 27415->27418 27416->27414 27417 7ff719423dc0 HeapAlloc GetProcessHeap HeapAlloc 27417->27478 27419 7ff71942b510 15 API calls 27418->27419 27421 7ff7193f8436 27419->27421 27420 7ff71942af20 8 API calls 27420->27478 27421->27385 27422 7ff7193f2760 41 API calls 27421->27422 27440 7ff7193f8557 27422->27440 27423 7ff7193f99e7 GetErrorInfo 27425 7ff7193f9a10 27423->27425 27424 7ff7193f86a1 27427 7ff7193f86ca 27424->27427 27428 7ff7193f86b8 HeapFree 27424->27428 27429 7ff7193f9a1b 27425->27429 27430 7ff7193f9a27 SysFreeString 27425->27430 27426 7ff7193f7bde SysFreeString 27426->27478 27437 7ff71942b510 15 API calls 27427->27437 27428->27427 27431 7ff7193f9a35 SysFreeString 27429->27431 27432 7ff7193f9a20 27429->27432 27430->27431 27430->27432 27431->27385 27434 7ff7193f9a43 HeapFree 27431->27434 27432->27385 27432->27434 27433 7ff7193f7bec SysFreeString 27433->27478 27436 7ff7193f9a57 27434->27436 27435 7ff7193f7bff HeapFree 27435->27478 27436->27385 27521 7ff7193f4560 HeapFree HeapFree 27436->27521 27443 7ff7193f86f2 27437->27443 27439 7ff7193f8293 GetErrorInfo 27442 7ff7193f82c3 27439->27442 27440->27385 27440->27424 27514 7ff7193f4560 HeapFree HeapFree 27440->27514 27448 7ff7193f82fb 27442->27448 27513 7ff7193f4680 HeapFree 27442->27513 27443->27385 27445 7ff7193f2760 41 API calls 27443->27445 27446 7ff7193f87c6 27445->27446 27446->27385 27447 7ff7193f1210 3 API calls 27446->27447 27449 7ff7193f8831 27447->27449 27448->27385 27450 7ff7193f83c1 27448->27450 27451 7ff7193f83aa HeapFree 27448->27451 27453 7ff719423dc0 3 API calls 27449->27453 27456 7ff7193f8838 27449->27456 27452 7ff7193f83f4 HeapFree 27450->27452 27454 7ff7193f91d4 HeapFree 27450->27454 27451->27450 27452->27418 27468 7ff7193f885b 27453->27468 27454->27450 27455 7ff7193f7e40 GetErrorInfo 27455->27478 27457 7ff7193f8a06 27456->27457 27462 7ff7193f89f1 HeapFree 27456->27462 27459 7ff7193f8a1d 27457->27459 27460 7ff7193f8a0b HeapFree 27457->27460 27458 7ff7193f1210 3 API calls 27458->27468 27463 7ff7193f8a41 27459->27463 27515 7ff7193f4560 HeapFree HeapFree 27459->27515 27460->27459 27461 7ff7193f1530 26 API calls 27461->27478 27462->27456 27464 7ff7193f8a5b 27463->27464 27465 7ff7193f8a49 HeapFree 27463->27465 27469 7ff71942b510 15 API calls 27464->27469 27465->27464 27467 7ff719439980 4 API calls 27467->27468 27468->27385 27468->27456 27468->27458 27468->27467 27473 7ff7193f8a83 27469->27473 27470 7ff719439980 4 API calls 27470->27478 27471 7ff7193f833d 27471->27448 27472 7ff7193f8342 HeapFree 27471->27472 27472->27448 27473->27385 27475 7ff7193f2760 41 API calls 27473->27475 27474 7ff7193f80bb HeapFree 27474->27478 27481 7ff7193f8b66 27475->27481 27476 7ff7193f8093 HeapFree 27476->27478 27477 7ff7193f80f6 HeapFree 27477->27478 27478->27385 27478->27414 27478->27415 27478->27417 27478->27420 27478->27423 27478->27425 27478->27426 27478->27433 27478->27435 27478->27436 27478->27439 27478->27442 27478->27448 27478->27455 27478->27461 27478->27470 27478->27471 27478->27474 27478->27476 27478->27477 27478->27478 27479 7ff7193f8048 HeapFree 27478->27479 27479->27478 27480 7ff7193f8bb1 27482 7ff7193f8bb6 HeapFree 27480->27482 27484 7ff7193f8bc8 27480->27484 27481->27385 27481->27480 27516 7ff7193f4560 HeapFree HeapFree 27481->27516 27482->27484 27485 7ff71942aaa0 2 API calls 27484->27485 27486 7ff7193f8bee 27485->27486 27487 7ff7193f4790 26 API calls 27486->27487 27488 7ff7193f8c03 27487->27488 27489 7ff71942aaa0 2 API calls 27488->27489 27490 7ff7193f8c1b GetTickCount64 27489->27490 27491 7ff7193f4790 26 API calls 27490->27491 27492 7ff7193f8c31 27491->27492 27493 7ff71942b510 15 API calls 27492->27493 27494 7ff7193f8c4b 27493->27494 27494->27385 27495 7ff7193f2760 41 API calls 27494->27495 27496 7ff7193f8d57 27495->27496 27496->27385 27512 7ff7193f8d62 27496->27512 27497 7ff7193f91e8 27498 7ff7193f9171 27497->27498 27520 7ff7193f4560 HeapFree HeapFree 27497->27520 27499 7ff7193f9233 HeapFree 27498->27499 27500 7ff7193f9186 27498->27500 27499->27500 27500->27388 27502 7ff7193f92b8 27500->27502 27504 7ff7193f92e5 27502->27504 27505 7ff7193f92df HeapFree 27502->27505 27506 7ff7193f4790 26 API calls 27504->27506 27505->27504 27508 7ff7193f92f2 27506->27508 27507 7ff7193f9131 27518 7ff7193f4560 HeapFree HeapFree 27507->27518 27510 7ff7193f913e 27510->27498 27519 7ff7193f4560 HeapFree HeapFree 27510->27519 27512->27497 27512->27498 27512->27507 27517 7ff7193f4560 HeapFree HeapFree 27512->27517 27513->27448 27514->27440 27515->27459 27516->27481 27517->27512 27518->27510 27519->27510 27520->27497 27521->27436 27522 7ff7194267e0 27523 7ff71942686d 27522->27523 27524 7ff7194267f6 27522->27524 27524->27523 27525 7ff71942c650 4 API calls 27524->27525 27525->27523 27526 7ff719422360 SetThreadStackGuarantee 27531 7ff719410f60 27526->27531 27527 7ff7194223ae HeapFree 27529 7ff71942239c HeapFree 27529->27527 27532 7ff719410f8d 27531->27532 27558 7ff719411468 27531->27558 27536 7ff719411030 27532->27536 27595 7ff7194114a0 HeapFree HeapFree 27532->27595 27534 7ff719411028 27596 7ff719411550 27534->27596 27540 7ff7194110a5 27536->27540 27601 7ff719422910 HeapFree GetCurrentThread SetThreadDescription HeapFree 27536->27601 27538 7ff719411115 27543 7ff719410a40 4 API calls 27538->27543 27539 7ff719411472 27541 7ff71941147c 27539->27541 27542 7ff719411486 27539->27542 27540->27538 27540->27539 27602 7ff7194191c0 HeapFree HeapFree 27540->27602 27610 7ff71943c540 10 API calls 27541->27610 27542->27558 27611 7ff7194191c0 HeapFree HeapFree 27542->27611 27545 7ff719411129 27543->27545 27549 7ff719411439 27545->27549 27550 7ff7194111aa WakeByAddressAll 27545->27550 27545->27558 27547 7ff719411481 27547->27542 27608 7ff71943c480 WaitOnAddress GetLastError 27549->27608 27551 7ff7194111cb WakeByAddressSingle 27550->27551 27553 7ff7194111d4 27550->27553 27551->27553 27554 7ff71941122a 27553->27554 27553->27558 27577 7ff71943b3d0 27553->27577 27556 7ff71941146a 27554->27556 27557 7ff71941125e WakeByAddressAll 27554->27557 27554->27558 27609 7ff71943c480 WaitOnAddress GetLastError 27556->27609 27560 7ff71941127a WakeByAddressSingle 27557->27560 27562 7ff719411283 27557->27562 27560->27562 27561 7ff7194112f8 27564 7ff719411318 27561->27564 27604 7ff719424050 HeapFree HeapFree HeapFree 27561->27604 27562->27558 27562->27561 27603 7ff719424050 HeapFree HeapFree HeapFree 27562->27603 27566 7ff719411341 HeapFree 27564->27566 27570 7ff719411425 HeapFree 27564->27570 27567 7ff71941135e 27566->27567 27575 7ff71941136b 27566->27575 27605 7ff719423df0 12 API calls 27567->27605 27569 7ff7194113b4 27571 7ff7194113df 27569->27571 27606 7ff719410ca0 7 API calls 27569->27606 27570->27564 27573 7ff7194113ee 27571->27573 27607 7ff719410dd0 HeapFree HeapFree 27571->27607 27573->27527 27573->27529 27575->27569 27576 7ff7194113a2 HeapFree 27575->27576 27576->27569 27581 7ff71943baac 27577->27581 27592 7ff71943b3ed 27577->27592 27579 7ff71943babd 27580 7ff71943bb00 4 API calls 27579->27580 27580->27581 27581->27554 27584 7ff71943b650 SwitchToThread 27584->27592 27585 7ff71943b6ed SwitchToThread 27585->27592 27587 7ff719410450 65 API calls 27587->27592 27588 7ff71943b9a0 SwitchToThread 27588->27592 27589 7ff71943b910 SwitchToThread 27589->27592 27590 7ff71943b890 SwitchToThread 27590->27592 27591 7ff71943ba08 HeapFree 27591->27592 27592->27579 27592->27581 27592->27584 27592->27585 27592->27587 27592->27588 27592->27589 27592->27590 27592->27591 27592->27592 27612 7ff719410290 27592->27612 27618 7ff71943bb00 27592->27618 27624 7ff719427800 27592->27624 27643 7ff719427b40 27592->27643 27655 7ff71943bc00 6 API calls 27592->27655 27656 7ff71943cc80 67 API calls 27592->27656 27595->27534 27597 7ff7194115ba 27596->27597 27599 7ff719411564 27596->27599 27597->27536 27598 7ff7194115a0 HeapFree 27598->27597 27599->27598 27600 7ff71941158e HeapFree 27599->27600 27600->27598 27601->27540 27602->27538 27603->27561 27604->27564 27605->27575 27606->27571 27607->27573 27608->27553 27609->27539 27610->27547 27611->27558 27614 7ff7194102be 27612->27614 27617 7ff71941031e 27612->27617 27614->27617 27658 7ff71943cc80 67 API calls 27614->27658 27615 7ff719410406 27615->27592 27617->27615 27657 7ff719410450 65 API calls 27617->27657 27619 7ff71943bbe7 27618->27619 27621 7ff71943bb18 27618->27621 27619->27592 27621->27619 27622 7ff71943bba0 WakeByAddressSingle 27621->27622 27623 7ff71943bbc7 WakeByAddressSingle 27621->27623 27659 7ff71943c480 WaitOnAddress GetLastError 27621->27659 27622->27621 27622->27623 27623->27621 27625 7ff719427833 27624->27625 27640 7ff71942791f 27624->27640 27626 7ff719425970 3 API calls 27625->27626 27627 7ff719427861 27626->27627 27660 7ff719427a10 12 API calls 27627->27660 27629 7ff719427869 27630 7ff719427924 27629->27630 27631 7ff719427893 27629->27631 27632 7ff7194279a0 WakeByAddressSingle 27630->27632 27636 7ff71942797b WakeByAddressSingle 27630->27636 27630->27640 27662 7ff71943c480 WaitOnAddress GetLastError 27630->27662 27634 7ff7194278eb 27631->27634 27631->27640 27642 7ff719427906 27631->27642 27663 7ff71943c480 WaitOnAddress GetLastError 27631->27663 27632->27636 27632->27640 27637 7ff7194279dd WakeByAddressSingle 27634->27637 27638 7ff7194278f5 27634->27638 27636->27630 27641 7ff7194278fd WakeByAddressSingle 27637->27641 27637->27642 27638->27641 27638->27642 27640->27592 27641->27642 27642->27640 27661 7ff719423df0 12 API calls 27642->27661 27644 7ff719427b5f 27643->27644 27645 7ff719427c56 27643->27645 27644->27645 27646 7ff719426890 67 API calls 27644->27646 27645->27592 27647 7ff719427bd4 27646->27647 27664 7ff719427630 14 API calls 27647->27664 27649 7ff719427bdd 27650 7ff719427c13 WakeByAddressAll 27649->27650 27665 7ff71943c480 WaitOnAddress GetLastError 27649->27665 27651 7ff719427c2c WakeByAddressSingle 27650->27651 27652 7ff719427c40 27650->27652 27651->27652 27652->27592 27654 7ff719427c54 27654->27650 27655->27592 27656->27592 27657->27617 27658->27617 27659->27621 27660->27629 27661->27640 27662->27630 27663->27634 27664->27649 27665->27654 27666 7ff719424740 27667 7ff71942474a 27666->27667 27668 7ff71942477a GetSystemTimePreciseAsFileTime 27667->27668 27669 7ff7194247b3 27668->27669 27670 7ff719425970 3 API calls 27669->27670 27671 7ff7194248f7 27670->27671 27672 7ff7194248fc HeapFree 27671->27672 27674 7ff71942490e 27671->27674 27672->27674 27673 7ff719424a4c 27675 7ff719424ea4 27673->27675 27679 7ff719424e6c 27673->27679 27691 7ff719424e57 27673->27691 27696 7ff719426470 9 API calls 27673->27696 27682 7ff71942495c 27674->27682 27699 7ff71943e8a0 19 API calls 27674->27699 27680 7ff719424eaf HeapFree 27675->27680 27681 7ff719424ec3 27675->27681 27676 7ff71942499d HeapFree 27677 7ff719424a47 27676->27677 27676->27682 27677->27673 27687 7ff719424b0a HeapFree 27677->27687 27688 7ff719424ab0 HeapFree 27677->27688 27695 7ff719426470 9 API calls 27677->27695 27679->27675 27698 7ff719426470 9 API calls 27679->27698 27680->27681 27685 7ff719424ed9 RtlFreeHeap 27681->27685 27689 7ff719424edf 27681->27689 27682->27673 27682->27676 27686 7ff719424a07 RtlFreeHeap 27682->27686 27694 7ff71943e8a0 19 API calls 27682->27694 27685->27689 27686->27682 27687->27688 27688->27673 27688->27677 27697 7ff71943d2d0 HeapAlloc GetProcessHeap HeapAlloc HeapFree abort 27691->27697 27694->27682 27695->27677 27696->27673 27697->27679 27698->27679 27699->27682 27700 7ff7193f9368 27701 7ff7193f93ab 27700->27701 27702 7ff7193f2760 41 API calls 27701->27702 27703 7ff7193f9435 27702->27703 27704 7ff7193f996f HeapFree 27703->27704 27706 7ff7193f94b2 ProcessPrng 27703->27706 27722 7ff7193f9473 27703->27722 27707 7ff7193f9a9e 27704->27707 27706->27722 27711 7ff719419570 22 API calls 27707->27711 27708 7ff7193f9824 27709 7ff7193f9861 27708->27709 27731 7ff7193f4560 HeapFree HeapFree 27708->27731 27710 7ff7193f986c HeapFree 27709->27710 27714 7ff7193f9883 27709->27714 27710->27714 27725 7ff7193f9b90 27711->27725 27713 7ff7193f993b 27713->27704 27715 7ff7193f9958 HeapFree 27713->27715 27714->27704 27714->27713 27717 7ff7193f9925 HeapFree 27714->27717 27715->27704 27717->27714 27718 7ff719423dc0 3 API calls 27718->27722 27719 7ff7193fa386 27721 7ff719423d50 59 API calls 27719->27721 27720 7ff719419570 22 API calls 27720->27725 27723 7ff7193fa38b 27721->27723 27722->27704 27722->27708 27722->27709 27722->27718 27724 7ff7193f9812 27722->27724 27728 7ff7193f97d5 HeapFree 27722->27728 27729 7ff7193f4560 HeapFree HeapFree 27722->27729 27730 7ff719439a20 HeapAlloc GetProcessHeap HeapAlloc HeapFree abort 27724->27730 27725->27719 27725->27720 27727 7ff719423d50 59 API calls 27725->27727 27727->27725 27728->27722 27729->27722 27730->27708 27731->27708 27732 7ff71942a743 27733 7ff71942a7af 27732->27733 27734 7ff71942a767 27732->27734 27735 7ff719423dc0 3 API calls 27733->27735 27737 7ff71942a7b6 27733->27737 27734->27733 27736 7ff71942c650 4 API calls 27734->27736 27738 7ff71942a8a6 abort 27735->27738 27736->27733 27739 7ff71942a8c9 GlobalMemoryStatusEx 27738->27739 27740 7ff71942a998 GetLastError 27739->27740 27741 7ff71942a99e K32GetPerformanceInfo 27739->27741 27740->27741 27742 7ff71942a9e9 27741->27742 27743 7ff719427ce5 27744 7ff719427d39 GetProcessTimes 27743->27744 27745 7ff719427d6d GetSystemTimes 27743->27745 27744->27745 27746 7ff719427d67 GetLastError 27744->27746 27747 7ff719427d8c GetLastError 27745->27747 27748 7ff719427d92 27745->27748 27746->27745 27747->27748 27749 7ff719427ef6 GetProcessIoCounters 27748->27749 27751 7ff719427e4b 27748->27751 27750 7ff71942809c GetLastError 27749->27750 27749->27751 27750->27751 27752 7ff719427f8d OpenProcessToken 27751->27752 27753 7ff7194280ca 27751->27753 27754 7ff7194280c4 GetLastError 27752->27754 27755 7ff719427fb4 27752->27755 27756 7ff71942813c NtQueryInformationProcess 27753->27756 27768 7ff71942840f abort 27753->27768 27754->27753 27755->27753 27757 7ff719427fca GetTokenInformation 27755->27757 27758 7ff719428174 ReadProcessMemory 27756->27758 27756->27768 27760 7ff719428014 GetProcessHeap 27757->27760 27761 7ff719427ff4 GetLastError 27757->27761 27764 7ff719428409 GetLastError 27758->27764 27765 7ff7194281ad ReadProcessMemory 27758->27765 27759 7ff719428529 27766 7ff71942802d HeapAlloc 27760->27766 27767 7ff7194280b1 GetLastError 27760->27767 27761->27760 27763 7ff7194280b7 CloseHandle 27761->27763 27763->27753 27763->27754 27764->27768 27765->27764 27779 7ff7194281dc 27765->27779 27766->27763 27769 7ff719428043 GetTokenInformation 27766->27769 27767->27763 27768->27759 27773 7ff71942845e K32GetModuleFileNameExW 27768->27773 27771 7ff719428069 27769->27771 27772 7ff7194285b1 GetLastError 27769->27772 27770 7ff719428771 27777 7ff7194287a2 VirtualQueryEx 27770->27777 27791 7ff71942892e 27770->27791 27854 7ff7194292f0 27771->27854 27867 7ff7194292b0 GetProcessHeap HeapFree GetLastError 27772->27867 27776 7ff719428480 27773->27776 27783 7ff7194153a0 19 API calls 27776->27783 27785 7ff7194288d6 27777->27785 27786 7ff7194287d3 27777->27786 27778 7ff7194285bf CloseHandle 27778->27753 27784 7ff7194285d0 27778->27784 27779->27770 27780 7ff719428240 27779->27780 27870 7ff71943df61 58 API calls 27779->27870 27787 7ff719428659 27780->27787 27788 7ff719428256 27780->27788 27783->27759 27784->27754 27798 7ff719428911 27785->27798 27814 7ff719428900 HeapFree 27785->27814 27792 7ff719428c74 GetProcessHeap 27786->27792 27807 7ff719423dc0 3 API calls 27786->27807 27797 7ff719423dc0 3 API calls 27787->27797 27795 7ff719429620 26 API calls 27788->27795 27789 7ff71942808a 27865 7ff7194292b0 GetProcessHeap HeapFree GetLastError 27789->27865 27790 7ff7194285d5 27793 7ff71942860a 27790->27793 27794 7ff7194285f4 HeapFree 27790->27794 27791->27768 27800 7ff719423dc0 3 API calls 27791->27800 27812 7ff7194292c8 HeapFree 27792->27812 27813 7ff7194292e0 GetLastError 27792->27813 27868 7ff7194292b0 GetProcessHeap HeapFree GetLastError 27793->27868 27794->27793 27802 7ff719428263 27795->27802 27804 7ff719428671 27797->27804 27798->27791 27799 7ff71942891c HeapFree 27798->27799 27799->27791 27806 7ff7194289ec 27800->27806 27809 7ff719428752 27802->27809 27826 7ff7194282a4 HeapFree 27802->27826 27803 7ff719428092 27866 7ff7194293d0 CloseHandle GetLastError 27803->27866 27804->27792 27811 7ff71942867a ReadProcessMemory 27804->27811 27806->27792 27816 7ff7194289f5 ReadProcessMemory 27806->27816 27817 7ff719428829 27807->27817 27808 7ff719428627 27869 7ff7194293d0 CloseHandle GetLastError 27808->27869 27809->27770 27815 7ff71942875d HeapFree 27809->27815 27820 7ff7194286d8 GetLastError 27811->27820 27821 7ff7194286a6 27811->27821 27812->27813 27822 7ff7194292da 27812->27822 27814->27785 27815->27770 27823 7ff719428a27 27816->27823 27824 7ff719428b05 GetLastError 27816->27824 27817->27792 27825 7ff719428832 ReadProcessMemory 27817->27825 27819 7ff71942809a 27819->27753 27828 7ff7194286de HeapFree 27820->27828 27827 7ff7194286ad 27821->27827 27821->27828 27830 7ff719428b0b HeapFree 27823->27830 27839 7ff719428a32 27823->27839 27824->27830 27831 7ff7194288be GetLastError 27825->27831 27832 7ff71942885b 27825->27832 27826->27802 27833 7ff7194294f0 21 API calls 27827->27833 27829 7ff71942870b 27828->27829 27829->27809 27838 7ff719428740 HeapFree 27829->27838 27830->27768 27834 7ff719428b30 HeapFree 27830->27834 27836 7ff7194288c4 HeapFree 27831->27836 27835 7ff719428862 27832->27835 27832->27836 27837 7ff7194286c4 HeapFree 27833->27837 27834->27768 27842 7ff7194288ad HeapFree 27835->27842 27849 7ff719428b8c 27835->27849 27836->27785 27837->27829 27838->27829 27840 7ff7194153a0 19 API calls 27839->27840 27843 7ff719428a74 27840->27843 27841 7ff719428c79 RtlFreeHeap 27841->27791 27842->27835 27845 7ff719428b58 27843->27845 27846 7ff719428ab2 27843->27846 27844 7ff719428bdb 27844->27841 27847 7ff719428b75 HeapFree 27845->27847 27848 7ff719428b63 HeapFree 27845->27848 27850 7ff719428ad8 HeapFree 27846->27850 27851 7ff719428aee 27846->27851 27847->27768 27848->27847 27849->27792 27849->27841 27849->27844 27852 7ff7194153a0 19 API calls 27849->27852 27853 7ff719429760 4 API calls 27849->27853 27850->27851 27851->27847 27852->27849 27853->27849 27855 7ff719429301 IsValidSid 27854->27855 27856 7ff719428079 27854->27856 27855->27856 27857 7ff719429311 GetLengthSid 27855->27857 27856->27789 27856->27790 27858 7ff71942931e 27857->27858 27859 7ff719429366 CopySid 27857->27859 27861 7ff719423dc0 3 API calls 27858->27861 27859->27856 27860 7ff71942937a GetLastError 27859->27860 27860->27856 27862 7ff719429335 27861->27862 27862->27856 27863 7ff71942933e CopySid 27862->27863 27863->27856 27864 7ff719429397 GetLastError HeapFree 27863->27864 27864->27856 27865->27803 27866->27819 27867->27778 27868->27808 27869->27819 27870->27780 27871 7ff71942ee44 27899 7ff71942f120 27871->27899 27874 7ff71942ef9b 27917 7ff71942f3b8 7 API calls abort 27874->27917 27875 7ff71942ee65 __scrt_acquire_startup_lock 27877 7ff71942efa5 27875->27877 27887 7ff71942ee83 abort __scrt_release_startup_lock 27875->27887 27918 7ff71942f3b8 7 API calls abort 27877->27918 27879 7ff71942efb0 27919 7ff719430604 22 API calls abort 27879->27919 27881 7ff71942efb7 27920 7ff719430610 22 API calls abort 27881->27920 27882 7ff71942eea8 27884 7ff71942efbf 27885 7ff71942ef2e 27907 7ff7194311a4 62 API calls 27885->27907 27887->27882 27887->27885 27916 7ff71943063c 34 API calls 27887->27916 27889 7ff71942ef33 27908 7ff7193fd450 AddVectoredExceptionHandler SetThreadStackGuarantee GetCurrentThread SetThreadDescription 27889->27908 27921 7ff71942f5d8 27899->27921 27902 7ff71942f14f 27923 7ff719430504 27902->27923 27906 7ff71942ee5d 27906->27874 27906->27875 27907->27889 27909 7ff7193fd4f3 27908->27909 27910 7ff719423dc0 3 API calls 27909->27910 27911 7ff7193fd506 27910->27911 27912 7ff7193fd5ba 27911->27912 27940 7ff719414320 27911->27940 27915 7ff719411550 2 API calls 27915->27912 27916->27885 27917->27877 27918->27879 27919->27881 27920->27884 27922 7ff71942f142 __scrt_dllmain_crt_thread_attach 27921->27922 27922->27902 27922->27906 27924 7ff719433690 27923->27924 27925 7ff71942f154 27924->27925 27928 7ff7194333ec 27924->27928 27925->27906 27927 7ff71942fa60 7 API calls 2 library calls 27925->27927 27927->27906 27939 7ff719432e80 EnterCriticalSection 27928->27939 27930 7ff7194333fc 27931 7ff71943596c 24 API calls 27930->27931 27932 7ff719433405 27931->27932 27933 7ff719433413 27932->27933 27935 7ff719433468 26 API calls 27932->27935 27934 7ff719432e9c abort LeaveCriticalSection 27933->27934 27936 7ff71943341f 27934->27936 27937 7ff71943340e 27935->27937 27936->27924 27938 7ff719433554 GetStdHandle GetFileType 27937->27938 27938->27933 27942 7ff719414349 27940->27942 27941 7ff7193fd5b2 27941->27915 27942->27941 27943 7ff7194143b2 HeapFree 27942->27943 27944 7ff71941439d HeapFree 27942->27944 27943->27941 27944->27943
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Process$ErrorLast$HeapInformationToken$MemoryReadTimes$AllocCloseCountersFreeHandleOpenQuerySystem
      • String ID: }
      • API String ID: 2453134795-1418613170
      • Opcode ID: 5d88e57598b47a9ba4c7e4a7f78fd551a5d76a198221552e81de4add467ab235
      • Instruction ID: f9fce7a1ffdffb1a60166582c0bca6a76aac1e1dc9c70d449c55cdbdd46a53ae
      • Opcode Fuzzy Hash: 5d88e57598b47a9ba4c7e4a7f78fd551a5d76a198221552e81de4add467ab235
      • Instruction Fuzzy Hash: 26829425A08F8282F664AF15A4403BBA3B0FF557A8F844535DE9D43795DF3CE0AAC721
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeHeap$Error$ComputerInfoLastNameString$AllocGlobalMemoryProcessStatus
      • String ID: $ $ $#$)Xz8$KA?%$ROOT\CIMV2$WQLEmptyNullStringI1I2I4I8R4R8BoolUI1UI2UI4UI8ArrayUnknownObjectIUnknownWrapperinnerIWbemClassWrapper$main
      • API String ID: 677961636-4227071778
      • Opcode ID: e66ce47350784e3200ce116527d5a272d24021503b55028eac4c3cb67eec8676
      • Instruction ID: a91ce05ba4abd05f58d91e52869ad4a5ed99b64338d0f9066b5adaeae55863e5
      • Opcode Fuzzy Hash: e66ce47350784e3200ce116527d5a272d24021503b55028eac4c3cb67eec8676
      • Instruction Fuzzy Hash: C0336E36608FC285EB609F15E4403AAB7B0FB84B94F844139DA8D43B99EF3CD05ADB51

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 700 7ff7193f4790-7ff7193f47af 701 7ff7193f47b5-7ff7193f47c1 700->701 702 7ff7193f4a5f-7ff7193f4a69 700->702 705 7ff7193f4a2a-7ff7193f4a47 701->705 706 7ff7193f47c7-7ff7193f47e6 701->706 703 7ff7193f4a7d-7ff7193f4a9b HeapFree 702->703 704 7ff7193f4a6b-7ff7193f4a76 702->704 709 7ff7193f4aa1-7ff7193f4aac 703->709 711 7ff7193f4b28-7ff7193f4b2c 703->711 704->709 710 7ff7193f4a78 704->710 705->702 708 7ff7193f4a49-7ff7193f4a59 RtlFreeHeap 705->708 707 7ff7193f4803-7ff7193f4806 706->707 712 7ff7193f482e-7ff7193f484e 707->712 713 7ff7193f4808 707->713 708->702 716 7ff7193f4ab9-7ff7193f4abe 709->716 710->711 714 7ff7193f4b40-7ff7193f4b4a 711->714 715 7ff7193f4b2e-7ff7193f4b3a HeapFree 711->715 718 7ff7193f4863-7ff7193f4874 712->718 719 7ff7193f4850-7ff7193f4860 HeapFree 712->719 717 7ff7193f4810-7ff7193f482a 713->717 720 7ff7193f4b50-7ff7193f4b5a 714->720 721 7ff7193f4cec-7ff7193f4cfc 714->721 715->714 722 7ff7193f4ad0-7ff7193f4ad5 716->722 723 7ff7193f4ac0-7ff7193f4acd HeapFree 716->723 717->717 724 7ff7193f482c 717->724 725 7ff7193f4876-7ff7193f487a 718->725 726 7ff7193f48b0-7ff7193f48b8 718->726 719->718 727 7ff7193f4b60-7ff7193f4b7b 720->727 728 7ff7193f4bda-7ff7193f4bee 720->728 729 7ff7193f4ae7-7ff7193f4af1 722->729 730 7ff7193f4ad7-7ff7193f4ae4 HeapFree 722->730 723->722 724->712 735 7ff7193f4889-7ff7193f488e 725->735 737 7ff7193f48c9-7ff7193f48d6 726->737 738 7ff7193f48ba-7ff7193f48c6 HeapFree 726->738 736 7ff7193f4ba0-7ff7193f4ba3 727->736 731 7ff7193f4bf0-7ff7193f4bf8 CloseHandle 728->731 732 7ff7193f4bfa-7ff7193f4c09 728->732 733 7ff7193f4af3-7ff7193f4af8 729->733 734 7ff7193f4b00-7ff7193f4b14 HeapFree 729->734 730->729 731->732 739 7ff7193f4c1c-7ff7193f4c31 GetLastError 731->739 742 7ff7193f4c33-7ff7193f4c43 PdhCloseQuery 732->742 743 7ff7193f4c0b-7ff7193f4c15 732->743 740 7ff7193f4b16-7ff7193f4b26 HeapFree 733->740 741 7ff7193f4afa 733->741 734->740 744 7ff7193f4ab0-7ff7193f4ab7 734->744 745 7ff7193f4880-7ff7193f4887 735->745 746 7ff7193f4890-7ff7193f48a0 HeapFree 735->746 747 7ff7193f4ba5 736->747 748 7ff7193f4b80-7ff7193f4b83 736->748 749 7ff7193f4900-7ff7193f4920 HeapFree 737->749 750 7ff7193f48d8-7ff7193f48e5 737->750 738->737 739->742 739->743 740->744 741->744 742->721 753 7ff7193f4c49-7ff7193f4c4c 742->753 743->753 754 7ff7193f4c17 743->754 744->711 744->716 745->726 745->735 746->745 756 7ff7193f4bb0-7ff7193f4bc9 747->756 755 7ff7193f4b85-7ff7193f4b9e PdhRemoveCounter 748->755 751 7ff7193f4922-7ff7193f4946 HeapFree 749->751 752 7ff7193f48e7-7ff7193f48f8 749->752 750->751 750->752 758 7ff7193f4948-7ff7193f494c 751->758 759 7ff7193f4980-7ff7193f4988 751->759 757 7ff7193f48fa 752->757 752->758 760 7ff7193f4c52-7ff7193f4c69 753->760 761 7ff7193f4cd8-7ff7193f4cea 753->761 754->721 755->728 755->736 756->756 762 7ff7193f4bcb-7ff7193f4bd8 756->762 757->759 764 7ff7193f4959-7ff7193f495e 758->764 765 7ff7193f4999-7ff7193f49a6 759->765 766 7ff7193f498a-7ff7193f4996 RtlFreeHeap 759->766 767 7ff7193f4c7f-7ff7193f4c83 760->767 761->721 763 7ff7193f4cfd-7ff7193f4d2c HeapFree 761->763 762->755 768 7ff7193f4950-7ff7193f4957 764->768 769 7ff7193f4960-7ff7193f4970 RtlFreeHeap 764->769 770 7ff7193f49d0-7ff7193f49f0 HeapFree 765->770 771 7ff7193f49a8-7ff7193f49b5 765->771 766->765 772 7ff7193f4c85 767->772 773 7ff7193f4cb1-7ff7193f4cc4 767->773 768->759 768->764 769->768 774 7ff7193f49f2-7ff7193f4a0c HeapFree 770->774 775 7ff7193f49b7-7ff7193f49be 770->775 771->774 771->775 776 7ff7193f4c90-7ff7193f4cac 772->776 777 7ff7193f4cc6-7ff7193f4cd6 HeapFree 773->777 778 7ff7193f4c70-7ff7193f4c7d 773->778 779 7ff7193f4a12-7ff7193f4a16 774->779 780 7ff7193f47f0-7ff7193f47fd 774->780 775->779 781 7ff7193f49c0 775->781 776->776 782 7ff7193f4cae 776->782 777->778 778->761 778->767 779->780 783 7ff7193f4a1c-7ff7193f4a20 call 7ff7193f5d90 779->783 780->705 780->707 781->780 782->773 785 7ff7193f4a25 RtlFreeHeap 783->785 785->705
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeHeap$CloseCounterHandleRemove
      • String ID:
      • API String ID: 1366079419-0
      • Opcode ID: ec212d0d52e09e172e512e6528399edf32469e7bf74c51fdb048cfbc25f7aa8f
      • Instruction ID: 0a3d13cf3f4cdc399ccb2934622c741ba1f9e47c2128cebf6cf5e3a51853575d
      • Opcode Fuzzy Hash: ec212d0d52e09e172e512e6528399edf32469e7bf74c51fdb048cfbc25f7aa8f
      • Instruction Fuzzy Hash: 30E14225B09E4281EF55AF1AA44837A93B1BB44F78F89413ACE5D53394EF3CE44AC361
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeHeap$InfoSystem
      • String ID: RAYON_NUM_THREADSRAYON_RS_NUM_CPUS
      • API String ID: 738346042-2148087183
      • Opcode ID: ea87b5320bd023e519816e160dd32e72aab7a0a917993c44650e3bcb8726bb4d
      • Instruction ID: 91f20dc384aaffcae06c2c3be6711b0ae6852f775cdc7d461033a9cce74a0276
      • Opcode Fuzzy Hash: ea87b5320bd023e519816e160dd32e72aab7a0a917993c44650e3bcb8726bb4d
      • Instruction Fuzzy Hash: 99C29372A09FC181EA659F15A4443BBA7B0FB947A8F944235CE9D03795DF3CE0AAC310
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Heap$AllocArrayDestroyErrorFreeInfoPrngProcessSafe
      • String ID:
      • API String ID: 1349816234-0
      • Opcode ID: c29c62469598b689eb71da74954145a8344b78a8d7e467f98d739ef6b782bfda
      • Instruction ID: e3211c61f75aed4b8cbb68f7908f62ac77b6801e249299fdbe23db3ee1400013
      • Opcode Fuzzy Hash: c29c62469598b689eb71da74954145a8344b78a8d7e467f98d739ef6b782bfda
      • Instruction Fuzzy Hash: EC827D32A08FC181EA619F15E4403AAE7B0FB99768F84412ADE8D53B58EF7CD05AC751

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1305 7ff719428391-7ff7194283a6 1306 7ff7194283a8-7ff7194283ad 1305->1306 1307 7ff7194283b3-7ff7194283bc 1305->1307 1306->1307 1308 7ff719428db7-7ff719428db9 1306->1308 1309 7ff7194283c2-7ff7194283d2 1307->1309 1310 7ff719428c90-7ff719428cbb call 7ff71943df61 1307->1310 1312 7ff71942906f-7ff719429084 1308->1312 1313 7ff719428dbf-7ff719428dc2 1308->1313 1314 7ff7194283d8-7ff7194283e0 call 7ff719429620 1309->1314 1315 7ff719428cc1-7ff719428cd6 call 7ff7194293f0 1309->1315 1310->1314 1310->1315 1325 7ff71942908e-7ff719429091 1312->1325 1326 7ff719429086-7ff719429088 1312->1326 1320 7ff719428dcf-7ff719428df2 VirtualQueryEx 1313->1320 1321 7ff719428dc4-7ff719428dc9 1313->1321 1322 7ff7194283e5-7ff7194283f5 1314->1322 1334 7ff719428cd8-7ff719428cfc 1315->1334 1335 7ff719428cfe-7ff719428d16 call 7ff7194294f0 1315->1335 1323 7ff719428e27-7ff719428e37 1320->1323 1324 7ff719428df4-7ff719428e21 call 7ff7194293f0 1320->1324 1321->1312 1321->1320 1328 7ff7194283fb-7ff719428404 1322->1328 1329 7ff71942857f-7ff719428588 1322->1329 1331 7ff719428e39-7ff719428e42 1323->1331 1332 7ff719428e75-7ff719428e83 1323->1332 1324->1323 1347 7ff719428ec0-7ff719428efd 1324->1347 1333 7ff719429094-7ff7194290a9 1325->1333 1326->1333 1338 7ff7194284ec-7ff7194284f1 1328->1338 1341 7ff71942858a-7ff719428598 HeapFree 1329->1341 1342 7ff71942859e-7ff7194285ac 1329->1342 1340 7ff719428e59-7ff719428e5e 1331->1340 1343 7ff719428e99-7ff719428ebb 1332->1343 1344 7ff719428e85-7ff719428e93 HeapFree 1332->1344 1355 7ff7194290ab-7ff7194290b9 1333->1355 1356 7ff7194290bf-7ff7194290f3 call 7ff719423dc0 1333->1356 1336 7ff719428d2a-7ff719428d3a 1334->1336 1335->1336 1357 7ff719428d18-7ff719428d24 HeapFree 1335->1357 1348 7ff719428d6c-7ff719428d75 1336->1348 1349 7ff719428d3c-7ff719428d45 1336->1349 1350 7ff7194284df-7ff7194284e6 1338->1350 1351 7ff7194284f3-7ff719428506 HeapFree 1338->1351 1352 7ff719428e50-7ff719428e57 1340->1352 1353 7ff719428e60-7ff719428e73 HeapFree 1340->1353 1341->1342 1354 7ff719428d9f-7ff719428db2 1342->1354 1343->1312 1344->1343 1362 7ff719428f32-7ff719428f46 1347->1362 1363 7ff719428eff-7ff719428f0b 1347->1363 1359 7ff719428d77-7ff719428d85 HeapFree 1348->1359 1360 7ff719428d8b-7ff719428d97 1348->1360 1358 7ff719428d50-7ff719428d55 1349->1358 1350->1329 1350->1338 1351->1350 1352->1332 1352->1340 1353->1352 1354->1308 1355->1356 1368 7ff719429295 1355->1368 1373 7ff7194290f9-7ff71942914c ReadProcessMemory 1356->1373 1374 7ff71942929f-7ff7194292c6 GetProcessHeap 1356->1374 1357->1336 1366 7ff719428d47-7ff719428d4e 1358->1366 1367 7ff719428d57-7ff719428d6a HeapFree 1358->1367 1359->1360 1360->1354 1365 7ff719428f4b-7ff719428f59 1362->1365 1369 7ff719428f16-7ff719428f1b 1363->1369 1375 7ff719428f5f-7ff719428f6a 1365->1375 1376 7ff719429046-7ff719429059 1365->1376 1366->1348 1366->1358 1367->1366 1368->1374 1371 7ff719428f0d-7ff719428f14 1369->1371 1372 7ff719428f1d-7ff719428f30 HeapFree 1369->1372 1371->1362 1371->1369 1372->1371 1386 7ff71942914f-7ff719429156 1373->1386 1384 7ff7194292c8-7ff7194292d8 HeapFree 1374->1384 1385 7ff7194292e0-7ff7194292e5 GetLastError 1374->1385 1378 7ff719428f6d-7ff719428f73 1375->1378 1376->1312 1379 7ff71942905b-7ff719429069 RtlFreeHeap 1376->1379 1382 7ff719428f87-7ff719428f8a 1378->1382 1383 7ff719428f75-7ff719428f80 1378->1383 1379->1312 1382->1374 1388 7ff719428f90-7ff719428f98 1382->1388 1383->1378 1387 7ff719428f82 1383->1387 1384->1385 1389 7ff7194292da-7ff7194292df 1384->1389 1390 7ff719429169-7ff719429174 call 7ff7194153a0 1386->1390 1391 7ff719429158-7ff71942915f 1386->1391 1387->1376 1388->1374 1392 7ff719428f9e-7ff719428fa1 1388->1392 1396 7ff719429179-7ff7194291a5 call 7ff719429810 1390->1396 1391->1386 1393 7ff719429161 1391->1393 1392->1376 1395 7ff719428fa7-7ff719428fb3 1392->1395 1393->1390 1395->1392 1397 7ff719428fb5-7ff719428fdd call 7ff7194153a0 1395->1397 1402 7ff71942925a-7ff719429263 1396->1402 1403 7ff7194291ab-7ff7194291d3 1396->1403 1404 7ff719428ffd-7ff71942903b 1397->1404 1405 7ff719428fdf-7ff719428fe4 call 7ff719429760 1397->1405 1409 7ff719429279-7ff71942928b HeapFree 1402->1409 1410 7ff719429265-7ff719429273 HeapFree 1402->1410 1407 7ff7194291f0-7ff719429201 1403->1407 1408 7ff7194291d5-7ff7194291eb HeapFree 1403->1408 1404->1365 1406 7ff719429041 1404->1406 1412 7ff719428fe9-7ff719428ff5 1405->1412 1406->1374 1407->1409 1408->1407 1409->1368 1410->1409 1412->1404
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeHeap$MemoryProcessQueryReadVirtual
      • String ID:
      • API String ID: 3063523992-0
      • Opcode ID: 151a3323d10d2ec9980fec8d7033147d93c596ed21ea2862565e21808c8026f1
      • Instruction ID: 7017f9bfe6f0094908130df2f6e552ff35e283ef38daf22bc60bbd08a6369166
      • Opcode Fuzzy Hash: 151a3323d10d2ec9980fec8d7033147d93c596ed21ea2862565e21808c8026f1
      • Instruction Fuzzy Hash: 4C024236A18F8582E664AF15E0403ABB7B1FB957A8F804135DE8D43794DF3CE4AAC711

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1552 7ff7193f2760-7ff7193f27d7 call 7ff71942af20 * 2 1558 7ff7193f27dd-7ff7193f27e5 1552->1558 1559 7ff7193f290a-7ff7193f2933 GetErrorInfo 1552->1559 1560 7ff7193f27eb-7ff7193f27ee 1558->1560 1561 7ff7193f29ba-7ff7193f29bf 1558->1561 1562 7ff7193f2935 1559->1562 1563 7ff7193f293b-7ff7193f293e 1559->1563 1564 7ff7193f27f0-7ff7193f27f3 SysFreeString 1560->1564 1565 7ff7193f27f9-7ff7193f27fc 1560->1565 1566 7ff7193f29c5 1561->1566 1567 7ff7193f2940-7ff7193f2943 SysFreeString 1561->1567 1562->1563 1563->1567 1568 7ff7193f2949-7ff7193f294c 1563->1568 1564->1565 1569 7ff7193f27fe-7ff7193f2801 SysFreeString 1565->1569 1570 7ff7193f2807-7ff7193f2824 call 7ff7193f1000 1565->1570 1566->1568 1567->1568 1571 7ff7193f294e-7ff7193f2951 SysFreeString 1568->1571 1572 7ff7193f2957-7ff7193f295d 1568->1572 1569->1570 1576 7ff7193f282a-7ff7193f2840 call 7ff719423dc0 1570->1576 1577 7ff7193f29c7-7ff7193f29d5 1570->1577 1571->1572 1573 7ff7193f2a03-7ff7193f2a16 1572->1573 1581 7ff7193f2846-7ff7193f289a 1576->1581 1582 7ff7193f2a17-7ff7193f2a29 1576->1582 1583 7ff7193f29f2-7ff7193f2a00 1577->1583 1584 7ff7193f29d7-7ff7193f29de 1577->1584 1585 7ff7193f28d2-7ff7193f28e9 call 7ff7193f1000 1581->1585 1587 7ff7193f2a40-7ff7193f2a50 1582->1587 1588 7ff7193f2a2b-7ff7193f2a3b 1582->1588 1583->1573 1586 7ff7193f29e1-7ff7193f29f0 1584->1586 1594 7ff7193f2962-7ff7193f2975 1585->1594 1595 7ff7193f28eb-7ff7193f28f0 1585->1595 1586->1573 1590 7ff719403860-7ff7194038bf 1587->1590 1588->1590 1592 7ff719404116-7ff71940416a 1590->1592 1593 7ff7194038c5-7ff7194038c8 1590->1593 1596 7ff7194038ce-7ff7194038db 1593->1596 1597 7ff71940395d-7ff71940395f 1593->1597 1594->1586 1613 7ff7193f2977-7ff7193f298b 1594->1613 1598 7ff7193f28f2-7ff7193f28fe call 7ff719439980 1595->1598 1599 7ff7193f28a0-7ff7193f28ce 1595->1599 1600 7ff719403931 1596->1600 1601 7ff7194038dd-7ff7194038e3 1596->1601 1597->1592 1602 7ff719403965-7ff71940396d 1597->1602 1615 7ff7193f2903-7ff7193f2908 1598->1615 1599->1585 1606 7ff719403934-7ff719403937 1600->1606 1608 7ff719403908-7ff71940390b 1601->1608 1603 7ff719403983-7ff7194039a2 1602->1603 1604 7ff71940396f-7ff719403972 1602->1604 1611 7ff7194039a4-7ff7194039a7 1603->1611 1612 7ff7194039ac-7ff7194039b0 1603->1612 1609 7ff719403974-7ff719403978 1604->1609 1610 7ff7194039c1-7ff7194039c3 1604->1610 1606->1597 1614 7ff719403939-7ff719403940 1606->1614 1608->1597 1616 7ff71940390d-7ff719403913 1608->1616 1617 7ff71940397a-7ff71940397e 1609->1617 1618 7ff7194039c8-7ff719403a1c 1609->1618 1626 7ff7194040f5-7ff7194040f8 1610->1626 1619 7ff719403c9d-7ff719403ca5 1611->1619 1622 7ff7194039b6-7ff7194039bc 1612->1622 1623 7ff719403bfa-7ff719403c1c 1612->1623 1620 7ff7193f29a1-7ff7193f29a4 1613->1620 1621 7ff7193f298d 1613->1621 1624 7ff719403946-7ff719403949 1614->1624 1625 7ff719403942 1614->1625 1615->1599 1627 7ff719403915-7ff719403918 1616->1627 1628 7ff7194038f0 1616->1628 1632 7ff7194040df-7ff7194040ed 1617->1632 1638 7ff719403be3-7ff719403bf5 1618->1638 1639 7ff719403a22-7ff719403a69 1618->1639 1634 7ff719403d3c 1619->1634 1635 7ff719403cab-7ff719403cc1 1619->1635 1620->1573 1642 7ff7193f29a6-7ff7193f29b8 HeapFree 1620->1642 1636 7ff7193f2990-7ff7193f299f call 7ff7193f4560 1621->1636 1637 7ff719403c86-7ff719403c95 1622->1637 1631 7ff719403c20-7ff719403c70 1623->1631 1640 7ff71940394b-7ff71940394e 1624->1640 1641 7ff71940395a 1624->1641 1625->1624 1626->1592 1633 7ff7194040fa-7ff719404109 1626->1633 1629 7ff719403925-7ff719403929 1627->1629 1630 7ff71940391a-7ff71940391d 1627->1630 1643 7ff7194038f4-7ff719403906 1628->1643 1629->1643 1645 7ff71940391f-7ff719403923 1630->1645 1646 7ff71940392b-7ff71940392f 1630->1646 1631->1631 1647 7ff719403c72-7ff719403c84 1631->1647 1644 7ff7194040f0-7ff7194040f3 1632->1644 1633->1592 1650 7ff719403d3f-7ff719403d66 1634->1650 1649 7ff719403cc3-7ff719403cd6 1635->1649 1635->1650 1636->1620 1648 7ff719403c98-7ff719403c9b 1637->1648 1638->1644 1639->1638 1654 7ff719403a6f-7ff719403ab6 1639->1654 1652 7ff719403950-7ff719403954 1640->1652 1653 7ff719403958 1640->1653 1641->1597 1642->1573 1643->1606 1643->1608 1644->1626 1644->1632 1645->1643 1646->1643 1647->1648 1648->1619 1648->1637 1649->1650 1655 7ff719403cd8-7ff719403ceb 1649->1655 1659 7ff719403da8-7ff719403dae 1650->1659 1652->1641 1657 7ff719403956 1652->1657 1653->1597 1653->1641 1654->1638 1658 7ff719403abc-7ff719403b03 1654->1658 1655->1650 1660 7ff719403ced-7ff719403d00 1655->1660 1657->1597 1658->1638 1663 7ff719403b09-7ff719403b50 1658->1663 1661 7ff719403db4-7ff719403dcb 1659->1661 1662 7ff719404043-7ff719404048 1659->1662 1660->1650 1666 7ff719403d02-7ff719403d15 1660->1666 1664 7ff719403d70 1661->1664 1665 7ff719403dcd-7ff719403de9 1661->1665 1662->1626 1663->1638 1667 7ff719403b56-7ff719403b9d 1663->1667 1669 7ff719403d73-7ff719403da2 1664->1669 1670 7ff719403e00-7ff719403e23 1665->1670 1671 7ff719403deb-7ff719403df1 1665->1671 1666->1650 1668 7ff719403d17-7ff719403d2a 1666->1668 1667->1638 1672 7ff719403b9f-7ff719403bdf 1667->1672 1668->1650 1676 7ff719403d2c-7ff719403d3a 1668->1676 1669->1659 1673 7ff71940404d-7ff71940407d 1669->1673 1675 7ff719403e30-7ff719403fa9 1670->1675 1674 7ff719403fca-7ff719403fd1 1671->1674 1672->1638 1679 7ff71940407f-7ff71940409f 1673->1679 1680 7ff7194040bd-7ff7194040dd 1673->1680 1678 7ff719403fe0-7ff71940403c 1674->1678 1675->1675 1677 7ff719403faf-7ff719403fc4 1675->1677 1676->1650 1677->1669 1677->1674 1678->1678 1681 7ff71940403e 1678->1681 1679->1680 1682 7ff7194040a1-7ff7194040ba 1679->1682 1680->1626 1681->1669 1682->1680
      APIs
      Strings
      • WQLEmptyNullStringI1I2I4I8R4R8BoolUI1UI2UI4UI8ArrayUnknownObjectIUnknownWrapperinnerIWbemClassWrapper, xrefs: 00007FF7193F277F
      • falsetrue, xrefs: 00007FF7193F2A40
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Free$String$ErrorHeapInfo
      • String ID: WQLEmptyNullStringI1I2I4I8R4R8BoolUI1UI2UI4UI8ArrayUnknownObjectIUnknownWrapperinnerIWbemClassWrapper$falsetrue
      • API String ID: 364368470-4172885470
      • Opcode ID: 5eb413ebe4317ec03e873e53ccd3b00486b5ad551304fe97e0cc17dfe49d2ec3
      • Instruction ID: 5f2fc1a7100bef8204568bd22d630cf100e0ee7cae0f2348a64c6588a9c3c744
      • Opcode Fuzzy Hash: 5eb413ebe4317ec03e873e53ccd3b00486b5ad551304fe97e0cc17dfe49d2ec3
      • Instruction Fuzzy Hash: BB52A056E2CB9241F6235B3594013B69A20AFA37E4F44C336FD9D32B95EF28E196C310

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1683 7ff7193f9368-7ff7193f943a call 7ff7193f61e0 call 7ff7193f2760 1688 7ff7193f9440-7ff7193f9471 1683->1688 1689 7ff7193f9a8b-7ff7193f9b93 HeapFree call 7ff7193f6120 call 7ff719419570 1683->1689 1691 7ff7193f9473-7ff7193f9494 1688->1691 1692 7ff7193f94b2-7ff7193f94fa ProcessPrng 1688->1692 1714 7ff7193f9cd5-7ff7193f9dc2 call 7ff7193f6210 call 7ff719419570 1689->1714 1715 7ff7193f9b99-7ff7193f9ba1 1689->1715 1693 7ff7193f9501-7ff7193f9563 1691->1693 1692->1693 1695 7ff7193f9829-7ff7193f983f 1693->1695 1696 7ff7193f9569-7ff7193f958f 1693->1696 1700 7ff7193f9861-7ff7193f986a 1695->1700 1701 7ff7193f9841-7ff7193f9848 1695->1701 1698 7ff7193f9601-7ff7193f960e 1696->1698 1698->1695 1705 7ff7193f9614-7ff7193f9649 call 7ff7193f6d00 1698->1705 1702 7ff7193f9883-7ff7193f9897 1700->1702 1703 7ff7193f986c-7ff7193f987d HeapFree 1700->1703 1706 7ff7193f9850-7ff7193f985f call 7ff7193f4560 1701->1706 1707 7ff7193f996f-7ff7193f9974 1702->1707 1708 7ff7193f989d-7ff7193f98a0 1702->1708 1703->1702 1723 7ff7193f95f0-7ff7193f95fb call 7ff7193f4560 1705->1723 1724 7ff7193f964b-7ff7193f964f 1705->1724 1706->1700 1718 7ff7193f997a 1707->1718 1712 7ff7193f98a6-7ff7193f98c2 1708->1712 1713 7ff7193f993b-7ff7193f9956 1708->1713 1719 7ff7193f98e0-7ff7193f98e4 1712->1719 1713->1707 1725 7ff7193f9958-7ff7193f9969 HeapFree 1713->1725 1721 7ff7193f9dc8-7ff7193f9e92 call 7ff7193f60b0 call 7ff719419570 1714->1721 1722 7ff7193f9ba7-7ff7193f9bac 1714->1722 1715->1721 1715->1722 1718->1689 1727 7ff7193f98e6 1719->1727 1728 7ff7193f9911-7ff7193f9923 1719->1728 1730 7ff7193f9bb2-7ff7193f9bba 1721->1730 1731 7ff7193f9e98-7ff7193f9f85 call 7ff7193f63c0 call 7ff719419570 1721->1731 1722->1730 1722->1731 1723->1698 1723->1700 1724->1723 1733 7ff7193f9651-7ff7193f9658 1724->1733 1725->1707 1736 7ff7193f98f0-7ff7193f990c 1727->1736 1738 7ff7193f9925-7ff7193f9939 HeapFree 1728->1738 1739 7ff7193f98d0-7ff7193f98de 1728->1739 1740 7ff7193f9bc0-7ff7193f9bc9 1730->1740 1741 7ff7193f9f8b-7ff7193fa097 call 7ff7193f6370 call 7ff719419570 1730->1741 1731->1740 1731->1741 1733->1689 1743 7ff7193f965e-7ff7193f9662 1733->1743 1736->1736 1746 7ff7193f990e 1736->1746 1738->1739 1739->1713 1739->1719 1748 7ff7193f9bcf-7ff7193f9bd4 1740->1748 1749 7ff7193fa09d-7ff7193fa196 call 7ff7193f6590 call 7ff719419570 1740->1749 1741->1748 1741->1749 1751 7ff7193f9664-7ff7193f9678 call 7ff719423dc0 1743->1751 1752 7ff7193f9683 1743->1752 1746->1728 1757 7ff7193fa19c-7ff7193fa283 call 7ff7193f6100 call 7ff719419570 1748->1757 1758 7ff7193f9bda-7ff7193f9be2 1748->1758 1749->1757 1749->1758 1751->1689 1772 7ff7193f967e-7ff7193f9681 1751->1772 1754 7ff7193f9688-7ff7193f96ba call 7ff71942fb90 call 7ff7193f4d40 1752->1754 1789 7ff7193f9812-7ff7193f9824 call 7ff719439a20 1754->1789 1790 7ff7193f96c0-7ff7193f96ed 1754->1790 1767 7ff7193fa289-7ff7193fa380 call 7ff7193f6450 call 7ff719419570 1757->1767 1768 7ff7193f9be8-7ff7193f9beb 1757->1768 1758->1767 1758->1768 1769 7ff7193fa386-7ff7193fa38b call 7ff719423d50 1767->1769 1770 7ff7193f9bf1-7ff7193f9cd0 call 7ff7193f65b0 call 7ff719419570 call 7ff719423d50 1767->1770 1768->1769 1768->1770 1770->1714 1772->1754 1789->1695 1794 7ff7193f96f0-7ff7193f970f 1790->1794 1797 7ff7193f9711-7ff7193f971b 1794->1797 1798 7ff7193f977d-7ff7193f9794 1794->1798 1801 7ff7193f971d-7ff7193f9735 1797->1801 1802 7ff7193f973a-7ff7193f974b 1797->1802 1799 7ff7193f9796-7ff7193f97ab call 7ff71942fa90 1798->1799 1800 7ff7193f9770-7ff7193f977b 1798->1800 1799->1800 1809 7ff7193f97ad-7ff7193f97cf 1799->1809 1800->1797 1800->1798 1801->1802 1804 7ff7193f9751-7ff7193f975f 1802->1804 1805 7ff7193f97ec-7ff7193f97f7 1802->1805 1804->1794 1807 7ff7193f9591-7ff7193f95eb 1805->1807 1808 7ff7193f97fd-7ff7193f980d 1805->1808 1807->1723 1808->1807 1809->1723 1810 7ff7193f97d5-7ff7193f97e7 HeapFree 1809->1810 1810->1723
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Free$Heap$String$PrngProcess
      • String ID: )Xz8$displayName
      • API String ID: 4214144531-357724972
      • Opcode ID: 0f5c528221eb9dca3c3a2dad3958f1cf6314fd5229054b39d0feb69b74642625
      • Instruction ID: aa91cf0fe913f4f7ef61a11d561dc1765bb6d647b14dd50c318cdfa62d66144b
      • Opcode Fuzzy Hash: 0f5c528221eb9dca3c3a2dad3958f1cf6314fd5229054b39d0feb69b74642625
      • Instruction Fuzzy Hash: 04723236608FC285EA60DF25E4403AAB7B4F784794F90423ADA8D43B69EF3CD059DB51

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1900 7ff719424740-7ff7194248fa call 7ff719425070 GetSystemTimePreciseAsFileTime call 7ff719425970 1911 7ff7194248fc-7ff719424908 HeapFree 1900->1911 1912 7ff71942490e-7ff71942492c 1900->1912 1911->1912 1913 7ff71942495c-7ff71942495f 1912->1913 1914 7ff71942492e-7ff719424936 1912->1914 1916 7ff719424a4c-7ff719424a7e 1913->1916 1917 7ff719424965-7ff719424976 1913->1917 1915 7ff719424940-7ff719424948 1914->1915 1918 7ff71942494a-7ff719424951 1915->1918 1919 7ff719424953-7ff719424956 1915->1919 1920 7ff719424e71-7ff719424e87 1916->1920 1921 7ff719424a84-7ff719424aa1 1916->1921 1922 7ff71942498c-7ff719424993 1917->1922 1918->1915 1918->1919 1919->1913 1925 7ff719424f7d-7ff719424fa7 call 7ff71943e8a0 1919->1925 1923 7ff719424e89-7ff719424e8c 1920->1923 1924 7ff719424ea4-7ff719424ead 1920->1924 1926 7ff719424be9-7ff719424bfa 1921->1926 1927 7ff71942499d-7ff7194249b7 HeapFree 1922->1927 1928 7ff719424995 1922->1928 1932 7ff719424e90-7ff719424ea2 call 7ff719426470 1923->1932 1934 7ff719424eaf-7ff719424ebd HeapFree 1924->1934 1935 7ff719424ec3-7ff719424ec9 1924->1935 1925->1917 1946 7ff719424fad 1925->1946 1926->1920 1933 7ff719424c00-7ff719424c9a call 7ff71942fb90 call 7ff719426660 1926->1933 1929 7ff719424a47-7ff719424a4a 1927->1929 1930 7ff7194249bd-7ff7194249d3 1927->1930 1928->1927 1929->1916 1939 7ff719424ac7-7ff719424ace 1929->1939 1936 7ff719424a1b-7ff719424a45 call 7ff71943e8a0 1930->1936 1937 7ff7194249d5-7ff719424a01 call 7ff71942fb90 1930->1937 1932->1924 1971 7ff719424e57-7ff719424e6c call 7ff71943d2d0 1933->1971 1972 7ff719424ca0-7ff719424cc4 1933->1972 1934->1935 1942 7ff719424ecb-7ff719424ed9 RtlFreeHeap 1935->1942 1943 7ff719424edf-7ff719424ee6 1935->1943 1936->1937 1963 7ff719424a07-7ff719424a16 RtlFreeHeap 1937->1963 1964 7ff719424980-7ff719424986 1937->1964 1949 7ff719424ad8-7ff719424ae3 1939->1949 1950 7ff719424ad0 1939->1950 1942->1943 1951 7ff719424ee8-7ff719424efc 1943->1951 1952 7ff719424f61-7ff719424f7c 1943->1952 1946->1916 1957 7ff719424b04-7ff719424b08 1949->1957 1958 7ff719424ae5-7ff719424ae8 1949->1958 1950->1949 1959 7ff719424f24-7ff719424f28 1951->1959 1965 7ff719424b0a-7ff719424b19 HeapFree 1957->1965 1966 7ff719424ab0-7ff719424ac5 HeapFree 1957->1966 1960 7ff719424af0-7ff719424b02 call 7ff719426470 1958->1960 1961 7ff719424f2a 1959->1961 1962 7ff719424f00-7ff719424f04 1959->1962 1960->1957 1970 7ff719424f30-7ff719424f4b 1961->1970 1968 7ff719424f07-7ff719424f22 1962->1968 1963->1964 1964->1916 1964->1922 1965->1966 1966->1916 1966->1939 1968->1952 1968->1959 1970->1970 1976 7ff719424f4d-7ff719424f5f 1970->1976 1971->1920 1973 7ff719424cc7-7ff719424ce1 1972->1973 1977 7ff719424d1c-7ff719424d26 1973->1977 1978 7ff719424ce3 1973->1978 1976->1968 1981 7ff719424d28-7ff719424d3c 1977->1981 1982 7ff719424d3f-7ff719424d4b 1977->1982 1980 7ff719424cf0-7ff719424d0d 1978->1980 1983 7ff719424d70-7ff719424e17 call 7ff71942fb90 * 2 1980->1983 1984 7ff719424d0f-7ff719424d1a 1980->1984 1981->1982 1985 7ff719424e2f-7ff719424e38 1982->1985 1986 7ff719424d51-7ff719424d5c 1982->1986 1994 7ff719424be0-7ff719424be3 1983->1994 1996 7ff719424e1d-7ff719424e2a call 7ff719426470 1983->1996 1984->1977 1984->1980 1987 7ff719424b1b-7ff719424bdc call 7ff71942fb90 1985->1987 1988 7ff719424e3e-7ff719424e52 1985->1988 1986->1973 1987->1994 1988->1987 1994->1924 1994->1926 1996->1994
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeHeap$Time$FilePreciseSystem
      • String ID:
      • API String ID: 1465647071-0
      • Opcode ID: 104fe460f8f9b8850f77478b062d6948d8b4e61141b7c96f7f5eee1019c5d081
      • Instruction ID: 746c5fbe2c90a9c82766647d5bb78a485c9c689d0c8216c26fade6aa509d7101
      • Opcode Fuzzy Hash: 104fe460f8f9b8850f77478b062d6948d8b4e61141b7c96f7f5eee1019c5d081
      • Instruction Fuzzy Hash: C512A022A18FC581E6659F25E4013EBE7B0FF95BA8F844221CE8D17B95EF38D199C710

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1999 7ff719429eb0-7ff719429f04 2000 7ff719429f22-7ff719429f42 1999->2000 2001 7ff719429f06-7ff719429f14 1999->2001 2004 7ff71942a173-7ff71942a17d call 7ff71942a730 2000->2004 2002 7ff719429f47-7ff719429f57 2001->2002 2003 7ff719429f16-7ff719429f1d 2001->2003 2007 7ff719429f59-7ff719429f6a 2002->2007 2008 7ff719429f9b-7ff719429fa3 2002->2008 2005 7ff719429fa6 2003->2005 2017 7ff71942a182-7ff71942a19f 2004->2017 2009 7ff719429fa8-7ff719429fe3 2005->2009 2011 7ff71942a51d-7ff71942a52f 2007->2011 2012 7ff719429f70-7ff719429f94 2007->2012 2008->2005 2015 7ff719429fe9-7ff719429ffe call 7ff719423dc0 2009->2015 2016 7ff71942a5e6-7ff71942a5e8 2009->2016 2011->2005 2014 7ff71942a535-7ff71942a559 2011->2014 2012->2005 2013 7ff719429f96 2012->2013 2013->2014 2014->2009 2015->2016 2027 7ff71942a004-7ff71942a026 2015->2027 2019 7ff71942a26e-7ff71942a295 PdhAddEnglishCounterW 2017->2019 2020 7ff71942a1a5-7ff71942a1f0 call 7ff7193f4d40 2017->2020 2023 7ff71942a29b-7ff71942a2a4 2019->2023 2024 7ff71942a325-7ff71942a336 2019->2024 2030 7ff71942a1f4-7ff71942a20b 2020->2030 2028 7ff71942a2ba-7ff71942a2cb 2023->2028 2029 7ff71942a2a6-7ff71942a2b4 HeapFree 2023->2029 2024->2016 2026 7ff71942a33c-7ff71942a340 2024->2026 2031 7ff71942a361 2026->2031 2032 7ff71942a342-7ff71942a356 call 7ff719423dc0 2026->2032 2033 7ff71942a040-7ff71942a043 2027->2033 2034 7ff71942a2cd-7ff71942a2da HeapFree 2028->2034 2035 7ff71942a2e0-7ff71942a2e4 2028->2035 2029->2028 2038 7ff71942a20d-7ff71942a219 2030->2038 2039 7ff71942a23e-7ff71942a257 2030->2039 2041 7ff71942a366-7ff71942a399 call 7ff71942fb90 call 7ff7193f4d40 2031->2041 2032->2016 2055 7ff71942a35c-7ff71942a35f 2032->2055 2042 7ff71942a0c0-7ff71942a0c8 2033->2042 2043 7ff71942a045-7ff71942a048 2033->2043 2034->2035 2036 7ff71942a2f8-7ff71942a324 2035->2036 2037 7ff71942a2e6-7ff71942a2f2 HeapFree 2035->2037 2037->2036 2038->2019 2044 7ff71942a21b-7ff71942a229 2038->2044 2047 7ff71942a259-7ff71942a26a call 7ff71942fa90 2039->2047 2048 7ff71942a230-7ff71942a23c 2039->2048 2071 7ff71942a39f-7ff71942a3cd 2041->2071 2072 7ff71942a5d5-7ff71942a5e1 call 7ff71943dfb0 2041->2072 2045 7ff71942a0ce-7ff71942a106 call 7ff71943e8a0 2042->2045 2046 7ff71942a030-7ff71942a03d 2042->2046 2051 7ff71942a149-7ff71942a171 2043->2051 2052 7ff71942a04e-7ff71942a054 2043->2052 2044->2030 2045->2046 2046->2033 2047->2048 2067 7ff71942a26c 2047->2067 2048->2038 2048->2039 2051->2004 2051->2017 2057 7ff71942a067-7ff71942a078 2052->2057 2058 7ff71942a056-7ff71942a063 2052->2058 2055->2041 2063 7ff71942a07a-7ff71942a08c 2057->2063 2064 7ff71942a0b1-7ff71942a0bb 2057->2064 2058->2046 2062 7ff71942a065 2058->2062 2062->2045 2065 7ff71942a08e-7ff71942a0ad 2063->2065 2066 7ff71942a10b-7ff71942a11a 2063->2066 2064->2042 2065->2042 2069 7ff71942a0af 2065->2069 2066->2042 2070 7ff71942a11c-7ff71942a141 2066->2070 2067->2023 2069->2070 2070->2046 2074 7ff71942a147 2070->2074 2073 7ff71942a3d0-7ff71942a3f0 2071->2073 2072->2016 2076 7ff71942a45a-7ff71942a472 2073->2076 2077 7ff71942a3f2-7ff71942a3fc 2073->2077 2074->2045 2081 7ff71942a450-7ff71942a458 2076->2081 2082 7ff71942a474-7ff71942a485 call 7ff71942fa90 2076->2082 2079 7ff71942a41e-7ff71942a432 2077->2079 2080 7ff71942a3fe-7ff71942a416 2077->2080 2083 7ff71942a438-7ff71942a446 2079->2083 2084 7ff71942a55e-7ff71942a56d 2079->2084 2080->2079 2081->2076 2081->2077 2082->2081 2089 7ff71942a487-7ff71942a493 2082->2089 2083->2073 2086 7ff71942a56f-7ff71942a57e 2084->2086 2087 7ff71942a583-7ff71942a5cc 2084->2087 2086->2087 2087->2072 2090 7ff71942a4a7-7ff71942a4c5 2089->2090 2091 7ff71942a495-7ff71942a4a1 HeapFree 2089->2091 2092 7ff71942a4c7-7ff71942a4d5 HeapFree 2090->2092 2093 7ff71942a4db-7ff71942a4e9 2090->2093 2091->2090 2092->2093 2094 7ff71942a4fe-7ff71942a512 2093->2094 2095 7ff71942a4eb-7ff71942a4f8 HeapFree 2093->2095 2094->2037 2096 7ff71942a518 2094->2096 2095->2094 2096->2036
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 8c4ce4e9fcb133bc04e8ea4dac16a8700b966e8f493cf97da22114109e45849b
      • Instruction ID: bc22d7a9b70aeb8d5200915624aa2cbcd306b9e858291815165c7262791d1377
      • Opcode Fuzzy Hash: 8c4ce4e9fcb133bc04e8ea4dac16a8700b966e8f493cf97da22114109e45849b
      • Instruction Fuzzy Hash: 0412D322A18F8185E7609F25B4003ABE7A0FB45BA8F844236DF8D57B94DF7CD55AC310

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2097 7ff7194240f5-7ff719424116 PdhOpenQueryA 2098 7ff71942411c-7ff71942413b 2097->2098 2099 7ff7194241cf-7ff719424213 2097->2099 2100 7ff71942413d-7ff71942415e 2098->2100 2101 7ff719424160-7ff7194241a2 ProcessPrng 2098->2101 2102 7ff719424219-7ff71942422f call 7ff719423dc0 2099->2102 2103 7ff7194243cd-7ff7194243db 2099->2103 2104 7ff7194241a9-7ff7194241c8 2100->2104 2101->2104 2113 7ff719424543-7ff7194245d5 call 7ff719423dc0 2102->2113 2114 7ff719424235-7ff719424281 call 7ff719423dc0 2102->2114 2106 7ff719424527-7ff719424542 2103->2106 2107 7ff7194243e1-7ff7194243f4 PdhCollectQueryData 2103->2107 2104->2099 2108 7ff719424420-7ff719424435 call 7ff719425070 2107->2108 2109 7ff7194243f6-7ff719424408 call 7ff71942a5f0 2107->2109 2121 7ff719424437-7ff719424450 2108->2121 2122 7ff71942449a-7ff71942449d 2108->2122 2109->2113 2120 7ff71942440e-7ff71942441a 2109->2120 2136 7ff7194245ea-7ff71942463f NtQuerySystemInformation GetErrorInfo 2113->2136 2114->2113 2124 7ff719424287-7ff7194242c3 call 7ff719429eb0 call 7ff719425070 2114->2124 2120->2108 2125 7ff719424469-7ff71942446e 2121->2125 2122->2106 2127 7ff7194244a3-7ff7194244a8 2122->2127 2144 7ff7194242c8-7ff7194242cf 2124->2144 2130 7ff719424460-7ff719424467 2125->2130 2131 7ff719424470-7ff719424484 call 7ff71942a5f0 2125->2131 2127->2106 2128 7ff7194244ae-7ff7194244d8 call 7ff719429b80 2127->2128 2142 7ff7194244da-7ff7194244ed 2128->2142 2143 7ff71942450e-7ff719424511 2128->2143 2130->2122 2130->2125 2131->2113 2145 7ff71942448a-7ff719424498 2131->2145 2146 7ff719424750-7ff719424753 2136->2146 2147 7ff719424645-7ff719424662 2136->2147 2148 7ff7194244f0-7ff7194244fc 2142->2148 2150 7ff719424522 2143->2150 2151 7ff719424513-7ff71942451c HeapFree 2143->2151 2144->2103 2149 7ff7194242d5-7ff7194242e9 2144->2149 2145->2130 2156 7ff71942475b-7ff719424761 2146->2156 2157 7ff719424755 2146->2157 2152 7ff719424668-7ff71942466e 2147->2152 2153 7ff7194245e0-7ff7194245e5 2147->2153 2148->2143 2154 7ff7194244fe-7ff71942450c 2148->2154 2155 7ff7194242f0-7ff7194243c7 call 7ff7193fd6c0 * 2 call 7ff719429eb0 2149->2155 2150->2106 2151->2150 2152->2153 2153->2136 2154->2143 2154->2148 2155->2103 2159 7ff719424767-7ff719424ed9 RtlFreeHeap 2156->2159 2160 7ff719424edf-7ff719424ee6 2156->2160 2157->2156 2159->2160 2164 7ff719424ee8-7ff719424efc 2160->2164 2165 7ff719424f61-7ff719424f7c 2160->2165 2167 7ff719424f24-7ff719424f28 2164->2167 2168 7ff719424f2a 2167->2168 2169 7ff719424f00-7ff719424f04 2167->2169 2172 7ff719424f30-7ff719424f4b 2168->2172 2171 7ff719424f07-7ff719424f22 2169->2171 2171->2165 2171->2167 2172->2172 2174 7ff719424f4d-7ff719424f5f 2172->2174 2174->2171
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Query$CollectDataFreeHeapOpenPrngProcess
      • String ID:
      • API String ID: 3928232094-0
      • Opcode ID: 56299d45b8a3767dd1089dfcb9909c2841be091ff165f65c4ddf2014de8a2b09
      • Instruction ID: 11e10527d983e5b5c66caca6ed808ba62d46d3f508f2888adcece64b6038dc7c
      • Opcode Fuzzy Hash: 56299d45b8a3767dd1089dfcb9909c2841be091ff165f65c4ddf2014de8a2b09
      • Instruction Fuzzy Hash: F5F18F36A18F8181E7949F11B4447ABA7B4FB84BA8F844226EE8D47794DF7CD09AC710

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2176 7ff71942b510-7ff71942b55b CoCreateInstance 2177 7ff71942b561-7ff71942b569 2176->2177 2178 7ff71942b623-7ff71942b643 GetErrorInfo 2176->2178 2181 7ff71942b64e-7ff71942b655 2177->2181 2182 7ff71942b56f-7ff71942b5bb call 7ff71942af20 2177->2182 2179 7ff71942b64b 2178->2179 2180 7ff71942b645 2178->2180 2179->2181 2180->2179 2183 7ff71942b6a0-7ff71942b6af 2181->2183 2187 7ff71942b657-7ff71942b677 GetErrorInfo 2182->2187 2188 7ff71942b5c1-7ff71942b5c9 2182->2188 2189 7ff71942b679 2187->2189 2190 7ff71942b67f 2187->2190 2191 7ff71942b682-7ff71942b685 2188->2191 2192 7ff71942b5cf-7ff71942b5d2 2188->2192 2189->2190 2190->2191 2193 7ff71942b687-7ff71942b68a SysFreeString 2191->2193 2194 7ff71942b690-7ff71942b693 2191->2194 2195 7ff71942b5dd-7ff71942b614 CoSetProxyBlanket 2192->2195 2196 7ff71942b5d4-7ff71942b5d7 SysFreeString 2192->2196 2193->2194 2199 7ff71942b697-7ff71942b69a 2194->2199 2197 7ff71942b61a-7ff71942b621 2195->2197 2198 7ff71942b6b0-7ff71942b6d0 GetErrorInfo 2195->2198 2196->2195 2197->2199 2200 7ff71942b6d8-7ff71942b6e7 2198->2200 2201 7ff71942b6d2 2198->2201 2199->2183 2200->2199 2201->2200
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorInfo$FreeString$BlanketCreateInstanceProxy
      • String ID:
      • API String ID: 2152923335-0
      • Opcode ID: 9411ef3042773a73d791371d01144303e8c09a5e28d5ade10defe1591fb42805
      • Instruction ID: 50c527d97e499b8dfc5944b87fddf99e1ea0a6bdfc917b8e7c08213f08b3d68b
      • Opcode Fuzzy Hash: 9411ef3042773a73d791371d01144303e8c09a5e28d5ade10defe1591fb42805
      • Instruction Fuzzy Hash: F5517A32608A8186EB249F21F45476BFBA0FB95BA8F844034DE8E47B94DFBCD059C750

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeHeapInformationProcessQuery$ErrorInfo
      • String ID: #
      • API String ID: 2435025923-1885708031
      • Opcode ID: 6863145b0c4aa29cf997b5814dc6276171e2dd58b389ea234517c05b84439d7f
      • Instruction ID: c92aec9e28bafe7b94ae3963cbc260b6df65a77e9f03e81d4ddcd53a570f8cf2
      • Opcode Fuzzy Hash: 6863145b0c4aa29cf997b5814dc6276171e2dd58b389ea234517c05b84439d7f
      • Instruction Fuzzy Hash: 53319039609E0181FB64AF21F54076BA6B0BF98BE8F844135DE4E47BA4DE3CD45AC710

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2223 7ff71943b3d0-7ff71943b3e7 2224 7ff71943b3ed-7ff71943b404 2223->2224 2225 7ff71943baac-7ff71943babc 2223->2225 2226 7ff71943b422-7ff71943b42d call 7ff719410290 2224->2226 2229 7ff71943b410-7ff71943b41c 2226->2229 2230 7ff71943b42f-7ff71943b456 2226->2230 2229->2225 2229->2226 2231 7ff71943b45f-7ff71943b466 2230->2231 2233 7ff71943babd-7ff71943baf0 call 7ff71943bb00 2231->2233 2234 7ff71943b46c-7ff71943b48a 2231->2234 2233->2225 2235 7ff71943b5c0-7ff71943b5d8 call 7ff719410450 2234->2235 2236 7ff71943b490-7ff71943b497 2234->2236 2249 7ff71943b5da-7ff71943b5dd 2235->2249 2239 7ff71943b499-7ff71943b4bb 2236->2239 2240 7ff71943b510-7ff71943b522 2236->2240 2243 7ff71943b537-7ff71943b53e 2239->2243 2244 7ff71943b4bd-7ff71943b4e7 2239->2244 2245 7ff71943b524-7ff71943b532 2240->2245 2246 7ff71943b543-7ff71943b579 2240->2246 2243->2235 2250 7ff71943b589-7ff71943b598 2244->2250 2251 7ff71943b4ed-7ff71943b504 2244->2251 2245->2235 2247 7ff71943b57b-7ff71943b582 2246->2247 2248 7ff71943b5b0-7ff71943b5b3 2246->2248 2247->2248 2252 7ff71943b584 2247->2252 2254 7ff71943b5b9 2248->2254 2255 7ff71943ba60-7ff71943ba93 call 7ff71943bb00 2248->2255 2256 7ff71943b940-7ff71943b94f 2249->2256 2257 7ff71943b5e3-7ff71943b5f5 2249->2257 2250->2248 2253 7ff71943b59a-7ff71943b5a1 2250->2253 2251->2235 2258 7ff71943b50a 2251->2258 2259 7ff71943b8d2-7ff71943b8e4 call 7ff71943cc80 2252->2259 2253->2259 2260 7ff71943b5a7 2253->2260 2254->2235 2349 7ff71943ba98 call 7ff719427800 2255->2349 2350 7ff71943ba98 call 7ff719427b40 2255->2350 2256->2255 2262 7ff71943b5fb-7ff71943b602 2257->2262 2263 7ff71943b700-7ff71943b710 2257->2263 2258->2248 2259->2235 2275 7ff71943b8ea 2259->2275 2260->2248 2267 7ff71943b61f-7ff71943b63c 2262->2267 2266 7ff71943b72a-7ff71943b772 2263->2266 2269 7ff71943b78e-7ff71943b791 2266->2269 2270 7ff71943b63e-7ff71943b640 2267->2270 2271 7ff71943b6a0-7ff71943b6a6 2267->2271 2273 7ff71943b7e0-7ff71943b7e8 2269->2273 2274 7ff71943b793-7ff71943b79a 2269->2274 2272 7ff71943b678-7ff71943b67b 2270->2272 2277 7ff71943b6ac-7ff71943b6bf 2271->2277 2278 7ff71943b610-7ff71943b619 2271->2278 2281 7ff71943b67d-7ff71943b682 2272->2281 2282 7ff71943b650 SwitchToThread 2272->2282 2285 7ff71943b802-7ff71943b805 2273->2285 2279 7ff71943b79c-7ff71943b7ba call 7ff719410450 2274->2279 2280 7ff71943b780-7ff71943b788 2274->2280 2275->2255 2276 7ff71943ba9a-7ff71943baa6 2276->2225 2276->2226 2283 7ff71943b6c1-7ff71943b6d0 2277->2283 2284 7ff71943b6e0-7ff71943b6e7 2277->2284 2278->2267 2286 7ff71943b8ef-7ff71943b8f2 2278->2286 2279->2280 2308 7ff71943b7bc-7ff71943b7bf 2279->2308 2280->2255 2280->2269 2289 7ff71943b690-7ff71943b69c 2281->2289 2287 7ff71943b653-7ff71943b676 2282->2287 2283->2278 2292 7ff71943b6ed-7ff71943b6fb SwitchToThread 2284->2292 2293 7ff71943b850-7ff71943b861 2284->2293 2294 7ff71943b80b-7ff71943b812 2285->2294 2295 7ff71943b720-7ff71943b724 2285->2295 2290 7ff71943b979-7ff71943b98f 2286->2290 2291 7ff71943b8f8-7ff71943b8ff 2286->2291 2287->2271 2287->2272 2289->2289 2299 7ff71943b69e 2289->2299 2296 7ff71943b991-7ff71943b993 2290->2296 2297 7ff71943b9d0-7ff71943b9e3 2290->2297 2302 7ff71943b901-7ff71943b903 2291->2302 2303 7ff71943b954-7ff71943b972 2291->2303 2292->2231 2300 7ff71943b8b1-7ff71943b8cd call 7ff71943bc00 2293->2300 2301 7ff71943b863-7ff71943b868 2293->2301 2305 7ff71943b7f0 2294->2305 2306 7ff71943b814-7ff71943b817 2294->2306 2295->2266 2304 7ff71943b8a5 2295->2304 2307 7ff71943b9b1-7ff71943b9b4 2296->2307 2311 7ff71943ba25-7ff71943ba31 2297->2311 2312 7ff71943b9e5-7ff71943b9e9 2297->2312 2299->2287 2300->2231 2309 7ff71943b870-7ff71943b87a 2301->2309 2310 7ff71943b922-7ff71943b925 2302->2310 2303->2290 2304->2300 2313 7ff71943b7f2-7ff71943b7fc 2305->2313 2315 7ff71943b81d-7ff71943b832 call 7ff719410450 2306->2315 2316 7ff71943baf2-7ff71943baf4 2306->2316 2318 7ff71943b9a0 SwitchToThread 2307->2318 2319 7ff71943b9b6-7ff71943b9bb 2307->2319 2320 7ff71943b7c1-7ff71943b7d6 2308->2320 2321 7ff71943b774-7ff71943b777 2308->2321 2322 7ff71943b88d 2309->2322 2323 7ff71943b87c-7ff71943b889 2309->2323 2325 7ff71943b927-7ff71943b92c 2310->2325 2326 7ff71943b910 SwitchToThread 2310->2326 2327 7ff71943ba20-7ff71943ba23 2311->2327 2328 7ff71943ba33-7ff71943ba3e 2311->2328 2324 7ff71943b9f0-7ff71943b9fd 2312->2324 2313->2255 2313->2285 2315->2305 2342 7ff71943b834-7ff71943b837 2315->2342 2331 7ff71943b9a3-7ff71943b9af 2318->2331 2332 7ff71943b9c0-7ff71943b9cc 2319->2332 2320->2269 2338 7ff71943b7d8 2320->2338 2321->2280 2334 7ff71943b890-7ff71943b8a0 SwitchToThread 2322->2334 2323->2309 2333 7ff71943b88b 2323->2333 2324->2324 2335 7ff71943b9ff-7ff71943ba01 2324->2335 2340 7ff71943b930-7ff71943b93c 2325->2340 2339 7ff71943b913-7ff71943b920 2326->2339 2327->2311 2336 7ff71943ba08-7ff71943ba1a HeapFree 2327->2336 2337 7ff71943ba40-7ff71943ba4c 2328->2337 2331->2297 2331->2307 2332->2332 2343 7ff71943b9ce 2332->2343 2333->2334 2334->2231 2335->2255 2344 7ff71943ba03-7ff71943ba06 2335->2344 2336->2255 2337->2337 2341 7ff71943ba4e-7ff71943ba50 2337->2341 2338->2255 2339->2303 2339->2310 2340->2340 2345 7ff71943b93e 2340->2345 2341->2327 2348 7ff71943ba52 2341->2348 2346 7ff71943b7ea-7ff71943b7ed 2342->2346 2347 7ff71943b839-7ff71943b848 2342->2347 2343->2331 2344->2311 2344->2336 2345->2339 2346->2305 2347->2313 2348->2255 2349->2276 2350->2276
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 5e6a2a004aedbe4b75deed0182919b5831f1a34c511a19f76d54f4eb63ccf324
      • Instruction ID: 21e3f5fd687e9b2ec464d38a8701cc0392c7a4185b3e982078b8be66cd9427e0
      • Opcode Fuzzy Hash: 5e6a2a004aedbe4b75deed0182919b5831f1a34c511a19f76d54f4eb63ccf324
      • Instruction Fuzzy Hash: 2C02E572B09F5981EA65AE25D0403BBE3B1FB447E8F844136CE5E07794DF28E16AC310
      Strings
      • WQLEmptyNullStringI1I2I4I8R4R8BoolUI1UI2UI4UI8ArrayUnknownObjectIUnknownWrapperinnerIWbemClassWrapper, xrefs: 00007FF7193F7B6D
      • ROOT\CIMV2, xrefs: 00007FF7193F72C6
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: ROOT\CIMV2$WQLEmptyNullStringI1I2I4I8R4R8BoolUI1UI2UI4UI8ArrayUnknownObjectIUnknownWrapperinnerIWbemClassWrapper
      • API String ID: 0-1905205246
      • Opcode ID: 0e42838405c456af271dce4768b272679c8c5829d5908e5295c0b397e84dd38d
      • Instruction ID: 0c737d695ed4e58c4a70c9faeaa48ed99a0acd318cb3e70dd0f0c8d27434a204
      • Opcode Fuzzy Hash: 0e42838405c456af271dce4768b272679c8c5829d5908e5295c0b397e84dd38d
      • Instruction Fuzzy Hash: 62528E32608BC285EB649F11E4403AABBB4FB84B94F948139DE8D47B56EF3CD416D790
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 9187f2c49970debbfdbd814a7605ba111c58eadf39de561fdb530202c53463cc
      • Instruction ID: 66acf9b5f40b65ece92889136607fed7041add0de3936ab28b9de06ba7f735b6
      • Opcode Fuzzy Hash: 9187f2c49970debbfdbd814a7605ba111c58eadf39de561fdb530202c53463cc
      • Instruction Fuzzy Hash: 46617B22F19E4645F6696E11A4103BBDAA1BF457FCF840235DE6E46BD4DE3CE02AD320
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 9ecb8fca5bfe1c33a3cfc75f5cd9a69e9b5c2971b915f93e97784e878837649c
      • Instruction ID: ce97dff4ba69c81a07224359a1e09a32ce213668c2b92953dbdfedaa596fc3ac
      • Opcode Fuzzy Hash: 9ecb8fca5bfe1c33a3cfc75f5cd9a69e9b5c2971b915f93e97784e878837649c
      • Instruction Fuzzy Hash: 8B517E12A1DA81C6F7345E25A0403FBAB61E7453ACFA84234EE8D077C9CB3CE15AC794

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1413 7ff7193f1c9d-7ff7193f1d0a VariantToPropVariant 1414 7ff7193f1e03-7ff7193f1e37 GetErrorInfo PropVariantClear 1413->1414 1415 7ff7193f1d10-7ff7193f1d73 PropVariantToBSTR 1413->1415 1418 7ff7193f1ea5-7ff7193f1ec6 1414->1418 1416 7ff7193f1e6c-7ff7193f1e8c GetErrorInfo 1415->1416 1417 7ff7193f1d79-7ff7193f1d7e 1415->1417 1419 7ff7193f1e97-7ff7193f1e9f PropVariantClear 1416->1419 1420 7ff7193f1e8e-7ff7193f1e91 SysFreeString 1416->1420 1417->1419 1421 7ff7193f1ed1-7ff7193f1f4a call 7ff7194077f0 1418->1421 1422 7ff7193f1ec8-7ff7193f1ecb 1418->1422 1419->1418 1420->1419 1425 7ff7193f1f52-7ff7193f1f55 1421->1425 1426 7ff7193f1f4c SysFreeString 1421->1426 1422->1421 1427 7ff7193f168d-7ff7193f16b2 GetErrorInfo 1425->1427 1428 7ff7193f1f5b-7ff7193f1f82 1425->1428 1426->1425 1432 7ff7193f16b4-7ff7193f16ba 1427->1432 1433 7ff7193f16bc-7ff7193f2590 1427->1433 1429 7ff7193f1f90-7ff7193f1f98 1428->1429 1431 7ff7193f1fa0-7ff7193f2069 call 7ff71942c710 1429->1431 1439 7ff7193f206f 1431->1439 1440 7ff7193f20fd-7ff7193f210e VariantClear 1431->1440 1432->1433 1449 7ff7193f2593-7ff7193f25a7 1433->1449 1443 7ff7193f2073-7ff7193f2084 VariantClear 1439->1443 1441 7ff7193f2110-7ff7193f2114 1440->1441 1442 7ff7193f214c-7ff7193f2154 1440->1442 1441->1442 1445 7ff7193f2116-7ff7193f2132 1441->1445 1448 7ff7193f215c-7ff7193f21c0 call 7ff7193f67e0 1442->1448 1446 7ff7193f240b-7ff7193f241d 1443->1446 1447 7ff7193f208a-7ff7193f208e 1443->1447 1450 7ff7193f23d9-7ff7193f23db 1445->1450 1451 7ff7193f2138-7ff7193f213e 1445->1451 1454 7ff7193f2421-7ff7193f2472 1446->1454 1447->1446 1452 7ff7193f2094-7ff7193f20b0 1447->1452 1465 7ff7193f21c6-7ff7193f2229 call 7ff7193f4d40 1448->1465 1466 7ff7193f2609-7ff7193f2634 1448->1466 1455 7ff7193f25af-7ff7193f25e4 1449->1455 1450->1442 1456 7ff7193f23e1-7ff7193f23e7 1450->1456 1451->1427 1457 7ff7193f2144-7ff7193f2146 1451->1457 1458 7ff7193f20b2-7ff7193f20b8 1452->1458 1459 7ff7193f20c0-7ff7193f20c5 1452->1459 1461 7ff7193f2474-7ff7193f2485 HeapFree 1454->1461 1462 7ff7193f248b-7ff7193f249e call 7ff7193f4560 1454->1462 1463 7ff7193f20cb-7ff7193f20f6 GetProcessHeap HeapFree 1456->1463 1457->1442 1457->1456 1458->1459 1464 7ff7193f20ba 1458->1464 1459->1446 1459->1463 1461->1462 1472 7ff7193f24a4-7ff7193f24b4 1462->1472 1473 7ff7193f2680-7ff7193f2689 1462->1473 1463->1448 1468 7ff7193f20f8 1463->1468 1464->1427 1478 7ff7193f23bf-7ff7193f23d4 call 7ff71943a2d0 1465->1478 1479 7ff7193f222f-7ff7193f2263 1465->1479 1466->1461 1470 7ff7193f263a 1466->1470 1468->1454 1470->1462 1475 7ff7193f24d2-7ff7193f24d7 1472->1475 1476 7ff7193f269f-7ff7193f26ac 1473->1476 1477 7ff7193f268b-7ff7193f2699 HeapFree 1473->1477 1481 7ff7193f24c0-7ff7193f24cc 1475->1481 1482 7ff7193f24d9-7ff7193f24e8 HeapFree 1475->1482 1490 7ff7193f26ae-7ff7193f26d5 1476->1490 1491 7ff7193f26da-7ff7193f26ea 1476->1491 1477->1476 1478->1450 1480 7ff7193f2266-7ff7193f227f 1479->1480 1484 7ff7193f2281-7ff7193f228b 1480->1484 1485 7ff7193f22da-7ff7193f22f0 1480->1485 1481->1473 1481->1475 1482->1481 1488 7ff7193f22ad-7ff7193f22b9 1484->1488 1489 7ff7193f228d-7ff7193f22a5 1484->1489 1492 7ff7193f22f2-7ff7193f230b call 7ff71942fa90 1485->1492 1493 7ff7193f22d0-7ff7193f22d8 1485->1493 1494 7ff7193f2396-7ff7193f23a4 1488->1494 1495 7ff7193f22bf-7ff7193f22ca 1488->1495 1489->1488 1490->1455 1491->1449 1492->1493 1501 7ff7193f230d-7ff7193f234b 1492->1501 1493->1484 1493->1485 1497 7ff7193f184e-7ff7193f18d8 1494->1497 1498 7ff7193f23aa-7ff7193f23ba 1494->1498 1495->1480 1500 7ff7193f18e0-7ff7193f18e8 1497->1500 1498->1497 1502 7ff7193f263f-7ff7193f267a 1500->1502 1503 7ff7193f18ee-7ff7193f18f9 1500->1503 1504 7ff7193f2364-7ff7193f2381 1501->1504 1505 7ff7193f234d-7ff7193f235e HeapFree 1501->1505 1502->1472 1502->1473 1503->1427 1506 7ff7193f18ff-7ff7193f190b 1503->1506 1504->1500 1507 7ff7193f2387-7ff7193f2391 call 7ff7193f46e0 1504->1507 1505->1504 1508 7ff7193f1930 1506->1508 1509 7ff7193f190d-7ff7193f1921 call 7ff719423dc0 1506->1509 1507->1500 1512 7ff7193f1935-7ff7193f1952 call 7ff71942fb90 1508->1512 1509->1512 1516 7ff7193f1923 1509->1516 1518 7ff7193f1ae0-7ff7193f1b02 1512->1518 1519 7ff7193f1958-7ff7193f195f 1512->1519 1516->1427 1521 7ff7193f1b09-7ff7193f1b36 1518->1521 1519->1427 1520 7ff7193f1965-7ff7193f1988 GetProcessHeap HeapAlloc 1519->1520 1520->1427 1522 7ff7193f198e-7ff7193f19b9 1520->1522 1525 7ff7193f1b80-7ff7193f1ba3 GetErrorInfo 1521->1525 1526 7ff7193f1b38-7ff7193f1b46 1521->1526 1523 7ff7193f19e4-7ff7193f19e7 1522->1523 1527 7ff7193f19c6 1523->1527 1528 7ff7193f19e9-7ff7193f19ec 1523->1528 1525->1443 1534 7ff7193f1ba9-7ff7193f1bb1 1525->1534 1530 7ff7193f1bc0-7ff7193f1be4 call 7ff71942b6f0 1526->1530 1531 7ff7193f1b48-7ff7193f1b4e 1526->1531 1529 7ff7193f19c9-7ff7193f19e1 1527->1529 1532 7ff7193f19f2-7ff7193f19f9 1528->1532 1533 7ff7193f1aa0-7ff7193f1acf 1528->1533 1529->1523 1548 7ff7193f1be6-7ff7193f1c02 1530->1548 1549 7ff7193f1c4a-7ff7193f1c61 1530->1549 1535 7ff7193f1df5-7ff7193f1e67 1531->1535 1536 7ff7193f1b54-7ff7193f1b6b 1531->1536 1537 7ff7193f19c0-7ff7193f19c3 1532->1537 1538 7ff7193f19fb-7ff7193f1a0e 1532->1538 1533->1521 1534->1443 1535->1429 1547 7ff7193f1c0a-7ff7193f1c45 1535->1547 1536->1525 1537->1527 1540 7ff7193f1a51-7ff7193f1a5b 1538->1540 1541 7ff7193f1a10-7ff7193f1a24 1538->1541 1540->1527 1545 7ff7193f1a26-7ff7193f1a49 1541->1545 1546 7ff7193f1a60-7ff7193f1a70 1541->1546 1545->1527 1550 7ff7193f1a4f 1545->1550 1546->1527 1551 7ff7193f1a76-7ff7193f1a9a 1546->1551 1547->1439 1548->1547 1549->1431 1550->1551 1551->1529
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Variant$Prop$ClearErrorInfo$FreeString
      • String ID:
      • API String ID: 570662331-0
      • Opcode ID: bebd55958e66e253b4849391341620331f60f95ae5790505315ea8cf5252a665
      • Instruction ID: b6d8b9e9bb53d209d7b6692d4d7aed58d4ae65f64445a61e2a1c16595a93ec80
      • Opcode Fuzzy Hash: bebd55958e66e253b4849391341620331f60f95ae5790505315ea8cf5252a665
      • Instruction Fuzzy Hash: 07A12732609BC585EB719F54F4443EAB3A4FB94768F80412ADACD43A68EF7CD14ACB50

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1811 7ff719410f60-7ff719410f87 1812 7ff719411499-7ff71941149b 1811->1812 1813 7ff719410f8d-7ff719410fab 1811->1813 1814 7ff719410fad-7ff719410fcf 1813->1814 1815 7ff719410fd6-7ff719411037 call 7ff7194114a0 call 7ff719411550 1813->1815 1816 7ff719411039-7ff71941104c 1814->1816 1817 7ff719410fd1-7ff719410fd4 1814->1817 1815->1816 1819 7ff719411053-7ff719411081 1816->1819 1817->1815 1817->1819 1821 7ff719411083-7ff719411086 1819->1821 1822 7ff719411094-7ff71941109b 1819->1822 1824 7ff719411088-7ff719411092 1821->1824 1825 7ff7194110a5-7ff7194110ac 1821->1825 1826 7ff7194110a0 call 7ff719422910 1822->1826 1824->1826 1829 7ff7194110b9-7ff7194110de 1825->1829 1830 7ff7194110ae-7ff7194110b7 1825->1830 1826->1825 1832 7ff719411477-7ff71941147a 1829->1832 1833 7ff7194110e4-7ff719411108 1829->1833 1830->1829 1831 7ff719411115-7ff719411144 call 7ff719410a40 1830->1831 1831->1812 1845 7ff71941114a-7ff71941117b 1831->1845 1835 7ff71941147c-7ff719411481 call 7ff71943c540 1832->1835 1836 7ff719411486-7ff719411489 1832->1836 1833->1831 1834 7ff71941110a-7ff71941110e 1833->1834 1834->1831 1839 7ff719411110 call 7ff7194191c0 1834->1839 1835->1836 1836->1812 1838 7ff71941148b-7ff71941148f 1836->1838 1838->1812 1842 7ff719411491-7ff719411494 call 7ff7194191c0 1838->1842 1839->1831 1842->1812 1845->1812 1846 7ff719411181-7ff7194111a4 1845->1846 1848 7ff719411439-7ff719411441 call 7ff71943c480 1846->1848 1849 7ff7194111aa-7ff7194111c9 WakeByAddressAll 1846->1849 1857 7ff719411446-7ff719411456 call 7ff71943b3d0 1848->1857 1850 7ff7194111cb-7ff7194111ce WakeByAddressSingle 1849->1850 1851 7ff7194111d4-7ff7194111e1 1849->1851 1850->1851 1854 7ff7194111f0-7ff719411207 1851->1854 1855 7ff7194111e3-7ff7194111ea 1851->1855 1854->1812 1856 7ff71941120d-7ff719411224 1854->1856 1855->1854 1856->1857 1858 7ff71941122a-7ff719411231 1856->1858 1861 7ff71941145b-7ff719411462 1857->1861 1858->1812 1860 7ff719411237-7ff719411258 1858->1860 1862 7ff71941146a-7ff719411472 call 7ff71943c480 1860->1862 1863 7ff71941125e-7ff719411278 WakeByAddressAll 1860->1863 1861->1860 1864 7ff719411468 1861->1864 1862->1832 1866 7ff71941127a-7ff71941127d WakeByAddressSingle 1863->1866 1867 7ff719411283-7ff71941128d 1863->1867 1864->1812 1866->1867 1869 7ff71941129c-7ff7194112b6 1867->1869 1870 7ff71941128f-7ff719411296 1867->1870 1869->1812 1871 7ff7194112bc-7ff7194112e9 1869->1871 1870->1869 1872 7ff7194112f8-7ff719411309 1871->1872 1873 7ff7194112eb-7ff7194112f3 call 7ff719424050 1871->1873 1875 7ff719411318-7ff71941133b 1872->1875 1876 7ff71941130b-7ff719411313 call 7ff719424050 1872->1876 1873->1872 1878 7ff719411341-7ff71941135c HeapFree 1875->1878 1879 7ff719411403-7ff71941140a 1875->1879 1876->1875 1880 7ff71941136b-7ff719411374 1878->1880 1881 7ff71941135e-7ff719411366 call 7ff719423df0 1878->1881 1882 7ff71941141d-7ff719411423 1879->1882 1884 7ff7194113b4-7ff7194113d0 1880->1884 1885 7ff719411376-7ff71941137d 1880->1885 1881->1880 1886 7ff719411410-7ff719411417 1882->1886 1887 7ff719411425-7ff719411437 HeapFree 1882->1887 1888 7ff7194113df-7ff7194113e4 1884->1888 1889 7ff7194113d2-7ff7194113da call 7ff719410ca0 1884->1889 1885->1884 1890 7ff71941137f-7ff719411389 1885->1890 1886->1878 1886->1882 1887->1886 1892 7ff7194113ee-7ff719411402 1888->1892 1893 7ff7194113e6-7ff7194113e9 call 7ff719410dd0 1888->1893 1889->1888 1894 7ff71941138b 1890->1894 1895 7ff719411390-7ff719411395 1890->1895 1893->1892 1894->1895 1895->1884 1896 7ff719411397-7ff71941139c 1895->1896 1898 7ff71941139e 1896->1898 1899 7ff7194113a2-7ff7194113ae HeapFree 1896->1899 1898->1899 1899->1884
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: AddressWake$FreeHeap$Single
      • String ID: main
      • API String ID: 1240595486-3207122276
      • Opcode ID: bdb94416423033ee1f73b5047d5fb0997711d58cffea29daf9f7bb9d34a9806a
      • Instruction ID: 94eec7e978f594a57693bf47cce7eb6c7c746a69b0734b7539f0e717e326b69e
      • Opcode Fuzzy Hash: bdb94416423033ee1f73b5047d5fb0997711d58cffea29daf9f7bb9d34a9806a
      • Instruction Fuzzy Hash: 7BE18225A09E82C0EA61EF15D4443BBA3B4FB99BA8F944132CE5D437A5DF3CE45AC310

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: CopyErrorLast$LengthValid
      • String ID:
      • API String ID: 2568129594-0
      • Opcode ID: 0e49618112296a34e2eb2a9b01751e4924692ee81ac4a8362ef5ee7b0b51c715
      • Instruction ID: 45018e02cd548e99f29a076cfd6c5ddcddf9db2ea6ada142e879657f033b1209
      • Opcode Fuzzy Hash: 0e49618112296a34e2eb2a9b01751e4924692ee81ac4a8362ef5ee7b0b51c715
      • Instruction Fuzzy Hash: 00214C29A09E0241FA946F22794037B92F57F59BE9F948434CE4D46394EE3CE4AAC360

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorGlobalInfoLastMemoryPerformanceStatus
      • String ID: @$wY
      • API String ID: 1018018668-360745159
      • Opcode ID: 6465437232a31e7a4ba4c861d441ae7e7ef74c1f711b79d65f2745a73d9a11ab
      • Instruction ID: 90c70d0a62d874f56464d4fa32fc881ac448c6ecf35e77c23bb25e6a666e3f1e
      • Opcode Fuzzy Hash: 6465437232a31e7a4ba4c861d441ae7e7ef74c1f711b79d65f2745a73d9a11ab
      • Instruction Fuzzy Hash: 76715C32A08EC181E7659B15F5453EBA3B5FB947A8F404225EE8C07B98DF3DD19ACB00

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Thread$CurrentDescriptionExceptionGuaranteeHandlerStackVectored
      • String ID: main
      • API String ID: 3663057573-3207122276
      • Opcode ID: 5a80f7ec4fae98fced53f095b4c87e72f461f131b1fbde58c132a96d5f9f97f6
      • Instruction ID: cf4655c54b653ba0af64194e0f188df1061f7adfda98f86c4ade9687f46681b2
      • Opcode Fuzzy Hash: 5a80f7ec4fae98fced53f095b4c87e72f461f131b1fbde58c132a96d5f9f97f6
      • Instruction Fuzzy Hash: 1D314879A18E4281EB84EF10E49436AB3B0FB98B58F904135DE8E07765DF3CE15AC711
      APIs
      Strings
      • ReadProcessMemory returned unexpected number of bytes readUnable to read process dataIntel x86MIPSRISC AlphaPPCSHXARMIntel Itanium-based x64RISC Alpha x64MSIL(Intel or AMD) x64Intel Itanium-based x86unknownARM x64CPU , xrefs: 00007FF7194294AF
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorFreeHeapLastMemoryProcessRead
      • String ID: ReadProcessMemory returned unexpected number of bytes readUnable to read process dataIntel x86MIPSRISC AlphaPPCSHXARMIntel Itanium-based x64RISC Alpha x64MSIL(Intel or AMD) x64Intel Itanium-based x86unknownARM x64CPU
      • API String ID: 2093145822-811746041
      • Opcode ID: 51381de981be656762fccfaef145adf355968698ac8d16d05ffd77e0bcdf3b44
      • Instruction ID: 3dc0cc0f6158804c173d91ee17d25ee8c09b64dec5e41fd47de0b6c8bd294b49
      • Opcode Fuzzy Hash: 51381de981be656762fccfaef145adf355968698ac8d16d05ffd77e0bcdf3b44
      • Instruction Fuzzy Hash: 4D216036A19F4282E660AF12B94067BE2B4BB557F8F844135DE9D467E4DF3CD06AC310
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_is_managed_app__scrt_release_startup_lock
      • String ID:
      • API String ID: 1321466686-0
      • Opcode ID: 3c6ad83e5cf6ee04d2b10ebb4389df0253d689530acf9a8e860adfa21f3ee168
      • Instruction ID: 3eac4ee3025e551bda6f2e398f3bc52aead340d57582c1237f8e22fd7378de86
      • Opcode Fuzzy Hash: 3c6ad83e5cf6ee04d2b10ebb4389df0253d689530acf9a8e860adfa21f3ee168
      • Instruction Fuzzy Hash: CE311625A08A0281FA64BF61A4153FBA2B0AF557ACFC44075EE4D476D7DE2CF46FC221
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeHeap$CreateErrorLastThread
      • String ID:
      • API String ID: 1443094557-0
      • Opcode ID: 908a772330ffe284ec5ea7e4ee1c761596a100f1a8440f4522cc365b5c20ae0e
      • Instruction ID: 3abdf604fb7e7c60aa8d5ebbd03ffce6e910041be1b89d33d304b972fb6eb3e0
      • Opcode Fuzzy Hash: 908a772330ffe284ec5ea7e4ee1c761596a100f1a8440f4522cc365b5c20ae0e
      • Instruction Fuzzy Hash: 3E219625608F4141FB58AF22A9443BBA2B1BF59BE8F888035DE4C47754DE3CE09BC361
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorInfoInitialize$Security
      • String ID:
      • API String ID: 413594595-0
      • Opcode ID: ee577557710e3ff20b3bfabbc57fb21bbbc8e37046a28ced7eac5ab59fae3d02
      • Instruction ID: 97d520943e3e9276795f77eb5dd8bf66174b489ef8c42d35420286addaa1f8dc
      • Opcode Fuzzy Hash: ee577557710e3ff20b3bfabbc57fb21bbbc8e37046a28ced7eac5ab59fae3d02
      • Instruction Fuzzy Hash: 21116D32608A8182EB649F28F09476FA7A1FF85B68F904134DA8E47A84CFBCD009C710
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: GlobalInfoMemoryPerformanceStatus
      • String ID: @
      • API String ID: 3163563144-2766056989
      • Opcode ID: 14ccefcfe9fe51394f1b229004149faf3558cd4997d3c21b7a03f785823ca065
      • Instruction ID: 8ed99d461adfefd36154887f08f3d83392fae065abcfc885bf94dc94ca722433
      • Opcode Fuzzy Hash: 14ccefcfe9fe51394f1b229004149faf3558cd4997d3c21b7a03f785823ca065
      • Instruction Fuzzy Hash: 0301C011958DC192E2365B28A4063F7A3B5BFE472DF405310FAC902764EF7AD2A7CB10
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Process$ErrorLastOpenTimes
      • String ID:
      • API String ID: 1188884809-0
      • Opcode ID: 952f96abda71e25ebcc561753b4c6614b160aa5578729c8a1a523bd0f357e6ef
      • Instruction ID: 2be18f34288f9f6903e10e263f8b5a12b7a36ea5f8b0aaffe5c53f834701c80c
      • Opcode Fuzzy Hash: 952f96abda71e25ebcc561753b4c6614b160aa5578729c8a1a523bd0f357e6ef
      • Instruction Fuzzy Hash: 3DC13832619BC181E7709B15F4403EAB7A0FB95B94F908226CACD17B99EF3CD159C740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: AddressSingleWake$FreeHeap
      • String ID:
      • API String ID: 4197705244-0
      • Opcode ID: 10200e68ec3b0f703d8c0814d1b9fa833798532b108e22d78e19a1c38410394c
      • Instruction ID: 0b124838546a9ad6dafdf6f07b890472b38126fb67c1de07a10740d082e7eaac
      • Opcode Fuzzy Hash: 10200e68ec3b0f703d8c0814d1b9fa833798532b108e22d78e19a1c38410394c
      • Instruction Fuzzy Hash: 59517172A09A8141E762EF29E4013AFA7B0F755BA8F944036CF8D43655DF2DE0ABC350
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: AddressErrorLastWait
      • String ID:
      • API String ID: 1574541344-0
      • Opcode ID: b6657e0dd20e206b3906a48f93d9f26ef8d93301633b4a0c806cebab4e83e6f3
      • Instruction ID: b7b8d2a8d3f450d23abcc06f90c3104f2caa084bf7f767fb30432d07795cbbbf
      • Opcode Fuzzy Hash: b6657e0dd20e206b3906a48f93d9f26ef8d93301633b4a0c806cebab4e83e6f3
      • Instruction Fuzzy Hash: 17213836F0891242FA24AF67A80013BE7B0AB947EDF944035DE5D47694CE3CD95BCB14
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeHeap$GuaranteeStackThread
      • String ID:
      • API String ID: 707462487-0
      • Opcode ID: 66d00cb258cb74d98166b4b66dc8822cc350b008ba4a16a88ee5117d97b016e1
      • Instruction ID: 84ecd60b3dc68b6e6b935bd8988d6ad16200276875ffa53c8857e61aac606f3e
      • Opcode Fuzzy Hash: 66d00cb258cb74d98166b4b66dc8822cc350b008ba4a16a88ee5117d97b016e1
      • Instruction Fuzzy Hash: D9F06D25608D4181E754AF26E80426AA3B1AB99BA8F884431CE4D43768CF38D09BC751
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorHeapInfo$AllocFree
      • String ID:
      • API String ID: 2984634587-0
      • Opcode ID: 43b973bcaaef3d1ee88f4743413bfbcd8f9b9f9ebe56ad1af47da9617c73d417
      • Instruction ID: d1e01a5f2d1909de244646337c5b40c0a0ae8c835de3282396e16e1b8bc40e04
      • Opcode Fuzzy Hash: 43b973bcaaef3d1ee88f4743413bfbcd8f9b9f9ebe56ad1af47da9617c73d417
      • Instruction Fuzzy Hash: E4516D22A0CBC586EB619F59F0403AAF7B0FB95758F408129EBCD42655EF3CE089CB11
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ArgvCommandFreeLineLocal
      • String ID:
      • API String ID: 1203019955-0
      • Opcode ID: 7ea5468951f74cabbb3c7dc7317faa3e960f0c4893bfabd42287a116135260e9
      • Instruction ID: b778ac7d31245bc0e92308e6c6ca743643d433717cca778dc52d5c144f402f62
      • Opcode Fuzzy Hash: 7ea5468951f74cabbb3c7dc7317faa3e960f0c4893bfabd42287a116135260e9
      • Instruction Fuzzy Hash: 8A31AF27A18F4181E665AF15B5003ABA7B0FB897E8F844224EE9D16795DF3CE1DAC700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorInfo$InformationLastPerformanceQuerySystem
      • String ID:
      • API String ID: 2723024872-0
      • Opcode ID: fe0aa4673ae50e7e3e03436d737138bacd2392ac09ddb365e7bb3c06fd4d4bf2
      • Instruction ID: ec7b84a266ac085574c781560a8693b2bfae4c2f65fb559210f260fe4cee3ce1
      • Opcode Fuzzy Hash: fe0aa4673ae50e7e3e03436d737138bacd2392ac09ddb365e7bb3c06fd4d4bf2
      • Instruction Fuzzy Hash: E4113B21A08EC482E6625B28B4053EAA3B5FFA47A8F005311FEDC46795DE3DD19A8B00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeHeap
      • String ID:
      • API String ID: 3298025750-0
      • Opcode ID: 798245b7ab70c358bf1df9ed5a884c71b29f5f6043c8dc270fe3060bde0b6e6f
      • Instruction ID: 32b59618dfd0c625615e99fbac20106b908d3890e88987f50ab02cd441cc8f77
      • Opcode Fuzzy Hash: 798245b7ab70c358bf1df9ed5a884c71b29f5f6043c8dc270fe3060bde0b6e6f
      • Instruction Fuzzy Hash: AE516C72609FC581EA60DF15F4807EAA3A4FB98BA4F944136CE9D03B95DF38D16AC710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeHeap
      • String ID:
      • API String ID: 3298025750-0
      • Opcode ID: 86f904aaa3c65c48738e3509c55a17962c12fa5348bd937c70632ad2560d5d40
      • Instruction ID: 8ba93633b154dedb53747c2b79c2a3cb66ef7641a139d675ddc82d7509e36edb
      • Opcode Fuzzy Hash: 86f904aaa3c65c48738e3509c55a17962c12fa5348bd937c70632ad2560d5d40
      • Instruction Fuzzy Hash: A8313022A18E41C0E750DF05E44437AA3B1FB987A8F954136DE8E47694EF3CE0DAC711
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeHeap$AddressWake
      • String ID:
      • API String ID: 3299827928-0
      • Opcode ID: ed110cfc72df1d9bb5abb9f82d0b2c1370c7af3f9e3bcea856309d1ef38e4956
      • Instruction ID: 8e9de93fdbd9b5149f0031fbf2da555f5d70d133972f3027cb1098d6b02f15f0
      • Opcode Fuzzy Hash: ed110cfc72df1d9bb5abb9f82d0b2c1370c7af3f9e3bcea856309d1ef38e4956
      • Instruction Fuzzy Hash: 4E416232919FC082E651DF25E5403AAB370F799768F549225DFCD02626DF39E1EAC700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: AllocateHeap
      • String ID:
      • API String ID: 1279760036-0
      • Opcode ID: a65fdc84a313883470fe09558d37892a7dbbe7e3a0d4a1aad14dc5d0bf84ca90
      • Instruction ID: 51b73f9dfb27a4317570c1b0529b9ad5724bf669b800ffa520b4ad75634ff9a8
      • Opcode Fuzzy Hash: a65fdc84a313883470fe09558d37892a7dbbe7e3a0d4a1aad14dc5d0bf84ca90
      • Instruction Fuzzy Hash: 6211D561E1DE1681FA596F6175043BE91B17F24B69F884076CD0D863C1DF2CD46BC219
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: 3daf18a492b336f48958c3f6006e67bae82e118ed740d741e7f2c2026eda6575
      • Instruction ID: 54000098a9bf10623db60cd24a3da78ea42c46f1192f02c8357053f601759c66
      • Opcode Fuzzy Hash: 3daf18a492b336f48958c3f6006e67bae82e118ed740d741e7f2c2026eda6575
      • Instruction Fuzzy Hash: 6211603691CA9282E610BF21944113BE2B5FF403F8FD40535EE8D87691EF2CE62AC760
      APIs
      • RtlReAllocateHeap.NTDLL(?,?,00000004,00000004,00007FF719439A04), ref: 00007FF7193F5E09
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: AllocateHeap
      • String ID:
      • API String ID: 1279760036-0
      • Opcode ID: 0f346a6475d21e7ac84e8198129cd29b4544aa885fb9339a79c830c6606f6605
      • Instruction ID: 07c4454a70d9167e88e6b6c5b1579869f95259095953ce2a629195a7ada7fc94
      • Opcode Fuzzy Hash: 0f346a6475d21e7ac84e8198129cd29b4544aa885fb9339a79c830c6606f6605
      • Instruction Fuzzy Hash: D6F0FE31A09E0281FA986F11B9043B9D1F06F147E4F94803ACD8D467D4EF3C945BC312
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: AddressWake
      • String ID:
      • API String ID: 98804233-0
      • Opcode ID: 5a4fb9a1632a20af32b0cba92af7591ea6201659d8ddcd3c11e83cd5ac86dc82
      • Instruction ID: f94702d701646bd39b9ac437e2462393eef4549f56bf18610fef3b281748e252
      • Opcode Fuzzy Hash: 5a4fb9a1632a20af32b0cba92af7591ea6201659d8ddcd3c11e83cd5ac86dc82
      • Instruction Fuzzy Hash: 2FF02B33B085014BEB26CF64A41025AA3D0D7847ADB044131CF8A4B694DF3CC5C7CB44
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: AddressWake
      • String ID:
      • API String ID: 98804233-0
      • Opcode ID: 9177e388edf6cd5e13afea9d7598100ba0104a870d58dfe09ec343f647a51f84
      • Instruction ID: d628a095be0de065f56caa16f4f20ef24ee49ee81ee67257138cc4de6bc48ab1
      • Opcode Fuzzy Hash: 9177e388edf6cd5e13afea9d7598100ba0104a870d58dfe09ec343f647a51f84
      • Instruction Fuzzy Hash: D8E065279086114AE6269F65B01412EA760E7597FDF440131CE89069A4CE3CD2DBCF14
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ExitProcess
      • String ID:
      • API String ID: 621844428-0
      • Opcode ID: db880b177b4e332f209ae3891594c51cdc57423b1a6ca2fe16bcc4d58633f3e0
      • Instruction ID: e313724e52fda0ed9debfc85b71eca4481fc9e862f3b18cb41d83e3038add6f1
      • Opcode Fuzzy Hash: db880b177b4e332f209ae3891594c51cdc57423b1a6ca2fe16bcc4d58633f3e0
      • Instruction Fuzzy Hash: 5BA00224B15B9182D69C3F35585603A91705F24A15BA01839C907401558D6DD1AA8750
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: AllocHeap
      • String ID:
      • API String ID: 4292702814-0
      • Opcode ID: e3b66ab36946cd814e3191d6e0603d68ba3655b68ec0b3218edca5d23f0afe4c
      • Instruction ID: 0220ae10b79a1a6df6d616e05cabb9b33598d98d7db2783bce9aed627d7bde0e
      • Opcode Fuzzy Hash: e3b66ab36946cd814e3191d6e0603d68ba3655b68ec0b3218edca5d23f0afe4c
      • Instruction Fuzzy Hash: C9F03C58B09A1241FEA4BEB195052F682B15F68FF8FC84430CD0D86391EE1CE66BC230
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: CloseHandle$Free$Heap$EnvironmentStrings$AddressCompareErrorLastOrdinalSingleStringWake
      • String ID: .exeprogram not found$PATH#$*+-./:?@\_cmd.exe /e:ON /v:OFF /d /c "batch file arguments are invalid$\?\\$\cmd.exemaximum number of ProcThreadAttributes exceeded$]?\\$p
      • API String ID: 2113584991-511396685
      • Opcode ID: 5fa8c446d8d9887713a4488d328d19734ddea3d4f1c4b1f91951140c4aeecb8a
      • Instruction ID: 336100b2ee5f7115f79e74b0d89b2f6697c101ad0f5007391514e68bb8f35d9e
      • Opcode Fuzzy Hash: 5fa8c446d8d9887713a4488d328d19734ddea3d4f1c4b1f91951140c4aeecb8a
      • Instruction Fuzzy Hash: E2839F62A08EC1C1E675AF15A4043BBA7B1FB84BA8F944135CE9D07B99DF3CE45AC710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorLast$FullNamePath
      • String ID:
      • API String ID: 2482867836-0
      • Opcode ID: e24c4dc0c7af3a511acf873f88959fec18c1e6850ff1b7f72b0e02d80dcb9514
      • Instruction ID: 739efba12b3d2af2053bc88d7b86b8d9173152355770add54649b6be9481e96b
      • Opcode Fuzzy Hash: e24c4dc0c7af3a511acf873f88959fec18c1e6850ff1b7f72b0e02d80dcb9514
      • Instruction Fuzzy Hash: DBF19D62A18F4281EA54AF12F4043ABE7B1FB44BA8F944435DE4D07B94DF7CD4AAC760
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorFreeHeapLast$EnvironmentVariable
      • String ID:
      • API String ID: 3632352037-0
      • Opcode ID: 989655814f3e13b94b90d13cbba6b1f80aced7731873db937b9ad3d8c78cda3c
      • Instruction ID: 47cceaa36518d133d150500edc82781d2914fa3478e85b73516a2681b45a0976
      • Opcode Fuzzy Hash: 989655814f3e13b94b90d13cbba6b1f80aced7731873db937b9ad3d8c78cda3c
      • Instruction Fuzzy Hash: F1C1AE26A08E4181E660AF15E44437BE3B1EB44BB8FA84135DE9D43795CF7CE09AC724
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Process$CurrentFreeHeapPrng
      • String ID:
      • API String ID: 2687294623-0
      • Opcode ID: bc5a0fc6f5540db4620ae3adc30b4bbd605ea8d129fa8dc8b93c0e1bc3d8ccaf
      • Instruction ID: 2a82e821dfd0596c6979c129bfcf1e8f4f13ee6d63099a06ea0392d6a1ef2d2d
      • Opcode Fuzzy Hash: bc5a0fc6f5540db4620ae3adc30b4bbd605ea8d129fa8dc8b93c0e1bc3d8ccaf
      • Instruction Fuzzy Hash: 34F1DD36A08F8185E7649F11B4003ABA6A1FB887B8F84423ADE9D43794DF7CE45AC750
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorLast$FullNamePath
      • String ID: \\?\\\?\UNC\
      • API String ID: 2482867836-3975371117
      • Opcode ID: 194bec776990e58ab78f546e6f745d8a38fbf75298c8663cc40ba9e39f8608c2
      • Instruction ID: 7b09da97a842582e6c7d21d91d0cc93998c37730210524163374616ee6a021f5
      • Opcode Fuzzy Hash: 194bec776990e58ab78f546e6f745d8a38fbf75298c8663cc40ba9e39f8608c2
      • Instruction Fuzzy Hash: 8FE16C32A08E52C1EA60AF15E44437BA2B1FB457A8FA04535DE9D43794DF7CF4AAC360
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeHeap$SwitchThread
      • String ID: <unknown>PATH#$*+-./:?@\_cmd.exe /e:ON /v:OFF /d /c "batch file arguments are invalid$main
      • API String ID: 4159854540-1882161258
      • Opcode ID: 3a98e10e75aa7c3bbdbb407dd6d67e707269efdb5d41cc425f484672447b4b7c
      • Instruction ID: b6964c660524fdc1949b57d6505470d4e638245675ab8482c648b6c0ce36e455
      • Opcode Fuzzy Hash: 3a98e10e75aa7c3bbdbb407dd6d67e707269efdb5d41cc425f484672447b4b7c
      • Instruction Fuzzy Hash: 8C327E32918FC081E7508F21E8543BB73B0F765B9CF595238DE8D0A299CF79A19AC360
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: +$-$-$-$-$-$-$<$INFINITY$NAN
      • API String ID: 0-3578884141
      • Opcode ID: ff8031eca7435475b68572b83a84c57ff33b673f09d9fd4322f5dbf2ce02a6c6
      • Instruction ID: 0fd7661405a02d48e4f23d9ae061f01b600563a5a3311fb7e2db932a10c1caf3
      • Opcode Fuzzy Hash: ff8031eca7435475b68572b83a84c57ff33b673f09d9fd4322f5dbf2ce02a6c6
      • Instruction Fuzzy Hash: F3C1033AA0C94241FAE1AE2494543FBE661AF447BCFDC4131DD4D962D1DE3DE9ABC220
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: AttributeProcThread$InitializeList$FreeHeapUpdate
      • String ID:
      • API String ID: 3328213773-0
      • Opcode ID: c944da4e7662f927c09eda50b897ea192e57b1ca58eea342e177adfe36839c44
      • Instruction ID: 7f990cc3a5cca521274c457871a5139f2277981e0b1f557067ee4d5a5d70cca6
      • Opcode Fuzzy Hash: c944da4e7662f927c09eda50b897ea192e57b1ca58eea342e177adfe36839c44
      • Instruction Fuzzy Hash: 2E81C669B19E4681EA54AF16A4447F7A2B1BF8CBF8F984231DD5D03394DE3CE05AC210
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: 0123456789abcdef[$IWbemClassWrapper$\\$\u$\u${${$}$}
      • API String ID: 0-2337650335
      • Opcode ID: b4dcbb6f3575be4fb808c18639e5d635e595360f3d0c2e8639a000fc8bb2716d
      • Instruction ID: 8c3d5ed1bdb4dac2de25b3ae777055a68b352e6381d34f39e32a5bc3825c51ea
      • Opcode Fuzzy Hash: b4dcbb6f3575be4fb808c18639e5d635e595360f3d0c2e8639a000fc8bb2716d
      • Instruction Fuzzy Hash: 75324D22B1C99246FF709F64A40CB79EB70EB51BA8FC44139DA4D13AD1DA3DD14AC722
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FileHandle$CloseFindInformation$ErrorFirstFreeHeapLast
      • String ID:
      • API String ID: 3677867274-0
      • Opcode ID: 0445f3f35f1d63ed32cc572b873c6131fa5efa2d55e0ae8ddc939cc8d020b090
      • Instruction ID: a1a7a91a2984385687973d847a6683168607ecd03b76af6421f825a90e9482aa
      • Opcode Fuzzy Hash: 0445f3f35f1d63ed32cc572b873c6131fa5efa2d55e0ae8ddc939cc8d020b090
      • Instruction Fuzzy Hash: BD815732608B8186E7749F15E4403ABB7B1FB947A8F508125DFCA46B94DF7CE09ACB50
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
      • String ID:
      • API String ID: 3140674995-0
      • Opcode ID: 40f74aeec278dc0b4ed8692fbd82faccefb9773f4f47e1fa3e6592142d04547c
      • Instruction ID: b62e97ce0fd84ee97e571c930de0dc25f116cfa81d273f8158637475ba8595e6
      • Opcode Fuzzy Hash: 40f74aeec278dc0b4ed8692fbd82faccefb9773f4f47e1fa3e6592142d04547c
      • Instruction Fuzzy Hash: 35314D76609E8185EB609F60E8403EEB3B0FB94758F844039DE4D47A98DF38D659C720
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
      • String ID:
      • API String ID: 1239891234-0
      • Opcode ID: 6db0eae2340264798065aa7446da7f38de82570c146f18533c35537213b19dc6
      • Instruction ID: 37d44f347a4510f897dd2206e6e605ba55a0123ad99af1f47993130b6a5e98f3
      • Opcode Fuzzy Hash: 6db0eae2340264798065aa7446da7f38de82570c146f18533c35537213b19dc6
      • Instruction Fuzzy Hash: C7315336608F8185DB609F25E8402AE73B0FB857A8F900135EE9D43B58DF3CD55ACB50
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: +$-$-$-$-$INFINITY$NAN
      • API String ID: 0-176520682
      • Opcode ID: 98e068ad37056ec9995d9d95118e3993f8b73c79113080f4e61d0759b0d2c983
      • Instruction ID: e116163dc769384248ad14bea28c72f77fe52a2def1f8d1c3c996feaae2fa596
      • Opcode Fuzzy Hash: 98e068ad37056ec9995d9d95118e3993f8b73c79113080f4e61d0759b0d2c983
      • Instruction Fuzzy Hash: 0DC13711E0CD4241FAA0AE1496403FBD671AF843B8FDC4231DD4D527D1DE6EE56EC622
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Find$File$CloseFirstNext
      • String ID: .$C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe
      • API String ID: 3541575487-273700198
      • Opcode ID: 56c4d5096090ad4553bb9af2360e9cecdd577b6f7de8b517e7bb815df88bfe2a
      • Instruction ID: 087adc665f66e12ba17ab8c423bc5ee0edc31a00bc1af718e2e4fec19582d807
      • Opcode Fuzzy Hash: 56c4d5096090ad4553bb9af2360e9cecdd577b6f7de8b517e7bb815df88bfe2a
      • Instruction Fuzzy Hash: D9410311B08DA245FA60AE7194046FBE3B19B86BFCF884131DE5D066C5DE3CD26BC350
      Strings
      • RUST_MIN_STACKfatal runtime error: something here is badly broken!, xrefs: 00007FF719412E92
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: RUST_MIN_STACKfatal runtime error: something here is badly broken!
      • API String ID: 0-3541298642
      • Opcode ID: d718f7ca95da5a16c32e018f72510c9828246170336ee8f00e39ca06a21a2c36
      • Instruction ID: e2c9b2507de597b4c4beb9864176322febeb48da3a411219936915f43cb05184
      • Opcode Fuzzy Hash: d718f7ca95da5a16c32e018f72510c9828246170336ee8f00e39ca06a21a2c36
      • Instruction Fuzzy Hash: CF726A72609FC181E6659F15A4443AAB7B0FB987A8F548235CEDC03795DF3CE1AAC710
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: arenegyl$modnarod$setybdet$uespemos
      • API String ID: 0-66988881
      • Opcode ID: 07c4a18721397a9007824e1eb7835f53016bc29d8d0e3ee80955e7a7d790ba1c
      • Instruction ID: 03145446d4b5e24e761c04b267cf59ef0d01673ada993f7c0accb112797b2c4f
      • Opcode Fuzzy Hash: 07c4a18721397a9007824e1eb7835f53016bc29d8d0e3ee80955e7a7d790ba1c
      • Instruction Fuzzy Hash: B6222562F18F9582EA049F79A41056AB761FB85BF8F409336DEAE133D5DA3CC256C300
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: arenegyl$modnarod$setybdet$uespemos
      • API String ID: 0-66988881
      • Opcode ID: f6869429580fcbe86a1aebb355acb7f0ab35209e6d4ed928cf56b71c9d93ecc2
      • Instruction ID: e3e00412fc13513a160e560f8e4a00207aad1d0429cf54732b3a1dc79a4aafa6
      • Opcode Fuzzy Hash: f6869429580fcbe86a1aebb355acb7f0ab35209e6d4ed928cf56b71c9d93ecc2
      • Instruction Fuzzy Hash: 3B322853E18FD581E605DF3895112BA6720F799BA8F48A334DFAD16692DF38E2D6C300
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: arenegyl$modnarod$setybdet$uespemos
      • API String ID: 0-66988881
      • Opcode ID: 179e9233c6c8072a5bda6d08b46d08e36c8ee2a95dc1a833813a41860633d4dd
      • Instruction ID: 723c148a0e159c5c1fd96c894f92be4627496cc1e7d2231046b84ecf04897f7e
      • Opcode Fuzzy Hash: 179e9233c6c8072a5bda6d08b46d08e36c8ee2a95dc1a833813a41860633d4dd
      • Instruction Fuzzy Hash: 662224B6B18F9581EB049F79A41156AA321E785BF8F908336DE6E533D5EE3CC256C300
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: arenegyl$modnarod$setybdet$uespemos
      • API String ID: 0-66988881
      • Opcode ID: 95971e91e5a4cffe41299828f37425548441baae9a585990b980fbf353cdf808
      • Instruction ID: 2e0e96cd6b81d41d12c157b495a2fbca037c0a0716e912aa5ab5178f18e25ea6
      • Opcode Fuzzy Hash: 95971e91e5a4cffe41299828f37425548441baae9a585990b980fbf353cdf808
      • Instruction Fuzzy Hash: 551249A2B15F9542EA249F79A40167BA761EB85BE4F809331DE6E137C5DF3CD246C300
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: +$-$-$FFFFFFFF$FFFFFFFF$d
      • API String ID: 0-1053537561
      • Opcode ID: 593f7d21cc9bec23c0a78bcdc2e08223371110083b76d33be5e39ff576dfdafd
      • Instruction ID: 8a54f44bf540e2ba6a3443a31b2928fec21a31ebe01445a59d7976e33c4f13cd
      • Opcode Fuzzy Hash: 593f7d21cc9bec23c0a78bcdc2e08223371110083b76d33be5e39ff576dfdafd
      • Instruction Fuzzy Hash: 6AB13B22F08D9142EAA4AE1685417FBEEE0AB11BF8F8D5631CE6D077D0E93D955BC310
      Strings
      • ]0x00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899000000000000000000000000000000000000000000000000000000000, xrefs: 00007FF7193F37EA
      • , : {,} }((,]0x000102030405060708091011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798990000000000000000000000000000000000000000, xrefs: 00007FF7193F383B
      • ,} }((,]0x0001020304050607080910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989900000000000000000000000000000000000000000000000, xrefs: 00007FF7193F3819, 00007FF7193F3917
      • 0x000102030405060708091011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798990000000000000000000000000000000000000000000000000000000000, xrefs: 00007FF7193F32C1, 00007FF7193F3450, 00007FF7193F3616
      • 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899000000000000000000000000000000000000000000000000000000000000, xrefs: 00007FF7193F313C, 00007FF7193F3370, 00007FF7193F3481, 00007FF7193F352C, 00007FF7193F365B, 00007FF7193F3687
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: ,} }((,]0x0001020304050607080910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989900000000000000000000000000000000000000000000000$, : {,} }((,]0x000102030405060708091011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798990000000000000000000000000000000000000000$00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899000000000000000000000000000000000000000000000000000000000000$0x000102030405060708091011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798990000000000000000000000000000000000000000000000000000000000$]0x00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899000000000000000000000000000000000000000000000000000000000
      • API String ID: 0-2071427841
      • Opcode ID: e9cba40268eedb7b97191b433b4686c2d00fadda313a83c78542d69372e21008
      • Instruction ID: 6e10b3c4727a92014124f9e241890bc02b4ac78729befb4de3d5d020b6c0be05
      • Opcode Fuzzy Hash: e9cba40268eedb7b97191b433b4686c2d00fadda313a83c78542d69372e21008
      • Instruction Fuzzy Hash: 08222632B18A9582EB649F15E0107B9B760FB947A8F805239DE8E03BD1EF3DD54AC711
      Strings
      • )0123456789abcdef[, xrefs: 00007FF7193F30EA
      • IUnknown, xrefs: 00007FF7193F3044
      • 0x000102030405060708091011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798990000000000000000000000000000000000000000000000000000000000, xrefs: 00007FF7193F2CCC, 00007FF7193F2DD2, 00007FF7193F2FB0
      • ,]0x000102030405060708091011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798990000000000000000000000000000000000000000000000000000000, xrefs: 00007FF7193F30BF
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: )0123456789abcdef[$,]0x000102030405060708091011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798990000000000000000000000000000000000000000000000000000000$0x000102030405060708091011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798990000000000000000000000000000000000000000000000000000000000$IUnknown
      • API String ID: 0-1102945861
      • Opcode ID: 9c4c938acde91bd6008d320ed2a51f1aa1ce802be5f6e71dae5e31e0123f9179
      • Instruction ID: bd26ccbe1d39c3c8b3cb36ae3e7b1223e52d17fffd868983cfab836bb63de3f1
      • Opcode Fuzzy Hash: 9c4c938acde91bd6008d320ed2a51f1aa1ce802be5f6e71dae5e31e0123f9179
      • Instruction Fuzzy Hash: 9F326D33B2CA6182D7789F15E010BB9B660EB947A8F901335DE9E17BD0DE2DC516CB11
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeHeap$CompareOrdinalString
      • String ID:
      • API String ID: 3984308579-0
      • Opcode ID: 950de85a88c091dd21e4004f4fdde0dbde896fb1319e84ebe0b1f1acce1cf529
      • Instruction ID: 8112b6610f187df4e97f26ede15ea3ca8d05d506965a04f6af05a05718ba6726
      • Opcode Fuzzy Hash: 950de85a88c091dd21e4004f4fdde0dbde896fb1319e84ebe0b1f1acce1cf529
      • Instruction Fuzzy Hash: 25B28422918FC4C1E6229F18E4057EAB3B4FFA8798F559221DF9C13665EF35E1A6C700
      APIs
      Strings
      • C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, xrefs: 00007FF719434F82
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Find$File$AllocCloseFirstHeapNext
      • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe
      • API String ID: 1986626903-2976275561
      • Opcode ID: c734659124528dbc49deeaae8ed06717fe1e44c661f23d57db9ea74f7eb45c44
      • Instruction ID: 66ee7434967ff91e96aaa7f3c12c6b790aa3a5bfed2626d6ee0cef86725e7fa6
      • Opcode Fuzzy Hash: c734659124528dbc49deeaae8ed06717fe1e44c661f23d57db9ea74f7eb45c44
      • Instruction Fuzzy Hash: 7F51FD25B18E6142FA10AE3694057BBE2A1AB85FF8F884231DE1D07BD5DE3CD267C314
      APIs
      • _invalid_parameter_noinfo.LIBCMT ref: 00007FF719434BC8
        • Part of subcall function 00007FF719433794: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF7194339E6), ref: 00007FF7194337C1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: CurrentProcess_invalid_parameter_noinfo
      • String ID: *?$C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe
      • API String ID: 2518042432-2358971015
      • Opcode ID: 0232d76f78ebb2758fae45bd42998701f585f0105d761c1567db8fbf1688985a
      • Instruction ID: 9928db01a5051ee3f441f2dc4a3fd88c91c62f85f7af6274898b31b194632f50
      • Opcode Fuzzy Hash: 0232d76f78ebb2758fae45bd42998701f585f0105d761c1567db8fbf1688985a
      • Instruction Fuzzy Hash: 3151C166B14EA685EB10EFB198100EEA7B4AB44BE8B854531DE1D17B85DF3CD16AC320
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: arenegyl$modnarod$setybdet$uespemos
      • API String ID: 0-66988881
      • Opcode ID: b53ee3dc563229a3e121e102d59622d1dafcecfc1a71ad0d7f919501d0d05ed5
      • Instruction ID: 76ec1cbf303cce7338208477d8689cb8b464b193edae1ecf70b097d3e639a449
      • Opcode Fuzzy Hash: b53ee3dc563229a3e121e102d59622d1dafcecfc1a71ad0d7f919501d0d05ed5
      • Instruction Fuzzy Hash: 8A3137E6B08B8042FE54DBE4787536B9222A7457D0F90E13AEE4D9BF1EDE2DD2424240
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: arenegyl$modnarod$setybdet$uespemos
      • API String ID: 0-66988881
      • Opcode ID: 537035319c30ec46fa3be5ca8e4e0f38031d99aaa15b71ee970a14fb9b46fb35
      • Instruction ID: f25b433d14cf9842a0093f7237761c4130dba47fec39b423f1f3b14a693c573f
      • Opcode Fuzzy Hash: 537035319c30ec46fa3be5ca8e4e0f38031d99aaa15b71ee970a14fb9b46fb35
      • Instruction Fuzzy Hash: E721F6E6B08B8442FE44DBE4787636B9262A3847C0F90E036EE4D9BB1EDF3DD2514640
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorFileObjectSingleStatusWaitWrite
      • String ID:
      • API String ID: 3447438843-0
      • Opcode ID: ff2926c82701f16349109ba7b2b2f8b0d40f1a5e512d77a2efc1591088f02375
      • Instruction ID: 0cdbf5a45d04c12dfcf028cd8b0bef05757694932dd294b1cbf4c4191d8acaa8
      • Opcode Fuzzy Hash: ff2926c82701f16349109ba7b2b2f8b0d40f1a5e512d77a2efc1591088f02375
      • Instruction Fuzzy Hash: A321AC32A1CB8582E7509B24F440357B3A1EBD4364F958231EA9D42794EF7CE1D9CB00
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: Authenti$GenuineI$HygonGen
      • API String ID: 0-696657513
      • Opcode ID: 14a05d1007bf4751255e69e18bf7c88f4a0a8b1ca8a38ba49d4b390e210eea7d
      • Instruction ID: 447cda19a284b93967ec93457ab5f0739617431b03bf618ea840cf95013529a8
      • Opcode Fuzzy Hash: 14a05d1007bf4751255e69e18bf7c88f4a0a8b1ca8a38ba49d4b390e210eea7d
      • Instruction Fuzzy Hash: 10B17BA7B389A103FB598E16BD62BB64891B358BD8F547038ED5F87BC0C97DCA11C204
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: @
      • API String ID: 0-2766056989
      • Opcode ID: 925872390141976ef33f80e9ad79504a24abc4f70c8bc6aa377e1941aa1d6911
      • Instruction ID: b0619f35205b7998b71e9b5393ceeb55653be3655f3daae36a0533bf6dd986af
      • Opcode Fuzzy Hash: 925872390141976ef33f80e9ad79504a24abc4f70c8bc6aa377e1941aa1d6911
      • Instruction Fuzzy Hash: 3F627F32608BC181EB709B15E4443EBB7A1F788798F844129DB8D47B99EF3CE54ACB11
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: 0.ee--+NaNinf00e0)0123456789abcdef[$0x000102030405060708091011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798990000000000000000000000000000000000000000000000000000000000
      • API String ID: 0-1148296569
      • Opcode ID: 705f09fa26d367c52989b36b38cacb9bfa6117882df57ce40e5ce0692cf91b44
      • Instruction ID: ad2041e0c970d3690e3fe84a6f29065f3369fd648de7584c2ea7ccdc898c3410
      • Opcode Fuzzy Hash: 705f09fa26d367c52989b36b38cacb9bfa6117882df57ce40e5ce0692cf91b44
      • Instruction Fuzzy Hash: B982E232A1CB8181EBA19F14E4443AAB2B1FB803A8F945235DE8D07BE4DF7DD55AC750
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ExceptionRaise_clrfp
      • String ID:
      • API String ID: 15204871-0
      • Opcode ID: 402b289977f7ea5324dd44b01ff3ffbdff8edebea9ab7a901136a953af1109ca
      • Instruction ID: aad3e5fe70fa811b690e75ab204b8e2bb8ea335dd881e572e742166f5a3b181b
      • Opcode Fuzzy Hash: 402b289977f7ea5324dd44b01ff3ffbdff8edebea9ab7a901136a953af1109ca
      • Instruction Fuzzy Hash: BFB17977604B94CBEB19DF29C881369BBB0F784B9CF148921DA5D837A4CB39D466C710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: CallFreeHeapInformationPower
      • String ID:
      • API String ID: 2434942627-0
      • Opcode ID: ec9a4f8239c59fb008051ae9490cc599cc0269061da6c6f501c7f5f2d4168d69
      • Instruction ID: 2145c58c11070fef284700ab90a56c4eb4dacf859e1efe29198d4e71b088a4ae
      • Opcode Fuzzy Hash: ec9a4f8239c59fb008051ae9490cc599cc0269061da6c6f501c7f5f2d4168d69
      • Instruction Fuzzy Hash: 7A41E675B29F0141EA55AF16B50067AA6F5BB44BF4F844635CE6E437D0DE3CE066C320
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: arenegyl$setybdet
      • API String ID: 0-2199462733
      • Opcode ID: 0164fea7b49c2b2bb52f027481c7429a2554de76c65e751bdbeb65e442ba6dba
      • Instruction ID: 62fff5be4611b85fb9fe1021a29d72994cb857d285be88ac3a6e45c0fa11c855
      • Opcode Fuzzy Hash: 0164fea7b49c2b2bb52f027481c7429a2554de76c65e751bdbeb65e442ba6dba
      • Instruction Fuzzy Hash: 6B517C23B446A185F2A4AF75BA503E76A60F318758FC85121DF8C87311EF38DAE78340
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: +NaNinf00e0)0123456789abcdef[
      • API String ID: 0-2384358695
      • Opcode ID: 6afff7df6cb84d95af471487224147f7ca696779b4dec658d170c7bfea696783
      • Instruction ID: 71fd9093f2d2bd7fceebabf9afc5f3a711dc9da7d479707318a293bafc4b4a5b
      • Opcode Fuzzy Hash: 6afff7df6cb84d95af471487224147f7ca696779b4dec658d170c7bfea696783
      • Instruction Fuzzy Hash: C872E572E19BC142EA649F01A0407FAA770EBD57A8F988335DE9D03A85DF6CD195CB40
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: 0x000102030405060708091011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798990000000000000000000000000000000000000000000000000000000000
      • API String ID: 0-528166994
      • Opcode ID: 177899f69a30b83c0af9f94e933b7b8987c5fe5214a1e6ce76235c91d1fe9612
      • Instruction ID: 6f8baa7d2984c8335c3f5be68a8d874114ab3a05acb29acbb60315d79a1ec7f4
      • Opcode Fuzzy Hash: 177899f69a30b83c0af9f94e933b7b8987c5fe5214a1e6ce76235c91d1fe9612
      • Instruction Fuzzy Hash: 37324932B18A9182E7749F15F000BFAA660FB517A8FC05235DE9E17BD0CB3DA52AC751
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: 0.ee--+NaNinf00e0)0123456789abcdef[
      • API String ID: 0-4188985375
      • Opcode ID: 79890adfb8bc154ac4d888d0f3179f3684b3303b0a2e77f43360038f1b49795e
      • Instruction ID: 7f26fd52491db4b0873ce778a66bbf8df1a73235e77d7b63f4cf9d18987eb648
      • Opcode Fuzzy Hash: 79890adfb8bc154ac4d888d0f3179f3684b3303b0a2e77f43360038f1b49795e
      • Instruction Fuzzy Hash: AC52A432A1DB8181E7A19F14E4403ABA3B1FB803A8F944235DE9D07B98DF7DD55ACB14
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: +NaNinf00e0)0123456789abcdef[
      • API String ID: 0-2384358695
      • Opcode ID: 8a15915c14b6dad6f93c73035314e9fb10ea180711ba590e246142a47a64dd8a
      • Instruction ID: d0fa10f1e987422c11aefb758a53f266fe73adc9bd9191215e645d9b781cb03f
      • Opcode Fuzzy Hash: 8a15915c14b6dad6f93c73035314e9fb10ea180711ba590e246142a47a64dd8a
      • Instruction Fuzzy Hash: F252E573A19BC146E6B09F01A0407FAA770EBD97A8F984335DE9912B85DF7CE095CB40
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 06e8f5ad5dd13e0867f4e1dacf8e5b3d3b523346aff363390bf6142720fae954
      • Instruction ID: e345897404c7abda68324a7ccc86cb754f47bc413c0024cc7d456f3e85efbede
      • Opcode Fuzzy Hash: 06e8f5ad5dd13e0867f4e1dacf8e5b3d3b523346aff363390bf6142720fae954
      • Instruction Fuzzy Hash: 5CD2B4A7F45AD043FA60CFE4B4607D7AB61FB95788F44A026DE8C93B09DE38C6918744
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: +NaNinf00e0)0123456789abcdef[
      • API String ID: 0-2384358695
      • Opcode ID: e2f99b4e2bbfd12d4e75b894faa676f3925af17ed298a83248089a69ed283514
      • Instruction ID: 522e679131d2ba117ffc32185052f46228bab9848856cbe4528c24c8519d4d9d
      • Opcode Fuzzy Hash: e2f99b4e2bbfd12d4e75b894faa676f3925af17ed298a83248089a69ed283514
      • Instruction Fuzzy Hash: 61F18B72718B9583DB44DF65E8042AAEB61F740BD8F984135EE4E47B88CE3CD96AC700
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: +NaNinf00e0)0123456789abcdef[
      • API String ID: 0-2384358695
      • Opcode ID: 63fb08ce134a1876497834fbfa7686dd1416f72865187cab584f3a596cfc9a74
      • Instruction ID: 9b6cde60e051e2a6f06b830f6c9a364d43813256a4c44015e38d91d817a60d0b
      • Opcode Fuzzy Hash: 63fb08ce134a1876497834fbfa7686dd1416f72865187cab584f3a596cfc9a74
      • Instruction Fuzzy Hash: 46E15D72F19A9543EE68DE2498503BE9691AB847E8F998431CD4E07BC0DE3CA95BC311
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: x
      • API String ID: 0-2363233923
      • Opcode ID: 655615e668a32a333fbe7ebac06fbf3d2f61645a69bb48ea104703aef8e52571
      • Instruction ID: f72a7b37eef19faa0c7a4b213389a3b2c5f21ec022c52eb24d003a0c2f7bbc44
      • Opcode Fuzzy Hash: 655615e668a32a333fbe7ebac06fbf3d2f61645a69bb48ea104703aef8e52571
      • Instruction Fuzzy Hash: A702A336619FC584D6B18B19F8803DAB3A4F798794F548226DECC53B19EF78D198CB00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Version
      • String ID:
      • API String ID: 1889659487-0
      • Opcode ID: 10e9138612ea2870d11cd6da35c1ce88293fa70dfc1ed33709475503f47d7329
      • Instruction ID: c4c582e6c287d7844f53a9db4afea0aae3de2f5c1e192f97acf93d180da20662
      • Opcode Fuzzy Hash: 10e9138612ea2870d11cd6da35c1ce88293fa70dfc1ed33709475503f47d7329
      • Instruction Fuzzy Hash: FFF0863DA08A5581E774AF11F1013EAA370EB587A8F944531CB4E17794CA3CD55BCB10
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: @
      • API String ID: 0-2766056989
      • Opcode ID: 55c9d86daa9c82bbed98e8762f1898e164d310721818ed04656cb74e2f17e478
      • Instruction ID: d223742a27d19fb92df744d131a617a94f517ebfca8fccb7469c901572db3b3e
      • Opcode Fuzzy Hash: 55c9d86daa9c82bbed98e8762f1898e164d310721818ed04656cb74e2f17e478
      • Instruction Fuzzy Hash: A341D232714E548AEF48EF2AD4141AAB3B1B758FE8B899132DE0D87754EE3CD15AC340
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 11233f3203f44a8d52b6f36193fe8e041c9bf36cf7265d154777a10529cda472
      • Instruction ID: f0d1082f2565f1a001eeb47706cd4f8918955ca34e35583bde5e3dcd925841fa
      • Opcode Fuzzy Hash: 11233f3203f44a8d52b6f36193fe8e041c9bf36cf7265d154777a10529cda472
      • Instruction Fuzzy Hash: 56323822F1CA9242EE10EE259404ABAEB21EB557A8FC45335EE4E536C5FF3CD54AC311
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 7f74e0904647ab47a3ec70489c98d78e0712ecbf22d9bd3c13f8f94284c49827
      • Instruction ID: 360275f0c291a71b8983627a6a628fa1884168c280ad70c7916750679bc6ecbd
      • Opcode Fuzzy Hash: 7f74e0904647ab47a3ec70489c98d78e0712ecbf22d9bd3c13f8f94284c49827
      • Instruction Fuzzy Hash: 52F12762E29FC182E3525B3854013FBF724AFEB798F84D322EED531A81DB689156D214
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e31be5707e724445f2252c5881b99883c2d0881c28b889c9f2e2d75c82b7ba2b
      • Instruction ID: 5e1589d1126e8265170e2216aa57ffc0f49dd187af78fc69c57da152fe37c094
      • Opcode Fuzzy Hash: e31be5707e724445f2252c5881b99883c2d0881c28b889c9f2e2d75c82b7ba2b
      • Instruction Fuzzy Hash: DEB10866F81BA443DA188F85B85179AA365B3C9BD4F45E026DE4CA7F58ED3CC9038340
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 6a43fb75938622ecc89e568e1b1af2ed9744f7fa5f91b6e5357eac623a75edd7
      • Instruction ID: 966a4a98af83d3838cc046514a21df06aaed938b23ed3ae5b6c876b78112ac58
      • Opcode Fuzzy Hash: 6a43fb75938622ecc89e568e1b1af2ed9744f7fa5f91b6e5357eac623a75edd7
      • Instruction Fuzzy Hash: 2EB10252E1CE4241FA255E15A1103BBEBF2BF507ACF845231DE9B077D1EE6CE56AC210
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: da7ef7116775b5135d93d3f5f4916e2978da80738964e10cbb3d34a4c80a3dc7
      • Instruction ID: af01c3fd584e27884f24562e073b4ebd0ac86dfac84a451cc024c28c2c1765c7
      • Opcode Fuzzy Hash: da7ef7116775b5135d93d3f5f4916e2978da80738964e10cbb3d34a4c80a3dc7
      • Instruction Fuzzy Hash: 40A17892D1CA95C8F7225D649410BFBEAA15701379FEC9331CD7E121C0DAA879BBD3A0
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e190796d52877904b2f7036acb285d6a2357fc17dac6f35cdb6d8c91d7262f5d
      • Instruction ID: d3b7a9e53914f9ec273c3a75b1c7a8dde5e26329f052b9363079ea1116e79e21
      • Opcode Fuzzy Hash: e190796d52877904b2f7036acb285d6a2357fc17dac6f35cdb6d8c91d7262f5d
      • Instruction Fuzzy Hash: 98513696F18B8541FE109B7864113BAD320AF967D8F84A33AEECD66A55FF3CD1468240
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e9b0bec211e6195bb120cdd5099edde79d6a45dd3d239ce56b518f5aae1f642a
      • Instruction ID: a7cab7e7553e3a3cdf64e1aefc271de5eadbe9912a8622da3be1eaa383a3afa2
      • Opcode Fuzzy Hash: e9b0bec211e6195bb120cdd5099edde79d6a45dd3d239ce56b518f5aae1f642a
      • Instruction Fuzzy Hash: D2414972F14A6542FF14CF61A674E386662E390FE8F81913ACD1A13B90DE28D85AD341
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c9775d2703ff0c20151bb12cba428608931df9f6d74f872bf3b80d424fcb634d
      • Instruction ID: 2478c623ce55db3562ddc86cdd3e67db444ea39aff397bb73a6d849fce2e7c56
      • Opcode Fuzzy Hash: c9775d2703ff0c20151bb12cba428608931df9f6d74f872bf3b80d424fcb634d
      • Instruction Fuzzy Hash: 46315976F19D1603FEA8992999217F641924B417F4ED89330DD3E8BBD8E92C945AC110
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 666be09939b598d6dd5efa9e60ad622723159b4466b6cc905416c5108f0645ab
      • Instruction ID: 9aaa4c1d0753a7cbfb130273d089f1486b7f2e49c0b629e2165e6da23c9c5be2
      • Opcode Fuzzy Hash: 666be09939b598d6dd5efa9e60ad622723159b4466b6cc905416c5108f0645ab
      • Instruction Fuzzy Hash: A4F0C875B19A518BDBD49F68A44266AB7E1F7583D4F908039D98CC3F04C63CC061CF14
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 4ab6bf9516f8b2bfb3011f8bb532ff976483aeb6874551f9edb41a2ce433879b
      • Instruction ID: a612a396ec0b4d78a4f618bb1c09764e97054e86f74fabbd0b7dea3fc7afa454
      • Opcode Fuzzy Hash: 4ab6bf9516f8b2bfb3011f8bb532ff976483aeb6874551f9edb41a2ce433879b
      • Instruction Fuzzy Hash: 2DA00125908C0294E649AF10AA60062A2B1BB64369BC10175C80D81069AE2CA56AC664
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeHeap$CloseHandle$FileReadSleep
      • String ID: main
      • API String ID: 1055633282-3207122276
      • Opcode ID: 2ad78091861c12846a0f5148fef5463d9080a29c8e8d0a25bc5919945dac62a8
      • Instruction ID: 56fcb573a763f7602b705791ad289c37ba991b481e1e8ae75a277ba54fe20f05
      • Opcode Fuzzy Hash: 2ad78091861c12846a0f5148fef5463d9080a29c8e8d0a25bc5919945dac62a8
      • Instruction Fuzzy Hash: 5FD17525A08E4181EB68AF15F4503BBA3B0FB94BA8F944135DE4D43794DF3CE5AAC711
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorLast$FreeHeap$AddressHandleModuleProc
      • String ID: GetTempPath2W$kernel32
      • API String ID: 945766713-407914046
      • Opcode ID: 5605e513ce9e32255ab3d05cecbf6f3774abd73f92c90a0121b774093a6f9a76
      • Instruction ID: 7c58dd425e163ac3d7358761a2f18a6df6fe6836cd872745ccbb9d797d838b73
      • Opcode Fuzzy Hash: 5605e513ce9e32255ab3d05cecbf6f3774abd73f92c90a0121b774093a6f9a76
      • Instruction Fuzzy Hash: 3251EE25A09E4282F620AF15A804377E3B0BB547BCFE44536DE5D53694DF7CE0AEC620
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeHeap$ErrorLast$FileHandle$CloseCreateInformation
      • String ID:
      • API String ID: 910738790-0
      • Opcode ID: f0a1c335fddc2b081e6868987c1cae8b888d9ce2031ee9c6f2b73a3eb6e1ea87
      • Instruction ID: f02604dcf8697c209de9068164d08dd31b82f54c2edb4fd963cc7118310e0907
      • Opcode Fuzzy Hash: f0a1c335fddc2b081e6868987c1cae8b888d9ce2031ee9c6f2b73a3eb6e1ea87
      • Instruction Fuzzy Hash: BE71E351A0CA5282FB60AF16951037BA7B0EB457A8FA40135DE8D07AC4DF2DF4BEC720
      APIs
      Strings
      • RUST_MIN_STACKfatal runtime error: something here is badly broken!, xrefs: 00007FF71942129E
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Handle$Close$CurrentDuplicateErrorLastProcess
      • String ID: RUST_MIN_STACKfatal runtime error: something here is badly broken!
      • API String ID: 1869159801-3541298642
      • Opcode ID: b93176c6b91049284afab0887def83b06ca28ec74641455f65aefc60b5919201
      • Instruction ID: f4313deb7d489be8ca7ea375eed7451c91226aebda139ec6b5203a703e3bfea2
      • Opcode Fuzzy Hash: b93176c6b91049284afab0887def83b06ca28ec74641455f65aefc60b5919201
      • Instruction Fuzzy Hash: 48B1A725A09E4241FA55AF11A4403BBA7B0FF99BA8F944571DE4E03795DF3CE46BC320
      APIs
      • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF719435A99,?,?,00000000,00007FF7194319E4), ref: 00007FF719435C89
      • GetLastError.KERNEL32(?,?,00000000,00007FF719435A99,?,?,00000000,00007FF7194319E4), ref: 00007FF719435C97
      • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF719435A99,?,?,00000000,00007FF7194319E4), ref: 00007FF719435CC1
      • FreeLibrary.KERNEL32(?,?,00000000,00007FF719435A99,?,?,00000000,00007FF7194319E4), ref: 00007FF719435D07
      • GetProcAddress.KERNEL32(?,?,00000000,00007FF719435A99,?,?,00000000,00007FF7194319E4), ref: 00007FF719435D13
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Library$Load$AddressErrorFreeLastProc
      • String ID: MZx$api-ms-
      • API String ID: 2559590344-259127448
      • Opcode ID: f2e26ac8825cf457cbafa1647916896e25036d89d3c965aed87dd1a64f96d237
      • Instruction ID: ae742e31218cb3fcfd05a3b47ee02c07464edcb0d3628e826b98d2a0f323f66a
      • Opcode Fuzzy Hash: f2e26ac8825cf457cbafa1647916896e25036d89d3c965aed87dd1a64f96d237
      • Instruction Fuzzy Hash: 8331D621A2AE5281EE51FF26A8101B6E3B4BF04BB8F994535DD1D0B354EF3CE15AC360
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeHeap$AddressSingleWake
      • String ID:
      • API String ID: 2995119335-0
      • Opcode ID: 94362c2dee94ac0e1db62c5d23b458bc634988d2173e6a05fd2ae0cdd0081ff0
      • Instruction ID: ef5e5688c5ae6f6bf055a295d7ba62a5b6dd114e1d6452d8717c13d53f775909
      • Opcode Fuzzy Hash: 94362c2dee94ac0e1db62c5d23b458bc634988d2173e6a05fd2ae0cdd0081ff0
      • Instruction Fuzzy Hash: 2FA15139A19E4181FA94EF15A44037BA3B1AF95BA8F944032CE5D433A1DF2DF46BC321
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeHeap
      • String ID:
      • API String ID: 3298025750-0
      • Opcode ID: 5530337a3b1a5ca4cd145474f9dae2a9150a13d2ce605fc52d83da4e957db690
      • Instruction ID: af21c009dc035bccfa1166127ecc84698889e2fdd57bc520218544eeec375b62
      • Opcode Fuzzy Hash: 5530337a3b1a5ca4cd145474f9dae2a9150a13d2ce605fc52d83da4e957db690
      • Instruction Fuzzy Hash: C551F115A09E4181EA749F16B4443BB93B1BF54B68F884436CE4D07394DE3CE49AC361
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: MZx
      • API String ID: 190572456-2575928145
      • Opcode ID: d21820a490ad5c2dbee937205ab945630f75fb2f9bea8aaae3a1c006bf1c577d
      • Instruction ID: e8a9f8ef04d6a38eafcc92a4cacd62f2cf240933121c2fd8e9e2001ed5ab32eb
      • Opcode Fuzzy Hash: d21820a490ad5c2dbee937205ab945630f75fb2f9bea8aaae3a1c006bf1c577d
      • Instruction Fuzzy Hash: 3641F021B29E6281FE51AF66A800272F2B1BF14BF8F894535DD1D4B784DE3CE55AC360
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorFreeHandleHeapLast$CurrentDuplicateProcess
      • String ID:
      • API String ID: 443199557-0
      • Opcode ID: adcd85294e83936fd1ce9d3c7476648fae6c027e1a692116ccee4f7a6100d974
      • Instruction ID: 598f5fc2b946524034f900aeb842d8d1d4b93384a27c72b66f52f44cbbf5a80d
      • Opcode Fuzzy Hash: adcd85294e83936fd1ce9d3c7476648fae6c027e1a692116ccee4f7a6100d974
      • Instruction Fuzzy Hash: E6219365A0CA4141FB50AF22A40437BA2B1BF5CBF8F984235DD5E43798DE3CD49AC361
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeHeap
      • String ID:
      • API String ID: 3298025750-0
      • Opcode ID: 8e22c6d8da65e10ca2e6105041303d10067d9b0bd163b4e422512d9cf6127bd5
      • Instruction ID: cb366257b571bd75bd9650c2f5a92ab257396a330424d8970181e602b8f6e518
      • Opcode Fuzzy Hash: 8e22c6d8da65e10ca2e6105041303d10067d9b0bd163b4e422512d9cf6127bd5
      • Instruction Fuzzy Hash: A7613065A09E4180EA55EF16B9447BAA3B1FB45FBCF894536CE1C07394CF38D4AAC321
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ConsoleErrorLastWrite$ByteCharFreeHeapMultiWide
      • String ID:
      • API String ID: 271091963-0
      • Opcode ID: 429d2fe4f8fc218a77b38f4bcedadf7481245324a3c5be18c175e49f5f940461
      • Instruction ID: 5fa86d927dd2a9ea7149b90be06743c98fba8435a2561f55b0327a75766e2d38
      • Opcode Fuzzy Hash: 429d2fe4f8fc218a77b38f4bcedadf7481245324a3c5be18c175e49f5f940461
      • Instruction Fuzzy Hash: 87A1D076A08E4181E7549F15E45437AA3B0EB98B68FA48231DE8E433D4DF3CE4AAC310
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ArrayDataErrorInfoSafe$AccessUnaccess
      • String ID:
      • API String ID: 1451478150-0
      • Opcode ID: e9d297c6be2ede8681503d80009022dad66925c03d1df27faf81eb65b374f2c5
      • Instruction ID: f99edfcb2a7e43e14a4f5607618903a6ea1da663cdb9790d1f79f612468c56ea
      • Opcode Fuzzy Hash: e9d297c6be2ede8681503d80009022dad66925c03d1df27faf81eb65b374f2c5
      • Instruction Fuzzy Hash: AD51B172A18E8181EB14AF11E4547BEA7B0FB557A8F84853ADE5E47780DF7CD05AC320
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: AddressFreeHandleLibraryModuleProc
      • String ID: CorExitProcess$mscoree.dll
      • API String ID: 4061214504-1276376045
      • Opcode ID: 8ad75c9b2001095171fbc87dbc4ba10c95cbb3bbe63332794da30d7c3c5a1d91
      • Instruction ID: 7870c9813446732ffaa08acb72a04bd6e159d9d047fff5ae63a7e94121d82f56
      • Opcode Fuzzy Hash: 8ad75c9b2001095171fbc87dbc4ba10c95cbb3bbe63332794da30d7c3c5a1d91
      • Instruction Fuzzy Hash: 7AF0A465B18E4282EF84AF61F45037AA3B0EF98BA8F885035DD4F06658DE3CD45EC720
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 2a135943541c8766e215c940362d333d62093623cb3c270acde4c0a8d731f3e9
      • Instruction ID: ea913f14cf6053ec228d48e2185b9266140ba9f8222eac21d9992e445a1fc6b6
      • Opcode Fuzzy Hash: 2a135943541c8766e215c940362d333d62093623cb3c270acde4c0a8d731f3e9
      • Instruction Fuzzy Hash: 51A1C462A08B6245FB71AF71941037AE6A1AF507F8F844631DE6D067C5DF3CD62AC321
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: 3f84e64e143d9820fc32c732a1f48943f3932278dabc228925a7de9aac275e89
      • Instruction ID: 50de0c9d8273aeedd729f01b40c16137e2ce3bc7ecfb20eade73dfc4dbbec15b
      • Opcode Fuzzy Hash: 3f84e64e143d9820fc32c732a1f48943f3932278dabc228925a7de9aac275e89
      • Instruction Fuzzy Hash: 2581C136E18A2255F754EF7588406BEA6B1AF45BBCF804235CD4E52791DE38A52BC320
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FileWrite$ByteCharConsoleErrorLastMultiWide
      • String ID:
      • API String ID: 3659116390-0
      • Opcode ID: 719cbbc18990bedbb18da9ed8cab8098de0ad74b27520897d8bcb39dd9f2865c
      • Instruction ID: fae1e8dd494585ebb4a1574b5cdf9ed3dc634c1efa77d229a12f5b032fafd5b7
      • Opcode Fuzzy Hash: 719cbbc18990bedbb18da9ed8cab8098de0ad74b27520897d8bcb39dd9f2865c
      • Instruction Fuzzy Hash: EA51A036A14A6185E710DF75D4443AEBBB0FB457ACF848135CE8A47B98DF38D26AC720
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeHeap
      • String ID:
      • API String ID: 3298025750-0
      • Opcode ID: a5c8f169a7d2f0cbf1286d3dd229f6c211e02dd5ad703b26aa0e0baae3315f32
      • Instruction ID: 58ba966ec814e57f0069e7ddc13a4f32384d719e48bda92a2e7353dd88297756
      • Opcode Fuzzy Hash: a5c8f169a7d2f0cbf1286d3dd229f6c211e02dd5ad703b26aa0e0baae3315f32
      • Instruction Fuzzy Hash: CF511F25A08E4280F664EF06E44437AA3B1FB897A8F944035CE4D477A5DF3CE4AAC321
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorLast$DirectoryFreeHeapSystem
      • String ID:
      • API String ID: 696374338-0
      • Opcode ID: 97ec37e43301fee58b96359254ef66bed1fdc19a103305fd7a7aedbeba9cf76e
      • Instruction ID: 9a1fa27aece7b06d3cb158a5b6a03d909ded743f3f0ca9a20c9601b71e93bc32
      • Opcode Fuzzy Hash: 97ec37e43301fee58b96359254ef66bed1fdc19a103305fd7a7aedbeba9cf76e
      • Instruction Fuzzy Hash: F831B425A08E92C1F7746F25945437BA2A0BB14778FA44235DD5E83ACCDE6CF49AC360
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: _set_statfp
      • String ID:
      • API String ID: 1156100317-0
      • Opcode ID: acc3ac3db6f420b8ce4dd437937ea7c4908a5afd762a9fd16bbaf05600465055
      • Instruction ID: 6b0d78d9c2d60c4b6c4ac918820dd129b8a14422e1b85f11f2d940e8b1264ff8
      • Opcode Fuzzy Hash: acc3ac3db6f420b8ce4dd437937ea7c4908a5afd762a9fd16bbaf05600465055
      • Instruction Fuzzy Hash: 3911B13AE18E2385FA2C3934D44937791316F403F8F844730EEA9161D68E1C566BC160
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ArrayDataErrorInfoSafeString$AccessUnaccess
      • String ID:
      • API String ID: 1557863903-3916222277
      • Opcode ID: c88dc68ecb0d1db77c17268bc4056e443a85f1a48cc954189e8b7b691a010998
      • Instruction ID: 921dc66ae6848e4568175d1dbee885b31160123061b2d74424ad438850b6a1f0
      • Opcode Fuzzy Hash: c88dc68ecb0d1db77c17268bc4056e443a85f1a48cc954189e8b7b691a010998
      • Instruction Fuzzy Hash: C2613A2291CBC182E6719F25B1403ABE3A0FB95758F849125DFCD02A96DF7CE19ACB50
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ByteCharErrorFileLastMultiWideWrite
      • String ID: U
      • API String ID: 2456169464-4171548499
      • Opcode ID: 3f509cf637140e699c61dbaf545df12fbaaa146e68ca4ec2491fd70597743d5f
      • Instruction ID: 3dc90fe2240e3ac1f617c886b4fc54c29cd2cd600a68ed141e51931ac6145a7a
      • Opcode Fuzzy Hash: 3f509cf637140e699c61dbaf545df12fbaaa146e68ca4ec2491fd70597743d5f
      • Instruction Fuzzy Hash: 4441C332A19A5182E760DF25E4053BAA7B0FB88BE8F804031EE8D87748DF3CD516CB50
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorHandleLast
      • String ID: SetThreadDescription$kernel32
      • API String ID: 2586478127-1950310818
      • Opcode ID: fe4288b309e7fbef6374d59babafb229089f34dae923ced2b4bd8aa037e8d8b2
      • Instruction ID: ccb4b87d1c4beb4bee756be3243e76ef68d2369d6110c5a8c45c35acd9baf10d
      • Opcode Fuzzy Hash: fe4288b309e7fbef6374d59babafb229089f34dae923ced2b4bd8aa037e8d8b2
      • Instruction Fuzzy Hash: E421D692F19E4690FA49AF426D400F6D2715F04BF9EE88432DC0C07B94DE3CB46BC2A0
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: CloseHandle$FreeHeap
      • String ID:
      • API String ID: 2735614835-0
      • Opcode ID: 604f775c468aad3ba7f75e8f03208f459edf5ce20fd1715933c3dabe9cb9bfcd
      • Instruction ID: 227bcd74fcc73b0dd38a2e7e84e66ca44c2b2dc1de40c91ac58c0eec384b1d2e
      • Opcode Fuzzy Hash: 604f775c468aad3ba7f75e8f03208f459edf5ce20fd1715933c3dabe9cb9bfcd
      • Instruction Fuzzy Hash: 08419625A09E8241EDA5AF05944C379A2B0EF85BB8FC4023ACD3D57794EF2DE44BC352
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeHeap$AddressSingleWake
      • String ID:
      • API String ID: 2995119335-0
      • Opcode ID: a5fd3ce5d5b542c7f3c20d4e684b4362b03622c873eeb9bae6aa005b821eeca0
      • Instruction ID: 8f9d40ed12301f2747f2ff45346e62dea2e43d4947637cefd19095c266790f94
      • Opcode Fuzzy Hash: a5fd3ce5d5b542c7f3c20d4e684b4362b03622c873eeb9bae6aa005b821eeca0
      • Instruction Fuzzy Hash: F1917025A09D4281FA94AF15A944337E2B1AF15B7CFA80571CE5C563A0EF3CF46BC322
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorLast$DirectorySystem
      • String ID:
      • API String ID: 860285823-0
      • Opcode ID: 65dabdab1f85738be084f83754e8e3568ba0fffc2f45c3433d723a0a8b2c8085
      • Instruction ID: e7a3ff4bd6a147a5de61d0e4df8fb1171ad0ef6cc63a331f12090b3ffc7f7175
      • Opcode Fuzzy Hash: 65dabdab1f85738be084f83754e8e3568ba0fffc2f45c3433d723a0a8b2c8085
      • Instruction Fuzzy Hash: 07516F22A08A91C1E770AF11A4543BBA6B1FB847B8F900235DD9D47BD9CF7CE46AC710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ArrayDataErrorInfoSafe$AccessUnaccess
      • String ID:
      • API String ID: 1451478150-0
      • Opcode ID: b233418013cd02a2e4bc24f94a7350fad37d27bfd8ca7c7c33492e197b35e930
      • Instruction ID: 1f2b283d08b6281ea9db9397cc48846def4c4cddf424cdf55e8e351d06f42088
      • Opcode Fuzzy Hash: b233418013cd02a2e4bc24f94a7350fad37d27bfd8ca7c7c33492e197b35e930
      • Instruction Fuzzy Hash: D341D032A18E8186EB54DF26E05477EB7A0FB55768F848239CB4A07A80DF7CE059C720
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Address$SingleWake$ErrorLastWait
      • String ID:
      • API String ID: 1609941449-0
      • Opcode ID: a4d5a98216b76fd1b6661c3ae7c93c22af50d8349565ab91706f02704ee29fa1
      • Instruction ID: 1dcc477e63b80fcb83e666663d62b097993009b4291a103fb4aa07ecabd5df82
      • Opcode Fuzzy Hash: a4d5a98216b76fd1b6661c3ae7c93c22af50d8349565ab91706f02704ee29fa1
      • Instruction Fuzzy Hash: 9151C22291CEC181F761EF25A90077AA7A0E7A5BACF449135DE8D07256CF3CE1DAC750
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ArrayDataErrorInfoSafe$AccessUnaccess
      • String ID:
      • API String ID: 1451478150-0
      • Opcode ID: 2712e1397dc9877b4be4a413f005525f4763aa971cca74807003f9150f7c70ba
      • Instruction ID: 9e5b64b4b14a9c0fd49b7fbe8f259d535315d0178dcb7dda24cc09bffe172707
      • Opcode Fuzzy Hash: 2712e1397dc9877b4be4a413f005525f4763aa971cca74807003f9150f7c70ba
      • Instruction Fuzzy Hash: 5841D272A18E8182EB549F21E4547BEA7A4FB157A8F848139CF9A47780DF7CD069C320
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ArrayDataErrorInfoSafe$AccessUnaccess
      • String ID:
      • API String ID: 1451478150-0
      • Opcode ID: 0469e7bf688aaa21385f130966428af5ec834611c1888b24aed53a0957f4474d
      • Instruction ID: 73e61e4ff34a63253da915a2f11e7cbe3fc1a2ba5313cfe10574f45f6a79b213
      • Opcode Fuzzy Hash: 0469e7bf688aaa21385f130966428af5ec834611c1888b24aed53a0957f4474d
      • Instruction Fuzzy Hash: 7F41D172A19A8186EB559F21E0547BEB7B0FB51768F848639CF5A07780DF7CE069C320
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ArrayDataErrorInfoSafe$AccessUnaccess
      • String ID:
      • API String ID: 1451478150-0
      • Opcode ID: 8eda1155e8629288c2daca216309719416c45d74798263c3a865e7b4483a2aa0
      • Instruction ID: 0b4a01b8439cb9efbb6ff8bf38e5234ecac65665c63e53879b52ca8f0d79bd04
      • Opcode Fuzzy Hash: 8eda1155e8629288c2daca216309719416c45d74798263c3a865e7b4483a2aa0
      • Instruction Fuzzy Hash: 2241C062A18E8182EB559F61E05477FA7B4FF15768F808179CB5A47680DF7CD06AC320
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ArrayDataErrorInfoSafe$AccessUnaccess
      • String ID:
      • API String ID: 1451478150-0
      • Opcode ID: 6ca9d58d07348689f3375048a7a0c446f2e361dddb571042583b13a1b492846a
      • Instruction ID: 59a466865994451c70c90abfb615d21ba20460383a380fe8118e3c4f0a4c159a
      • Opcode Fuzzy Hash: 6ca9d58d07348689f3375048a7a0c446f2e361dddb571042583b13a1b492846a
      • Instruction Fuzzy Hash: 4541D672A28E8182EB55DF25E05437EA7B0FF56768F808239DB5A17680DF7CD099C320
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ArrayDataErrorInfoSafe$AccessUnaccess
      • String ID:
      • API String ID: 1451478150-0
      • Opcode ID: 77a66249446af70903ebf470f482a297c23eb81fc97dbb67ba6592974c30eea5
      • Instruction ID: 9f302682ac4b9f7c5792eaec795792f5fccd1f41c8911e1e15d8c69dadc74928
      • Opcode Fuzzy Hash: 77a66249446af70903ebf470f482a297c23eb81fc97dbb67ba6592974c30eea5
      • Instruction Fuzzy Hash: 2741BD72A19E8186EB549F21E05437EB7A0FB557A8F848239CF5A07780DF7CE059C760
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ArrayDataErrorInfoSafe$AccessUnaccess
      • String ID:
      • API String ID: 1451478150-0
      • Opcode ID: 7768938dae23807fd30a69f7977739c6a21227e38bdead711a7cecf92f3f4624
      • Instruction ID: 9180b5ea4312f772a93b5a804d582340534bb7a0f1bb280b8da0b42b3f9b8a3a
      • Opcode Fuzzy Hash: 7768938dae23807fd30a69f7977739c6a21227e38bdead711a7cecf92f3f4624
      • Instruction Fuzzy Hash: 6B41D0A2A19E8182EB559F61E05477EA3B0FF15768F808139CB4A47AC0EF7CD069C320
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ArrayDataErrorInfoSafe$AccessUnaccess
      • String ID:
      • API String ID: 1451478150-0
      • Opcode ID: 9e0d51dcfc0545f2b543adc0b166927530af7f31deb9a641adf30ad7243433b8
      • Instruction ID: 98ba99584ea333f67e71642c2dac659d88de7370b57a3004f3b534faba39890a
      • Opcode Fuzzy Hash: 9e0d51dcfc0545f2b543adc0b166927530af7f31deb9a641adf30ad7243433b8
      • Instruction Fuzzy Hash: 5541F362A1DBC086EB559F21A45437EABA4FB12368F848179CF8A077C1DF7CD069C320
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ArrayDataErrorInfoSafe$AccessUnaccess
      • String ID:
      • API String ID: 1451478150-0
      • Opcode ID: 85ec932f659e36c967b55d6ed7fb15e434c223552750cfdc22291edf26fa4d94
      • Instruction ID: 682fe0cd9dbca64a2e39c1483047f1acde9565af024d2ab9d7e14d197b8ef573
      • Opcode Fuzzy Hash: 85ec932f659e36c967b55d6ed7fb15e434c223552750cfdc22291edf26fa4d94
      • Instruction Fuzzy Hash: B641F662A1DAC085EB559F21A45437EABB4FB11768F848179CF8A077C1DF7CD059C320
      APIs
      • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF71943122B,?,?,?,00007FF71942EDF7), ref: 00007FF719435281
      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF71943122B,?,?,?,00007FF71942EDF7), ref: 00007FF7194352E3
      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF71943122B,?,?,?,00007FF71942EDF7), ref: 00007FF71943531D
      • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF71943122B,?,?,?,00007FF71942EDF7), ref: 00007FF719435347
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ByteCharEnvironmentMultiStringsWide$Free
      • String ID:
      • API String ID: 1557788787-0
      • Opcode ID: 96906dac914c5d79378c785f57b2a5b4198e1e8d794d649651befd41343bc211
      • Instruction ID: b1051381656317ca4f1d721f9a72d2f3d731141e24aa27c075d8ffa6012fd0c9
      • Opcode Fuzzy Hash: 96906dac914c5d79378c785f57b2a5b4198e1e8d794d649651befd41343bc211
      • Instruction Fuzzy Hash: B5216F21F08F6181E664AF22A40002EF6B5BF54BE4B884134DE8E63B98DF7CE567C750
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeHeap$Thread$CurrentDescription
      • String ID:
      • API String ID: 930939367-0
      • Opcode ID: 5ba36cb3acf3c7e7d388377a9c96a1f8eeb0506e609df2f50faaf38a376364be
      • Instruction ID: 3dceb298c0cabaeff0b444898d79bce20a09bdeb2dbdb4242261eb8e999cf68c
      • Opcode Fuzzy Hash: 5ba36cb3acf3c7e7d388377a9c96a1f8eeb0506e609df2f50faaf38a376364be
      • Instruction Fuzzy Hash: 1D21712570CE4540EA54AF16A5042BBA3B1FB89BE8F844132DE4D43754DE3CE09AC751
      APIs
      • GetLastError.KERNEL32(?,?,?,00007FF71943233D,?,?,?,?,?,?,?,00007FF719431CE9), ref: 00007FF719432F4A
      • SetLastError.KERNEL32(?,?,?,00007FF71943233D,?,?,?,?,?,?,?,00007FF719431CE9), ref: 00007FF719432FB2
      • SetLastError.KERNEL32(?,?,?,00007FF71943233D,?,?,?,?,?,?,?,00007FF719431CE9), ref: 00007FF719432FC8
      • abort.LIBCMT ref: 00007FF719432FCE
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorLast$abort
      • String ID:
      • API String ID: 1447195878-0
      • Opcode ID: 8c4c7ae263a411009b50842c4ae19e061d9cdaf03a431022a05234066bb798d6
      • Instruction ID: c1d1f3499e21f964f054a3988999d75ce2c2d493d6f3175d246784b1a35d0afa
      • Opcode Fuzzy Hash: 8c4c7ae263a411009b50842c4ae19e061d9cdaf03a431022a05234066bb798d6
      • Instruction Fuzzy Hash: 91017914B08E6342FA587F30911513AA1B15F687F8F940538EC0E027C6ED2CE66BC220
      APIs
      Strings
      • C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe, xrefs: 00007FF7194309B1
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FileModuleName_invalid_parameter_noinfo
      • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.2890.22012.exe
      • API String ID: 3307058713-2976275561
      • Opcode ID: 2cb6af66799282c28b3ae81ca4b1448fa77e54f869e87fb80d816531250c722b
      • Instruction ID: 542f02989390a99e7e37d9a5c37944e421b806c456ac50435ee4baef44681f66
      • Opcode Fuzzy Hash: 2cb6af66799282c28b3ae81ca4b1448fa77e54f869e87fb80d816531250c722b
      • Instruction Fuzzy Hash: FF416E36A18E2285F714BF35A4400BAA7B4EF54BE8BD44235ED4E47B45DE3CE56AC320
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeHeap
      • String ID:
      • API String ID: 3298025750-0
      • Opcode ID: 2413cbd768be31ab29fc4464c6f2fc475fc70107517709abfdd608485f533fcb
      • Instruction ID: ad4551450c823d3bc9d2d1ae8212c71ef922498941ec55ed4e43425f129275f6
      • Opcode Fuzzy Hash: 2413cbd768be31ab29fc4464c6f2fc475fc70107517709abfdd608485f533fcb
      • Instruction Fuzzy Hash: 9081A322A19F8181E6519B1994043FAA370BB457B9F898331DEBC167D1DF39D49BC350
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1823456841.00007FF7193F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7193F0000, based on PE: true
      • Associated: 00000000.00000002.1823436966.00007FF7193F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823504103.00007FF71943F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823584926.00007FF7194D8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823610690.00007FF7194DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1823636795.00007FF7194DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7193f0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeHeap
      • String ID:
      • API String ID: 3298025750-0
      • Opcode ID: bbd5740b09c0ea2fd7747fcd1db78b812c2b2e1f8e1f08b3e7dc715fb1686647
      • Instruction ID: 9eaf5d5750052c9164c7fa26349f08782593588e8ba1ec6bbdf2de92ecbe121f
      • Opcode Fuzzy Hash: bbd5740b09c0ea2fd7747fcd1db78b812c2b2e1f8e1f08b3e7dc715fb1686647
      • Instruction Fuzzy Hash: 91414126605E4181E665DF12B5407ABA3B1FB98BA8F884435CF9D43750DF3CF4A6C220