Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe
Analysis ID:1546294
MD5:3722d2ad2f7e099039229456b7472711
SHA1:c47a0ee5139f2da6f90dd3f84b447c3bc3553c67
SHA256:b45d4d18149c6ba9966559208f3c5303dd9b20eeb43d5cf75aba272f2021364e
Tags:Amadeyexe
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Sigma detected: Execution from Suspicious Folder
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: WScript or CScript Dropper
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Abnormal high CPU Usage
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found large amount of non-executed APIs
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory

Classification

  • System is w10x64
  • wscript.exe (PID: 3064 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\CalibreLauncher.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • calibre.exe (PID: 5644 cmdline: "C:\Users\Public\Documents\calibre.exe" MD5: 853D888553D002A04484C098A3D7045F)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Users\Public\Documents\calibre.exe, CommandLine: C:\Users\Public\Documents\calibre.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\Documents\calibre.exe, NewProcessName: C:\Users\Public\Documents\calibre.exe, OriginalFileName: C:\Users\Public\Documents\calibre.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe, ParentProcessId: 2876, ParentProcessName: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe, ProcessCommandLine: C:\Users\Public\Documents\calibre.exe, ProcessId: 1396, ProcessName: calibre.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\CalibreLauncher.js" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\CalibreLauncher.js" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\CalibreLauncher.js" , ProcessId: 3064, ProcessName: wscript.exe
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\CalibreLauncher.js" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\CalibreLauncher.js" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\CalibreLauncher.js" , ProcessId: 3064, ProcessName: wscript.exe
Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\CalibreLauncher.js" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\CalibreLauncher.js" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\CalibreLauncher.js" , ProcessId: 3064, ProcessName: wscript.exe

Data Obfuscation

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\Public\Documents\calibre.exe, ProcessId: 1396, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Calibre.url
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeAvira: detected
Source: C:\Users\Public\Documents\calibre-launcher.dllAvira: detection malicious, Label: TR/Dldr.Deyma.haljq
Source: C:\Users\Public\Documents\calibre-launcher.dllReversingLabs: Detection: 66%
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeReversingLabs: Detection: 47%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: Joe Sandbox ViewIP Address: 45.202.35.101 45.202.35.101
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe, calibre.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe, calibre.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe, calibre.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe, calibre.exe.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe, calibre.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe, calibre.exe.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe, calibre.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe, calibre.exe.0.drString found in binary or memory: http://ocsp.digicert.com0N
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe, calibre.exe.0.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe, calibre.exe.0.drString found in binary or memory: http://s.symcd.com06
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe, calibre.exe.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe, calibre.exe.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe, calibre.exe.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe, calibre.exe.0.drString found in binary or memory: https://calibre-ebook.com
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe, calibre.exe.0.drString found in binary or memory: https://d.symcb.com/cps0%
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe, calibre.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe, calibre.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0.
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe, calibre.exe.0.drString found in binary or memory: https://www.digicert.com/CPS0

System Summary

barindex
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
Source: C:\Users\Public\Documents\calibre.exeProcess Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B8948D0 NtWriteFile,WaitForSingleObject,0_2_00007FF63B8948D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B8947B0 NtReadFile,WaitForSingleObject,RtlNtStatusToDosError,0_2_00007FF63B8947B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B8517B00_2_00007FF63B8517B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B8C64F00_2_00007FF63B8C64F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B8585000_2_00007FF63B858500
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B89E5300_2_00007FF63B89E530
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B87F5200_2_00007FF63B87F520
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B8D14500_2_00007FF63B8D1450
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B8E94900_2_00007FF63B8E9490
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B996CB20_2_00007FF63B996CB2
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B8534100_2_00007FF63B853410
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B8574000_2_00007FF63B857400
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B887C300_2_00007FF63B887C30
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B858C200_2_00007FF63B858C20
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B8A13700_2_00007FF63B8A1370
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B885B700_2_00007FF63B885B70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B89F3100_2_00007FF63B89F310
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B8802400_2_00007FF63B880240
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B85AAA00_2_00007FF63B85AAA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B8DC9D00_2_00007FF63B8DC9D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B85CA100_2_00007FF63B85CA10
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B8E39700_2_00007FF63B8E3970
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B8821800_2_00007FF63B882180
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B8648F00_2_00007FF63B8648F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B85E0F00_2_00007FF63B85E0F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B85C9350_2_00007FF63B85C935
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B85A1300_2_00007FF63B85A130
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B8CB8800_2_00007FF63B8CB880
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B9987CF0_2_00007FF63B9987CF
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B88D7E00_2_00007FF63B88D7E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B8DB7600_2_00007FF63B8DB760
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B8E5F900_2_00007FF63B8E5F90
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B85BF900_2_00007FF63B85BF90
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B884EC00_2_00007FF63B884EC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B85D6370_2_00007FF63B85D637
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B8DAE800_2_00007FF63B8DAE80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B85D6A80_2_00007FF63B85D6A8
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B85B5500_2_00007FF63B85B550
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B857D700_2_00007FF63B857D70
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeStatic PE information: Number of sections : 11 > 10
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe, 00000000.00000000.2110369412.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamecalibre.exe0 vs SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeBinary or memory string: OriginalFilenamecalibre.exe0 vs SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe
Source: classification engineClassification label: mal100.expl.evad.winEXE@6/6@0/1
Source: C:\Users\Public\Documents\calibre.exeCode function: 4_2_000B121C GetProcAddress,GetLastError,FormatMessageW,LocalFree,4_2_000B121C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeFile created: C:\Users\Public\Documents\calibre.exeJump to behavior
Source: C:\Users\Public\Documents\calibre.exeMutant created: \Sessions\1\BaseNamedObjects\vDbXW
Source: C:\Users\Public\Documents\calibre.exeMutant created: \Sessions\1\BaseNamedObjects\2f985c58743b38fb2171f673f820cbba
Source: C:\Users\Public\Documents\calibre.exeFile created: C:\Users\user\AppData\Local\Temp\WikG.zipJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeReversingLabs: Detection: 47%
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeString found in binary or memory: Failed to get the calibre-launcher dll entry point
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeString found in binary or memory: calibre-launcher.dll
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeString found in binary or memory: Failed to load: calibre-launcher.dll
Source: calibre.exeString found in binary or memory: calibre-launcher.dll
Source: calibre.exeString found in binary or memory: Failed to get the calibre-launcher dll entry point
Source: calibre.exeString found in binary or memory: Failed to load: calibre-launcher.dll
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeString found in binary or memory: calibre.execalibre-launcher.dllMZ
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeString found in binary or memory: Installation directory path too longExecutable path has no path separatorsapp\bin%sFailed to set DLL directoryucrtbase.dllUnable to find ucrtbase.dll. You should install all Windows updates on your computer to get this file.calibre-launcher.dllFailed to load: calibre-launcher.dllexecute_python_entrypointFailed to get the calibre-launcher dll entry pointsimple_printcalibrecalibre.gui_launch
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeProcess created: C:\Users\Public\Documents\calibre.exe C:\Users\Public\Documents\calibre.exe
Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\CalibreLauncher.js"
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\Public\Documents\calibre.exe "C:\Users\Public\Documents\calibre.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeProcess created: C:\Users\Public\Documents\calibre.exe C:\Users\Public\Documents\calibre.exeJump to behavior
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\Public\Documents\calibre.exe "C:\Users\Public\Documents\calibre.exe" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeSection loaded: calibre-launcher.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeSection loaded: calibre-launcher.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\Public\Documents\calibre.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeStatic file information: File size 3107319 > 1048576
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x200200
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\Public\Documents\calibre.exeCode function: 4_2_000B108C GetModuleFileNameW,wsprintfW,SetDllDirectoryW,LoadLibraryW,LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,4_2_000B108C
Source: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeStatic PE information: section name: .xdata
Source: calibre-launcher.dll.0.drStatic PE information: section name: .eh_fram
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeFile created: C:\Users\Public\Documents\calibre-launcher.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeFile created: C:\Users\Public\Documents\calibre.exeJump to dropped file
Source: C:\Users\Public\Documents\calibre.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Calibre.urlJump to behavior
Source: C:\Users\Public\Documents\calibre.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Calibre.urlJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\calibre.exeThread delayed: delay time: 180000Jump to behavior
Source: C:\Users\Public\Documents\calibre.exeThread delayed: delay time: 180000Jump to behavior
Source: C:\Users\Public\Documents\calibre.exeThread delayed: delay time: 180000Jump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeAPI coverage: 5.1 %
Source: C:\Users\Public\Documents\calibre.exe TID: 5444Thread sleep time: -6000000s >= -30000sJump to behavior
Source: C:\Users\Public\Documents\calibre.exe TID: 5432Thread sleep time: -360000s >= -30000sJump to behavior
Source: C:\Users\Public\Documents\calibre.exe TID: 1628Thread sleep time: -180000s >= -30000sJump to behavior
Source: C:\Users\Public\Documents\calibre.exe TID: 1628Thread sleep time: -180000s >= -30000sJump to behavior
Source: C:\Users\Public\Documents\calibre.exe TID: 5444Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\Public\Documents\calibre.exeLast function: Thread delayed
Source: C:\Users\Public\Documents\calibre.exeThread delayed: delay time: 30000Jump to behavior
Source: C:\Users\Public\Documents\calibre.exeThread delayed: delay time: 180000Jump to behavior
Source: C:\Users\Public\Documents\calibre.exeThread delayed: delay time: 180000Jump to behavior
Source: C:\Users\Public\Documents\calibre.exeThread delayed: delay time: 180000Jump to behavior
Source: C:\Users\Public\Documents\calibre.exeThread delayed: delay time: 30000Jump to behavior
Source: wscript.exe, 00000003.00000002.2250035011.000001DDF2591000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0
Source: wscript.exe, 00000003.00000002.2250035011.000001DDF2591000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: wscript.exe, 00000003.00000002.2250035011.000001DDF2591000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
Source: C:\Users\Public\Documents\calibre.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeCode function: 4_2_000B108C GetModuleFileNameW,wsprintfW,SetDllDirectoryW,LoadLibraryW,LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,4_2_000B108C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63B851180 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_initterm,0_2_00007FF63B851180
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeCode function: 0_2_00007FF63BB01B88 SetUnhandledExceptionFilter,0_2_00007FF63BB01B88
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeNtWriteFile: Indirect: 0x7FF63B894946Jump to behavior
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\Public\Documents\calibre.exe "C:\Users\Public\Documents\calibre.exe" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exeQueries volume information: C:\Users\Public\Documents VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\Public\Documents VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\Public\Documents\calibre.exe VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\calibre.exeQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Windows\System32\wscript.exeDirectory queried: C:\Users\Public\DocumentsJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts2
Command and Scripting Interpreter
1
Scripting
11
Process Injection
1
Masquerading
OS Credential Dumping11
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
2
Registry Run Keys / Startup Folder
1
Abuse Elevation Control Mechanism
1
Disable or Modify Tools
LSASS Memory1
Process Discovery
Remote Desktop Protocol1
Data from Local System
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
DLL Side-Loading
2
Registry Run Keys / Startup Folder
21
Virtualization/Sandbox Evasion
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
11
Process Injection
NTDS11
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Abuse Elevation Control Mechanism
LSA Secrets12
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe47%ReversingLabsWin64.Trojan.Generic
SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe100%AviraTR/AVI.Agent.aeapp
SourceDetectionScannerLabelLink
C:\Users\Public\Documents\calibre-launcher.dll100%AviraTR/Dldr.Deyma.haljq
C:\Users\Public\Documents\calibre-launcher.dll67%ReversingLabsWin32.Ransomware.Zombie
C:\Users\Public\Documents\calibre.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://calibre-ebook.comSecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe, calibre.exe.0.drfalse
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    45.202.35.101
    unknownSeychelles
    139086ONL-HKOCEANNETWORKLIMITEDHKfalse
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1546294
    Start date and time:2024-10-31 18:26:06 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 7m 59s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:7
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe
    Detection:MAL
    Classification:mal100.expl.evad.winEXE@6/6@0/1
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 97%
    • Number of executed functions: 11
    • Number of non-executed functions: 72
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Override analysis time to 240000 for current running targets taking high CPU consumption
    • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtProtectVirtualMemory calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • Skipping network analysis since amount of network traffic is too extensive
    • VT rate limit hit for: SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe
    TimeTypeDescription
    13:27:04API Interceptor10738817x Sleep call for process: calibre.exe modified
    18:27:08AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Calibre.url
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    45.202.35.1014b7b5bc7b0d1f70adf6b80390f1273723c409b837c957.dllGet hashmaliciousUnknownBrowse
    • 45.202.35.101/pLQvfD4d5/index.php?scr=1
    file.exeGet hashmaliciousAmadeyBrowse
    • 45.202.35.101/pLQvfD4d/index.php
    file.exeGet hashmaliciousRDPWrap Tool, Amadey, Socks5Systemz, Stealc, Vidar, XmrigBrowse
    • 45.202.35.101/pLQvfD4d/index.php
    file.exeGet hashmaliciousAmadeyBrowse
    • 45.202.35.101/pLQvfD4d/index.php
    file.exeGet hashmaliciousAmadeyBrowse
    • 45.202.35.101/pLQvfD4d/index.php
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    ONL-HKOCEANNETWORKLIMITEDHKtppc.elfGet hashmaliciousMiraiBrowse
    • 156.249.107.39
    garm5.elfGet hashmaliciousMiraiBrowse
    • 156.249.107.42
    gppc.elfGet hashmaliciousMiraiBrowse
    • 156.249.107.35
    splx86.elfGet hashmaliciousUnknownBrowse
    • 45.202.74.210
    harm6.elfGet hashmaliciousMiraiBrowse
    • 156.249.107.25
    IOmQOw6dHu.exeGet hashmaliciousMetasploitBrowse
    • 45.202.35.85
    80P52RWkMs.exeGet hashmaliciousMetasploitBrowse
    • 45.202.35.85
    la.bot.mips.elfGet hashmaliciousUnknownBrowse
    • 156.249.107.57
    sample.binGet hashmaliciousOkiruBrowse
    • 45.202.35.64
    gppc.elfGet hashmaliciousMiraiBrowse
    • 156.249.107.11
    No context
    No context
    Process:C:\Users\Public\Documents\calibre.exe
    File Type:ASCII text
    Category:dropped
    Size (bytes):103
    Entropy (8bit):4.852057801022138
    Encrypted:false
    SSDEEP:3:qsYYFRiMILzHMZm7AX+rSF55cGdAl+pCwJMe:qs1qrEm7Dy3dAWJMe
    MD5:8486D6BD6C65F7FAB3BDF24FD9B715CB
    SHA1:2937534C0F81BB1F0E7D217F2DC0BACD1C89FCE9
    SHA-256:537AB7D9F2E639C83D0E1AA672A2D0D8556E6EB12CEB41A7897C907A5D3479DC
    SHA-512:C314E2FD599D264CE0C072192693726A49276DFCC9DB77B46164893430ABC5B8773734CF140ECE8E3B396FAE12E6A676938C9C78907EC9DA9717DE6688638497
    Malicious:true
    Reputation:low
    Preview:var shell = new ActiveXObject("WScript.Shell");.shell.Run("C:\\Users\\Public\\Documents\\calibre.exe");
    Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe
    File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
    Category:dropped
    Size (bytes):1875616
    Entropy (8bit):7.129043597661067
    Encrypted:false
    SSDEEP:49152:zxx6EC4qHIDW+kEFYs8MW39W0CTvEtUAEo8:4ADWPEFYkWvyEtUAEo8
    MD5:374FBD650936435626A9940406662FFD
    SHA1:D7FD20E2B2805883EB97BD383CCB24E8B62FEA32
    SHA-256:4B7B5BC7B0D1F70ADF6B80390F1273723C409B837C9575EE1CD4B963CF9E5C7D
    SHA-512:1F3D40E2C6FED4353B60E09300E0BFABF7C4847B0C3584D5D21442CE950E9FD35708F7EC443CCB3DBD566B22CCF48373EAF76AF5374144FD6B1CAE17FAF043CA
    Malicious:true
    Antivirus:
    • Antivirus: Avira, Detection: 100%
    • Antivirus: ReversingLabs, Detection: 67%
    Reputation:low
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.^........&#...&.....Z......................................................\.....@... .............................. ...............................`..Lb..........................hU......................($..`............................text...............................`..`.data...............................@....rdata..............................@..@.eh_fram.....p.......N..............@..@.bss.....................................edata..............................@..@.idata....... ......................@....CRT....4....@......................@....tls.........P......................@....reloc..Lb...`...d..................@..B................................................................................................................................................................................................................................
    Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe
    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):65472
    Entropy (8bit):6.069013718964596
    Encrypted:false
    SSDEEP:1536:Kp7+J62CmRRs2RGyUYoz5TjSGC1psqyl3ht0:07j2Ju2QCoz5PSd1CdJ0
    MD5:853D888553D002A04484C098A3D7045F
    SHA1:D275AB06CC89DB7293F9575D24DD83DCB41F56CA
    SHA-256:64BDDE10CFFF243A25B021296773816057DB1620DF56EBD4DB9178DCB88D2EAA
    SHA-512:FF3F4C48EEDA7379ED6CE4A4C6456342EBCDC6751FCC15225D85066C19EE33EFFA52A9FA6298F8462AE5A6964E27E7D490AB31B6E3DB8DF3D8AA1DCE967C6DDC
    Malicious:true
    Antivirus:
    • Antivirus: ReversingLabs, Detection: 0%
    Reputation:low
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................|......|.I......!....|......Rich...........................PE..L.....a............................l........ ....@..........................0............@..................................$..<....@....................... ..`....#............................................... ..@............................text............................... ..`.rdata....... ......................@..@.data........0......................@....rsrc........@......................@..@.reloc..`.... ......................@..B........................................................................................................................................................................................................................................................................................................................................
    Process:C:\Users\Public\Documents\calibre.exe
    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
    Category:dropped
    Size (bytes):98470
    Entropy (8bit):7.881390022741581
    Encrypted:false
    SSDEEP:1536:CLjxMeVHb/brbrXVgIbd+LPjR/wpB/APlQrtMx4ggP9lA9oQOAW7twNw:EqeV7b/hELrRI6P2rGqggFCMAW2u
    MD5:EAB97AFF6E10A22D48E96558366CA74C
    SHA1:5EB08EF394278512532F556C368AB35CCBBA5510
    SHA-256:D4A20B50D5DC218798A7633B36A017C64B9ED30E6BD542D065C32A16BA33B153
    SHA-512:705747A4F207404E2267333DB7A544F2F4EF1102A796DB7B67B55B786AABE3E45445E82968462FBFA19FF75737F9C17350B33B18CA65402AEBABFFA3506BBB3D
    Malicious:false
    Reputation:low
    Preview:......JFIF.....`.`.....C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...(..?3.*..m..,.X.c.#....O.*.i.....w...._.#.z..p.....MR...%.f..r.....Uf.....?.2......S.]9o..s......T..W6.y.:.....CPWJi......%-....Z(.(..<.t..A...#'..N>.._.u.......^y.[......1..].+..B....%?........r.....{f`.'(Xw...&e.......Q...8X.V..._.^.(..(...&(.......|Am{.....;..qy..p.'. .......1..T.Z.3o...?..r|.9...>H.].s=].J..G+Ez..+.....+..&%......u._......Uy..........
    Process:C:\Users\Public\Documents\calibre.exe
    File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
    Category:dropped
    Size (bytes):437334
    Entropy (8bit):7.937476740474522
    Encrypted:false
    SSDEEP:6144:oV2qcyBMNd5NIjt2Bb+Zzfl9C8Ar5+zsGxPA3cYhHjlpzzDAH93uF+G8hhFe8JOT:oHMZCoN+ZLHqrX+fYZzQd3Q8ha2w
    MD5:6BC43168B53411F432B1FC8D811E2E50
    SHA1:64FF05095F5AD2CBE5ECEA8E8DCE50FC53A373E5
    SHA-256:4067D756583BB1BEC8D76E83E6252F50BDD2E84BDAA7DC90AB891AC719F8654D
    SHA-512:94DF56B72F976448A92150D573D19F9319C6D02CD971D2A5303E4F48C2102454C637235004E06FE75DBD9498315B1B03167668F7D9681C7F88D2E98D954A5FD6
    Malicious:false
    Reputation:low
    Preview:PK........9.MYy.m............CRT.zlib.y8.....bIE.4.T.,I...K.T.!Y&1h.In....lI...R"..-S..,cP.Rd...wR3u....?.....;.{.{..=.93....R...U...a.q....4.&7...6...$d..K..D..'....0.....~t<....f.......$.yI..x..`.K.k..T.E.e.7...I.L.o6...............m.2.......n..."......Y..K.oz..hL.....v>..i...$..'.M.LX.IQ.g."m.U:...B3E...........<1...X.+....A...h..B....jR.Q9{i...[.X.z}J..Lz%v^..?/..u6EQF...J.yG.....3SV=/\.......\.lWI...8.C\[.,.w!..4...p}k-.l....S..._.w5.*(.8....D\m..-..J}..9.%.c..r....=u1SUY4`....Vm.SO.]l../J..i.{S.o.8t.r..A.$...p.[...M..6....@..2..[PC.F.>~.p...M..Kl.....u./-./u....9S...sH....../..W..a.\./?...Y.;.....<];Z....w...|...E...j.uD.7$.T.9..&...1'9.....=..... #.(....n!..mo8...._}w...4).+.k....._>^.........3g.........................K.}&................<.....>..m..D.FZgx.?......9Z.x.S.mO'....!..s;3...E.....D.........m....9E...2......Tw.\.Z..T/ubMQ@.....y\.-...e.5.>y..8W...c.......U.;i.>.g..W.E...yye..<S...x.N....).....?...{..o...E..].w..
    Process:C:\Users\Public\Documents\calibre.exe
    File Type:MS Windows 95 Internet shortcut text (URL=<file:///C:\Users\Public\Documents\CalibreLauncher.js>), ASCII text
    Category:dropped
    Size (bytes):76
    Entropy (8bit):4.732987672525596
    Encrypted:false
    SSDEEP:3:HRAbABGQF0tuOaHF5hdCl+W3FQTo:HRYF1EOaH9dC93qk
    MD5:B57269D59D51FFF22FB523B705A783C4
    SHA1:EAFD4DFB619C55616C2EB09C5EFFD8A97DF39BBA
    SHA-256:B5D078FC21D1724F04CABAA1792F5250819C7F892A9958EE775ED7B81374F47C
    SHA-512:51640F0E4C4DCFA2604D066B040BC965F525CF59B5D0D0335B52E082E11CE2308BBCC9E4A9B03E87FF98BE3AF3109374BF7F9319F5C69A2B8B60799237768F2F
    Malicious:true
    Reputation:low
    Preview:[InternetShortcut].URL=file:///C:\Users\Public\Documents\CalibreLauncher.js.
    File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
    Entropy (8bit):6.946634368795593
    TrID:
    • MS Flight Simulator Gauge (35075/8) 68.65%
    • Win64 Executable (generic) (12005/4) 23.50%
    • Generic Win/DOS Executable (2004/3) 3.92%
    • DOS Executable Generic (2002/1) 3.92%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
    File name:SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe
    File size:3'107'319 bytes
    MD5:3722d2ad2f7e099039229456b7472711
    SHA1:c47a0ee5139f2da6f90dd3f84b447c3bc3553c67
    SHA256:b45d4d18149c6ba9966559208f3c5303dd9b20eeb43d5cf75aba272f2021364e
    SHA512:9f6bdd68d94f4a1d28657e72b0936fb863f0d91fad9b09c59457714dd78e0947e4932ced5090bc4617ae132ee339093beb5a7a97d74b02b6d4b18bd5c5a99b0e
    SSDEEP:49152:bBLAtsnsD8dnET/3lAsxx6EC4qHIDW+kEFYs8MW39W0CTvEtUAEo28/8VtznIqUf:bBLAWPdk/SADWPEFYkWvyEtUAEod8VBg
    TLSH:93E5AE02B8A56D6DD95E6130409F9336BB393C094133EBF746BAF9706E17A527E0C70A
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......g..*.......&....*......*................@.............................p+.....'./...`... ............................
    Icon Hash:00928e8e8686b000
    Entrypoint:0x1400013d0
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
    Time Stamp:0x670CA605 [Mon Oct 14 05:03:01 2024 UTC]
    TLS Callbacks:0x400536d0, 0x1, 0x4009a840, 0x1, 0x4009a810, 0x1
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:21f0b9c7ad8e2cd2151d01ad6aa5cbd9
    Instruction
    dec eax
    sub esp, 28h
    dec eax
    mov eax, dword ptr [0029BCD5h]
    mov dword ptr [eax], 00000001h
    call 00007F6E18E0C76Fh
    nop
    nop
    dec eax
    add esp, 28h
    ret
    nop dword ptr [eax]
    dec eax
    sub esp, 28h
    dec eax
    mov eax, dword ptr [0029BCB5h]
    mov dword ptr [eax], 00000000h
    call 00007F6E18E0C74Fh
    nop
    nop
    dec eax
    add esp, 28h
    ret
    nop dword ptr [eax]
    dec eax
    sub esp, 28h
    call 00007F6E18EA5CA4h
    dec eax
    cmp eax, 01h
    sbb eax, eax
    dec eax
    add esp, 28h
    ret
    nop
    nop
    nop
    nop
    nop
    nop
    nop
    nop
    nop
    nop
    nop
    nop
    dec eax
    lea ecx, dword ptr [00000009h]
    jmp 00007F6E18E0C9A9h
    nop dword ptr [eax+00h]
    ret
    nop
    nop
    nop
    nop
    nop
    nop
    nop
    nop
    nop
    nop
    nop
    nop
    nop
    nop
    nop
    push ebx
    dec eax
    sub esp, 20h
    mov ebx, ecx
    dec eax
    mov eax, dword ptr [0029BCCAh]
    movzx eax, byte ptr [eax]
    mov ecx, 00000018h
    mov edx, 00000008h
    call 00007F6E18E0D815h
    dec eax
    test eax, eax
    je 00007F6E18E0C9FFh
    dec eax
    mov dword ptr [eax], 00000000h
    dec eax
    mov dword ptr [eax+08h], 00000001h
    dec eax
    mov dword ptr [eax+10h], 00000000h
    dec esp
    lea eax, dword ptr [0009BB8Dh]
    mov ecx, ebx
    dec eax
    mov edx, eax
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x2b10000x1bc8.idata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x2b50000x4e8.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x29e0000x6054.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x2b60000xda8.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x29cd000x28.rdata
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x2b16a80x5c8.idata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x9a8680x9aa00c127c2820cf3b79733c66fb7509aa021False0.4804876970493129data6.3666595724298345IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .data0x9c0000x1c00x2003f76232263964398b627078cf1451ce6False0.21875data1.638873196705114IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rdata0x9d0000x2001d00x2002000f26856bd9f096eef4c9fb8288df8da0unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .pdata0x29e0000x60540x6200d9ae05d46c3d254decae5afb48c19a30False0.5054209183673469data5.8023785496146045IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .xdata0x2a50000xa38c0xa400e34505f558f87dc0e45ea1a4c153b110False0.26714939024390244data5.303284558927834IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .bss0x2b00000x2800x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .idata0x2b10000x1bc80x1c002c6722cd76085cc9df69a434e2f16b71False0.32059151785714285data4.628321068847722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .CRT0x2b30000x680x20001ed6f872711b8fb64328d4c252840edFalse0.076171875data0.3975604819285752IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .tls0x2b40000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x2b50000x4e80x6004b5b6bd7759336780a810cead7ed0ea6False0.333984375data4.783136965822635IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x2b60000xda80xe00344e13a349973cd94e362666215f6953False0.5711495535714286data5.380990554526164IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_MANIFEST0x2b50580x48fXML 1.0 document, ASCII text0.40102827763496146
    DLLImport
    KERNEL32.dllDeleteCriticalSection, EnterCriticalSection, InitializeCriticalSection, LeaveCriticalSection, RaiseException, RtlUnwindEx, VirtualProtect, VirtualQuery, __C_specific_handler
    msvcrt.dll__getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _amsg_exit, _cexit, _commode, _fmode, _fpreset, _initterm, _onexit, abort, calloc, exit, fprintf, free, fwrite, malloc, memcmp, memcpy, memmove, memset, signal, strlen, strncmp, vfprintf
    ntdll.dllNtCreateFile, NtReadFile, NtWriteFile, RtlNtStatusToDosError
    USERENV.dllGetUserProfileDirectoryW
    WS2_32.dllWSACleanup, WSADuplicateSocketW, WSAGetLastError, WSARecv, WSASend, WSASocketW, WSAStartup, accept, bind, closesocket, connect, freeaddrinfo, getaddrinfo, getpeername, getsockname, getsockopt, ioctlsocket, listen, recv, recvfrom, select, send, sendto, setsockopt, shutdown
    KERNEL32.dllAddVectoredExceptionHandler, CancelIo, CloseHandle, CompareStringOrdinal, CopyFileExW, CreateDirectoryW, CreateEventW, CreateFileMappingA, CreateFileW, CreateHardLinkW, CreateNamedPipeW, CreateProcessW, CreateSymbolicLinkW, CreateThread, CreateToolhelp32Snapshot, CreateWaitableTimerExW, DeleteFileW, DeleteProcThreadAttributeList, DeviceIoControl, DuplicateHandle, ExitProcess, FindClose, FindFirstFileW, FindNextFileW, FlushFileBuffers, FormatMessageW, FreeEnvironmentStringsW, GetCommandLineW, GetConsoleMode, GetCurrentDirectoryW, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetEnvironmentStringsW, GetEnvironmentVariableW, GetExitCodeProcess, GetFileAttributesW, GetFileInformationByHandle, GetFileInformationByHandleEx, GetFileType, GetFinalPathNameByHandleW, GetFullPathNameW, GetLastError, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleW, GetOverlappedResult, GetProcAddress, GetProcessHeap, GetProcessId, GetStdHandle, GetSystemDirectoryW, GetSystemInfo, GetSystemTimePreciseAsFileTime, GetTempPathW, GetWindowsDirectoryW, HeapAlloc, HeapFree, HeapReAlloc, InitOnceBeginInitialize, InitOnceComplete, InitializeProcThreadAttributeList, MapViewOfFile, Module32FirstW, Module32NextW, MoveFileExW, MultiByteToWideChar, QueryPerformanceCounter, QueryPerformanceFrequency, ReadConsoleW, ReadFile, ReadFileEx, RemoveDirectoryW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, SetCurrentDirectoryW, SetEnvironmentVariableW, SetFileAttributesW, SetFileInformationByHandle, SetFilePointerEx, SetFileTime, SetHandleInformation, SetLastError, SetThreadStackGuarantee, SetUnhandledExceptionFilter, SetWaitableTimer, Sleep, SleepEx, SwitchToThread, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnmapViewOfFile, UpdateProcThreadAttribute, WaitForMultipleObjects, WaitForSingleObject, WideCharToMultiByte, WriteConsoleW, WriteFileEx, lstrlenW
    ole32.dllCoTaskMemFree
    SHELL32.dllSHGetKnownFolderPath
    api-ms-win-core-synch-l1-2-0.dllWaitOnAddress, WakeByAddressAll, WakeByAddressSingle
    bcryptprimitives.dllProcessPrng
    Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:13:27:04
    Start date:31/10/2024
    Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe"
    Imagebase:0x7ff63b850000
    File size:3'107'319 bytes
    MD5 hash:3722D2AD2F7E099039229456B7472711
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:1
    Start time:13:27:04
    Start date:31/10/2024
    Path:C:\Users\Public\Documents\calibre.exe
    Wow64 process (32bit):true
    Commandline:C:\Users\Public\Documents\calibre.exe
    Imagebase:0xb0000
    File size:65'472 bytes
    MD5 hash:853D888553D002A04484C098A3D7045F
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Antivirus matches:
    • Detection: 0%, ReversingLabs
    Reputation:low
    Has exited:false

    Target ID:3
    Start time:13:27:16
    Start date:31/10/2024
    Path:C:\Windows\System32\wscript.exe
    Wow64 process (32bit):false
    Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\CalibreLauncher.js"
    Imagebase:0x7ff61ffd0000
    File size:170'496 bytes
    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:4
    Start time:13:27:17
    Start date:31/10/2024
    Path:C:\Users\Public\Documents\calibre.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\Public\Documents\calibre.exe"
    Imagebase:0xb0000
    File size:65'472 bytes
    MD5 hash:853D888553D002A04484C098A3D7045F
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:2%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:34.9%
      Total number of Nodes:1357
      Total number of Limit Nodes:2
      execution_graph 13221 7ff63b8513d0 13224 7ff63b851180 13221->13224 13223 7ff63b8513e6 13225 7ff63b8511b0 13224->13225 13226 7ff63b8511b9 Sleep 13225->13226 13229 7ff63b8511c9 13225->13229 13226->13225 13227 7ff63b85134c _initterm 13228 7ff63b8511fc 13227->13228 13239 7ff63b8eabd0 13228->13239 13229->13227 13229->13228 13238 7ff63b8512ee 13229->13238 13231 7ff63b851224 SetUnhandledExceptionFilter 13232 7ff63b851247 13231->13232 13233 7ff63b85124c malloc 13232->13233 13234 7ff63b851276 13233->13234 13233->13238 13235 7ff63b851280 strlen malloc memcpy 13234->13235 13235->13235 13236 7ff63b8512b2 13235->13236 13264 7ff63b852260 13236->13264 13238->13223 13240 7ff63b8eac08 13239->13240 13263 7ff63b8eabf1 13239->13263 13241 7ff63b8eaed0 13240->13241 13243 7ff63b8eac80 13240->13243 13247 7ff63b8eade0 13240->13247 13240->13263 13242 7ff63b8eaed9 13241->13242 13241->13263 13245 7ff63b8eaa60 8 API calls 13242->13245 13251 7ff63b8eaefd 13242->13251 13244 7ff63b8eaf26 13243->13244 13243->13247 13249 7ff63b8eaf10 13243->13249 13243->13251 13253 7ff63b8eae40 13243->13253 13258 7ff63b8eacf2 13243->13258 13243->13263 13246 7ff63b8ea9f0 8 API calls 13244->13246 13245->13242 13256 7ff63b8eaf32 13246->13256 13248 7ff63b8eae20 13247->13248 13247->13249 13248->13249 13268 7ff63b8eaa60 13248->13268 13252 7ff63b8ea9f0 8 API calls 13249->13252 13298 7ff63b8ea9f0 13251->13298 13252->13244 13253->13249 13255 7ff63b8eae32 13253->13255 13255->13249 13255->13253 13257 7ff63b8eaa60 8 API calls 13255->13257 13256->13231 13257->13255 13258->13243 13258->13249 13259 7ff63b8eaa60 8 API calls 13258->13259 13260 7ff63b8ead6d 13258->13260 13262 7ff63b8ead70 13258->13262 13259->13258 13260->13262 13261 7ff63b8eada2 VirtualProtect 13261->13262 13262->13261 13262->13263 13263->13231 13265 7ff63b852277 13264->13265 13328 7ff63b874b70 13265->13328 13274 7ff63b8eaa79 13268->13274 13269 7ff63b8eab2e 13269->13255 13270 7ff63b8eabb2 13271 7ff63b8ea9f0 4 API calls 13270->13271 13279 7ff63b8eabc1 13271->13279 13272 7ff63b8eaaed VirtualQuery 13273 7ff63b8eab97 13272->13273 13272->13274 13273->13270 13275 7ff63b8ea9f0 4 API calls 13273->13275 13274->13269 13274->13270 13274->13272 13276 7ff63b8eab40 VirtualProtect 13274->13276 13275->13270 13276->13269 13277 7ff63b8eab78 GetLastError 13276->13277 13278 7ff63b8ea9f0 4 API calls 13277->13278 13278->13274 13283 7ff63b8eaed0 13279->13283 13284 7ff63b8eade0 13279->13284 13293 7ff63b8eac80 13279->13293 13297 7ff63b8eabf1 13279->13297 13280 7ff63b8eaf26 13282 7ff63b8ea9f0 4 API calls 13280->13282 13281 7ff63b8eaa60 4 API calls 13281->13283 13285 7ff63b8eaf32 13282->13285 13283->13281 13286 7ff63b8eaefd 13283->13286 13283->13297 13287 7ff63b8eaf10 13284->13287 13288 7ff63b8eaa60 4 API calls 13284->13288 13285->13255 13290 7ff63b8ea9f0 4 API calls 13286->13290 13289 7ff63b8ea9f0 4 API calls 13287->13289 13292 7ff63b8eae32 13288->13292 13289->13280 13290->13287 13291 7ff63b8eaa60 4 API calls 13291->13292 13292->13287 13292->13291 13293->13280 13293->13284 13293->13286 13293->13287 13293->13292 13294 7ff63b8eaa60 VirtualQuery VirtualProtect GetLastError VirtualProtect 13293->13294 13295 7ff63b8ead6d 13293->13295 13293->13297 13294->13293 13296 7ff63b8eada2 VirtualProtect 13295->13296 13295->13297 13296->13295 13297->13255 13303 7ff63b8eaa1c 13298->13303 13299 7ff63b8eab2e 13299->13249 13300 7ff63b8eabb2 13301 7ff63b8ea9f0 4 API calls 13300->13301 13310 7ff63b8eabc1 13301->13310 13302 7ff63b8eaaed VirtualQuery 13302->13303 13304 7ff63b8eab97 13302->13304 13303->13299 13303->13300 13303->13302 13307 7ff63b8eab40 VirtualProtect 13303->13307 13304->13300 13306 7ff63b8ea9f0 4 API calls 13304->13306 13305 7ff63b8eabf1 13305->13249 13306->13300 13307->13299 13308 7ff63b8eab78 GetLastError 13307->13308 13309 7ff63b8ea9f0 4 API calls 13308->13309 13309->13303 13310->13305 13314 7ff63b8eaed0 13310->13314 13315 7ff63b8eade0 13310->13315 13325 7ff63b8eac80 13310->13325 13311 7ff63b8eaf26 13313 7ff63b8ea9f0 4 API calls 13311->13313 13312 7ff63b8eaa60 4 API calls 13312->13314 13316 7ff63b8eaf32 13313->13316 13314->13305 13314->13312 13317 7ff63b8eaefd 13314->13317 13318 7ff63b8eaf10 13315->13318 13319 7ff63b8eaa60 4 API calls 13315->13319 13316->13249 13321 7ff63b8ea9f0 4 API calls 13317->13321 13320 7ff63b8ea9f0 4 API calls 13318->13320 13323 7ff63b8eae32 13319->13323 13320->13311 13321->13318 13322 7ff63b8eaa60 4 API calls 13322->13323 13323->13318 13323->13322 13324 7ff63b8eaa60 VirtualQuery VirtualProtect GetLastError VirtualProtect 13324->13325 13325->13305 13325->13311 13325->13315 13325->13317 13325->13318 13325->13323 13325->13324 13326 7ff63b8ead6d 13325->13326 13326->13305 13327 7ff63b8eada2 VirtualProtect 13326->13327 13327->13326 13329 7ff63b874b91 13328->13329 13330 7ff63b874ba6 SetThreadDescription 13329->13330 13339 7ff63b8757b0 13330->13339 13332 7ff63b874bcb 13352 7ff63b874f90 13332->13352 13334 7ff63b874bd3 13396 7ff63b851450 13334->13396 13335 7ff63b874bd9 13336 7ff63b85229d 13335->13336 13416 7ff63b8a2af0 13335->13416 13336->13238 13444 7ff63b8cb880 13339->13444 13341 7ff63b8757f9 13345 7ff63b875845 13341->13345 13497 7ff63b875610 13341->13497 13342 7ff63b875863 13483 7ff63b8c7710 13342->13483 13343 7ff63b8757d1 13343->13341 13343->13342 13345->13332 13347 7ff63b87586e 13504 7ff63b8ea360 RtlCaptureContext RtlUnwindEx abort 13347->13504 13349 7ff63b87588a 13350 7ff63b8ea360 6 API calls 13349->13350 13351 7ff63b8758a4 13350->13351 13351->13332 14059 7ff63b8a9c10 13352->14059 13355 7ff63b875009 13359 7ff63b875018 13355->13359 14092 7ff63b864290 13355->14092 13356 7ff63b874fc5 13357 7ff63b874fcb 13356->13357 13358 7ff63b875040 13356->13358 14079 7ff63b8a9b20 13357->14079 14096 7ff63b882c30 13358->14096 13362 7ff63b8d4a90 111 API calls 13359->13362 13362->13358 13364 7ff63b874fe7 13365 7ff63b874ff0 13364->13365 14102 7ff63b8d42d0 13364->14102 13365->13334 13367 7ff63b8750ab 13368 7ff63b8750cc 13367->13368 13370 7ff63b864290 HeapFree 13367->13370 13369 7ff63b8ea360 6 API calls 13368->13369 13371 7ff63b8750d4 13369->13371 13370->13368 13372 7ff63b8750f2 13371->13372 13373 7ff63b8a9b20 111 API calls 13371->13373 13374 7ff63b875156 13372->13374 13375 7ff63b875138 13372->13375 13377 7ff63b8a9c10 111 API calls 13372->13377 13373->13372 13376 7ff63b8d4a90 111 API calls 13374->13376 13375->13334 13378 7ff63b875180 13376->13378 13379 7ff63b875106 13377->13379 13380 7ff63b8d42d0 111 API calls 13378->13380 13379->13378 13383 7ff63b875113 13379->13383 14105 7ff63b856d80 13379->14105 13381 7ff63b875198 13380->13381 13382 7ff63b8a9c10 111 API calls 13381->13382 13384 7ff63b8751b2 13382->13384 13383->13374 13386 7ff63b875119 13383->13386 13387 7ff63b8751c2 13384->13387 13390 7ff63b856d80 111 API calls 13384->13390 13386->13378 13388 7ff63b87511e 13386->13388 13389 7ff63b8d42d0 111 API calls 13387->13389 13393 7ff63b8751cd 13387->13393 13388->13375 13392 7ff63b864290 HeapFree 13388->13392 13391 7ff63b8751ff SwitchToThread 13389->13391 13390->13387 13395 7ff63bb01ba8 13391->13395 13392->13375 13393->13334 13397 7ff63b851470 13396->13397 13398 7ff63b8514a2 13397->13398 13401 7ff63b851475 13397->13401 13399 7ff63b8c7710 111 API calls 13398->13399 13400 7ff63b8514b1 13399->13400 14165 7ff63b851560 13400->14165 13403 7ff63b87ba73 13401->13403 13405 7ff63b8c7710 111 API calls 13401->13405 13403->13335 13407 7ff63b87ba98 13405->13407 13406 7ff63b85153d 13406->13335 13411 7ff63b8ea360 6 API calls 13407->13411 13413 7ff63b87bab0 13411->13413 14180 7ff63b8d47c0 13413->14180 13417 7ff63b8a2b40 13416->13417 13418 7ff63b8d44b0 111 API calls 13417->13418 13419 7ff63b8a2d70 13418->13419 13420 7ff63b8d42b0 111 API calls 13419->13420 13421 7ff63b8a2d7c 13420->13421 13422 7ff63b8522c0 HeapFree 13421->13422 13423 7ff63b8a2dad 13421->13423 13422->13423 13424 7ff63b8a2dfe WakeByAddressAll 13423->13424 13425 7ff63b8a2e0a 13423->13425 13424->13425 13426 7ff63b8ea360 6 API calls 13425->13426 13427 7ff63b8a2e12 13426->13427 13428 7ff63b8d44b0 111 API calls 13427->13428 13429 7ff63b8a2f9d 13428->13429 13430 7ff63b8d42b0 111 API calls 13429->13430 13431 7ff63b8a2fa9 13430->13431 13432 7ff63b8a2fcf WakeByAddressAll 13431->13432 13433 7ff63b8a2fdb 13431->13433 13432->13433 13434 7ff63b8ea360 6 API calls 13433->13434 13435 7ff63b8a2fe3 13434->13435 13436 7ff63b8d44b0 111 API calls 13435->13436 13437 7ff63b8a3158 13436->13437 13438 7ff63b8d42b0 111 API calls 13437->13438 13439 7ff63b8a3164 13438->13439 13440 7ff63b8a31b3 13439->13440 13441 7ff63b8a31a7 WakeByAddressAll 13439->13441 13442 7ff63b8ea360 6 API calls 13440->13442 13441->13440 13443 7ff63b8a31bb 13442->13443 13445 7ff63b8cb8a7 13444->13445 13448 7ff63b8cb8be 13445->13448 13511 7ff63b8d4a90 13445->13511 13448->13343 13566 7ff63b8522f0 13483->13566 13486 7ff63b8d44b0 110 API calls 13487 7ff63b8c776c 13486->13487 13488 7ff63b8c77da 13487->13488 13489 7ff63b8d44f0 110 API calls 13487->13489 13490 7ff63b8d44b0 110 API calls 13488->13490 13489->13488 13494 7ff63b8c7828 13490->13494 13491 7ff63b8c786c memcpy 13491->13347 13493 7ff63b8c7893 13588 7ff63b8c76f0 13493->13588 13494->13491 13494->13493 13496 7ff63b8c78a0 13496->13347 13498 7ff63b8d44b0 111 API calls 13497->13498 13500 7ff63b87564c 13498->13500 13499 7ff63b87568e 14042 7ff63b8c8400 13499->14042 13500->13499 13502 7ff63b875706 13500->13502 13503 7ff63b8d4a90 111 API calls 13500->13503 13502->13347 13503->13499 13505 7ff63b8ea482 13504->13505 13506 7ff63b8ea44b RaiseException 13504->13506 14057 7ff63b8e9fb0 RaiseException 13505->14057 13506->13349 13509 7ff63b8e9fb0 RaiseException 13510 7ff63b8ea4b5 13509->13510 13510->13349 13514 7ff63b8d44b0 13511->13514 13521 7ff63b88eef0 13514->13521 13535 7ff63b88c990 13521->13535 13538 7ff63b88f220 13535->13538 13540 7ff63b88f239 13538->13540 13539 7ff63b88f288 13541 7ff63b88f390 111 API calls 13539->13541 13540->13539 13542 7ff63b88f390 111 API calls 13540->13542 13543 7ff63b88f2bf 13541->13543 13542->13539 13544 7ff63b88f2da 13543->13544 13545 7ff63b8ea360 6 API calls 13543->13545 13546 7ff63b8522c0 HeapFree 13544->13546 13545->13544 13547 7ff63b88f2ec 13546->13547 13548 7ff63b8ea360 6 API calls 13547->13548 13549 7ff63b88c99f 13548->13549 13567 7ff63b8a47d0 13566->13567 13607 7ff63b8a47a0 13567->13607 13572 7ff63b8a4877 13653 7ff63b8912c0 13572->13653 13573 7ff63b8a484d 13649 7ff63b8557c0 13573->13649 13578 7ff63b8a4943 CreateFileMappingA 13582 7ff63b8a49b4 CloseHandle 13578->13582 13583 7ff63b8a4974 MapViewOfFile CloseHandle 13578->13583 13579 7ff63b8557c0 HeapFree 13581 7ff63b8a48db 13579->13581 13581->13578 13586 7ff63b8a49c5 GetLastError 13581->13586 13585 7ff63b8a49ee CloseHandle 13582->13585 13583->13582 13584 7ff63b8a499f 13583->13584 13584->13585 13587 7ff63b8557c0 HeapFree 13586->13587 13587->13584 13589 7ff63b8c76ff 13588->13589 13590 7ff63b8c7704 13588->13590 14039 7ff63b8c74d0 13589->14039 13592 7ff63b8c7710 110 API calls 13590->13592 13593 7ff63b8c7709 13592->13593 13594 7ff63b8522f0 110 API calls 13593->13594 13595 7ff63b8c7728 13594->13595 13596 7ff63b8d44b0 110 API calls 13595->13596 13597 7ff63b8c776c 13596->13597 13598 7ff63b8c77da 13597->13598 13599 7ff63b8d44f0 110 API calls 13597->13599 13600 7ff63b8d44b0 110 API calls 13598->13600 13599->13598 13605 7ff63b8c7828 13600->13605 13601 7ff63b8c786c memcpy 13601->13496 13603 7ff63b8c7893 13604 7ff63b8c76f0 110 API calls 13603->13604 13606 7ff63b8c78a0 13604->13606 13605->13601 13605->13603 13606->13496 13608 7ff63b8a47c2 13607->13608 13609 7ff63b8a47a0 105 API calls 13608->13609 13610 7ff63b8a47e8 13609->13610 13611 7ff63b891020 105 API calls 13610->13611 13612 7ff63b8a4845 13611->13612 13613 7ff63b8a4877 13612->13613 13614 7ff63b8a484d 13612->13614 13616 7ff63b8912c0 GetLastError 13613->13616 13615 7ff63b8557c0 HeapFree 13614->13615 13617 7ff63b8a47e8 13615->13617 13618 7ff63b8a4883 13616->13618 13629 7ff63b891020 13617->13629 13620 7ff63b8557c0 HeapFree 13618->13620 13622 7ff63b8a48db 13618->13622 13619 7ff63b8a4943 CreateFileMappingA 13623 7ff63b8a49b4 CloseHandle 13619->13623 13624 7ff63b8a4974 MapViewOfFile CloseHandle 13619->13624 13620->13622 13622->13619 13627 7ff63b8a49c5 GetLastError 13622->13627 13626 7ff63b8a49ee CloseHandle 13623->13626 13624->13623 13625 7ff63b8a499f 13624->13625 13625->13626 13628 7ff63b8557c0 HeapFree 13627->13628 13628->13625 13657 7ff63b89f310 13629->13657 13631 7ff63b891053 13643 7ff63b891060 13631->13643 13755 7ff63b8a1800 13631->13755 13633 7ff63b89108a 13634 7ff63b8910ce 13633->13634 13637 7ff63b891138 13633->13637 13633->13643 13634->13643 13833 7ff63b8522c0 13634->13833 13636 7ff63b891261 13641 7ff63b891266 GetLastError 13636->13641 13637->13636 13638 7ff63b891168 CreateFileW 13637->13638 13639 7ff63b8911aa 13638->13639 13640 7ff63b89121c GetLastError 13638->13640 13642 7ff63b8911e8 13639->13642 13645 7ff63b8911b9 GetLastError 13639->13645 13640->13642 13640->13643 13644 7ff63b89127e 13641->13644 13642->13643 13646 7ff63b8522c0 HeapFree 13642->13646 13643->13572 13643->13573 13644->13643 13648 7ff63b8522c0 HeapFree 13644->13648 13645->13642 13647 7ff63b8911c5 SetFileInformationByHandle 13645->13647 13646->13643 13647->13641 13647->13642 13648->13643 13650 7ff63b8557e1 13649->13650 13651 7ff63b8557e6 13649->13651 13650->13651 13652 7ff63b8522c0 HeapFree 13650->13652 13651->13486 13652->13651 13656 7ff63b8912f4 13653->13656 13654 7ff63b8913a2 GetLastError 13655 7ff63b89132c 13654->13655 13655->13579 13655->13581 13656->13654 13656->13655 13658 7ff63b89f373 13657->13658 13662 7ff63b89f339 13657->13662 13837 7ff63b86e2c0 13658->13837 13659 7ff63b89f48c 13661 7ff63b8c76f0 98 API calls 13659->13661 13663 7ff63b89f49a 13661->13663 13662->13658 13662->13659 13664 7ff63b89f4b8 13663->13664 13666 7ff63b8522c0 HeapFree 13663->13666 13667 7ff63b8ea360 6 API calls 13664->13667 13666->13664 13673 7ff63b89f4c0 13667->13673 13668 7ff63b8522c0 HeapFree 13669 7ff63b89f450 13668->13669 13669->13631 13670 7ff63b89f5c8 SetLastError GetFullPathNameW 13672 7ff63b89f5ea GetLastError 13670->13672 13670->13673 13672->13673 13674 7ff63b89f6bb GetLastError 13672->13674 13673->13670 13675 7ff63b89f603 GetLastError 13673->13675 13678 7ff63b89f635 13673->13678 13841 7ff63b8648f0 13673->13841 13676 7ff63b89f6ec 13674->13676 13693 7ff63b89f68e 13674->13693 13675->13673 13677 7ff63b89f7dd 13675->13677 13679 7ff63b8522c0 HeapFree 13676->13679 13893 7ff63b8d4530 13677->13893 13682 7ff63b89f63e 13678->13682 13683 7ff63b89f7f7 13678->13683 13679->13693 13680 7ff63b89f722 13680->13631 13685 7ff63b89f80e 13682->13685 13686 7ff63b89f65e 13682->13686 13896 7ff63b8da760 13683->13896 13684 7ff63b89f767 13692 7ff63b89f858 13684->13692 13696 7ff63b8522c0 HeapFree 13684->13696 13899 7ff63b8da7d0 13685->13899 13689 7ff63b89f821 13686->13689 13690 7ff63b89f667 13686->13690 13688 7ff63b8522c0 HeapFree 13688->13680 13695 7ff63b8da760 98 API calls 13689->13695 13690->13693 13694 7ff63b89f670 memcmp 13690->13694 13697 7ff63b89f862 13692->13697 13698 7ff63b8522c0 HeapFree 13692->13698 13693->13680 13693->13688 13694->13693 13703 7ff63b89f737 13694->13703 13695->13684 13696->13692 13700 7ff63b89f8a7 13697->13700 13704 7ff63b8522c0 HeapFree 13697->13704 13698->13697 13699 7ff63b89f76c 13701 7ff63b89f771 memcpy 13699->13701 13706 7ff63b89f8c3 13700->13706 13707 7ff63b8ea360 6 API calls 13700->13707 13702 7ff63b89f7a0 13701->13702 13702->13693 13711 7ff63b8522c0 HeapFree 13702->13711 13703->13699 13703->13701 13705 7ff63b89f75a 13703->13705 13704->13700 13709 7ff63b8c76f0 98 API calls 13705->13709 13708 7ff63b8522c0 HeapFree 13706->13708 13707->13706 13710 7ff63b89f8dc 13708->13710 13709->13684 13712 7ff63b8ea360 6 API calls 13710->13712 13711->13693 13715 7ff63b89f8e4 13712->13715 13713 7ff63b89f9e8 SetLastError GetFullPathNameW 13713->13715 13716 7ff63b89fa0a GetLastError 13713->13716 13714 7ff63b8648f0 98 API calls 13714->13715 13715->13713 13715->13714 13718 7ff63b89fa23 GetLastError 13715->13718 13720 7ff63b89fa55 13715->13720 13716->13715 13717 7ff63b89fae3 GetLastError 13716->13717 13721 7ff63b89fb14 13717->13721 13722 7ff63b89fab5 13717->13722 13718->13715 13719 7ff63b89fc12 13718->13719 13725 7ff63b8d4530 98 API calls 13719->13725 13726 7ff63b89fa5e 13720->13726 13727 7ff63b89fc2c 13720->13727 13723 7ff63b8522c0 HeapFree 13721->13723 13724 7ff63b89fb4a 13722->13724 13731 7ff63b8522c0 HeapFree 13722->13731 13723->13722 13724->13631 13754 7ff63b89fb8f 13725->13754 13728 7ff63b89fa7e 13726->13728 13729 7ff63b89fc43 13726->13729 13730 7ff63b8da760 98 API calls 13727->13730 13732 7ff63b89fc56 13728->13732 13740 7ff63b89fa87 13728->13740 13733 7ff63b8da7d0 98 API calls 13729->13733 13730->13754 13731->13724 13735 7ff63b8da760 98 API calls 13732->13735 13733->13754 13734 7ff63b89fc8d 13737 7ff63b89fc97 13734->13737 13738 7ff63b8522c0 HeapFree 13734->13738 13735->13754 13736 7ff63b8522c0 HeapFree 13736->13734 13739 7ff63b89fcdc 13737->13739 13742 7ff63b8522c0 HeapFree 13737->13742 13738->13737 13743 7ff63b89fcf8 13739->13743 13745 7ff63b8ea360 6 API calls 13739->13745 13740->13722 13741 7ff63b89fb94 13740->13741 13744 7ff63b89fb99 memcpy 13740->13744 13749 7ff63b89fb82 13740->13749 13741->13744 13742->13739 13746 7ff63b8522c0 HeapFree 13743->13746 13747 7ff63b89fbcf 13744->13747 13745->13743 13748 7ff63b89fd11 13746->13748 13747->13722 13752 7ff63b8522c0 HeapFree 13747->13752 13750 7ff63b8ea360 6 API calls 13748->13750 13751 7ff63b8c76f0 98 API calls 13749->13751 13753 7ff63b89fd19 13750->13753 13751->13754 13752->13722 13753->13631 13754->13734 13754->13736 13756 7ff63b8a1829 13755->13756 13757 7ff63b8a19b3 SetLastError GetFullPathNameW 13756->13757 13758 7ff63b8648f0 95 API calls 13756->13758 13761 7ff63b8a19f5 GetLastError 13756->13761 13762 7ff63b8a1a2d 13756->13762 13771 7ff63b8a186d 13756->13771 13757->13756 13759 7ff63b8a19dc GetLastError 13757->13759 13758->13756 13759->13756 13760 7ff63b8a1a82 GetLastError 13759->13760 13763 7ff63b8a1a95 13760->13763 13764 7ff63b8a1aaa 13760->13764 13761->13756 13765 7ff63b8a1e04 13761->13765 13766 7ff63b8a1e1e 13762->13766 13785 7ff63b8a1a36 13762->13785 13768 7ff63b8522c0 HeapFree 13763->13768 13769 7ff63b8522c0 HeapFree 13764->13769 13764->13771 13767 7ff63b8d4530 95 API calls 13765->13767 13770 7ff63b8da760 95 API calls 13766->13770 13774 7ff63b8a1e1c 13767->13774 13768->13764 13769->13771 13770->13774 13771->13633 13772 7ff63b8a1bdf 13775 7ff63b8a1bf1 13772->13775 13779 7ff63b8648f0 95 API calls 13772->13779 13773 7ff63b8a1e70 13781 7ff63b8a1e98 13773->13781 13783 7ff63b8522c0 HeapFree 13773->13783 13774->13773 13778 7ff63b8522c0 HeapFree 13774->13778 13780 7ff63b8a1cc6 memcpy 13775->13780 13776 7ff63b8a1b86 memcpy 13776->13772 13776->13780 13777 7ff63b8a1bd2 13777->13772 13788 7ff63b8a1e35 13777->13788 13778->13773 13779->13775 13787 7ff63b8a1cf0 13780->13787 13784 7ff63b8ea360 6 API calls 13781->13784 13783->13781 13786 7ff63b8a1ea0 13784->13786 13785->13776 13785->13777 13785->13788 13906 7ff63b8a1370 13786->13906 13787->13771 13790 7ff63b8522c0 HeapFree 13787->13790 13791 7ff63b8c76f0 95 API calls 13788->13791 13790->13771 13791->13774 13792 7ff63b8a1ee0 13793 7ff63b89f310 95 API calls 13792->13793 13801 7ff63b8a1ee9 13792->13801 13800 7ff63b8a1f2c 13793->13800 13794 7ff63b8a21ce 13795 7ff63b8a21d4 memcpy 13794->13795 13796 7ff63b8a1f39 13795->13796 13796->13633 13797 7ff63b8a20f7 13803 7ff63b8c76f0 95 API calls 13797->13803 13798 7ff63b8a2058 SetLastError GetFullPathNameW 13798->13800 13802 7ff63b8a207a GetLastError 13798->13802 13799 7ff63b8648f0 95 API calls 13799->13800 13800->13796 13800->13798 13800->13799 13800->13801 13805 7ff63b8a2093 GetLastError 13800->13805 13807 7ff63b8a20fc 13800->13807 13801->13794 13801->13795 13801->13796 13801->13797 13802->13800 13804 7ff63b8a2162 GetLastError 13802->13804 13806 7ff63b8a223c 13803->13806 13808 7ff63b8a2193 13804->13808 13809 7ff63b8a2158 13804->13809 13805->13800 13810 7ff63b8a2214 13805->13810 13811 7ff63b8da760 95 API calls 13806->13811 13807->13806 13812 7ff63b8a2105 13807->13812 13814 7ff63b8522c0 HeapFree 13808->13814 13809->13796 13815 7ff63b8522c0 HeapFree 13809->13815 13813 7ff63b8d4530 95 API calls 13810->13813 13818 7ff63b8a222c 13811->13818 13991 7ff63b884ec0 13812->13991 13813->13818 13814->13809 13815->13796 13817 7ff63b8a211b 13817->13809 13823 7ff63b8522c0 HeapFree 13817->13823 13819 7ff63b8a2295 13818->13819 13820 7ff63b8522c0 HeapFree 13818->13820 13821 7ff63b8ea360 6 API calls 13818->13821 13822 7ff63b8522c0 HeapFree 13819->13822 13820->13818 13821->13818 13824 7ff63b8a22b1 13822->13824 13823->13809 13825 7ff63b8ea360 6 API calls 13824->13825 13826 7ff63b8a22b9 13825->13826 13827 7ff63b8a22e8 WaitOnAddress 13826->13827 13828 7ff63b8a22da WakeByAddressSingle 13826->13828 13829 7ff63b8a2305 GetLastError 13827->13829 13830 7ff63b8a230a 13827->13830 13828->13827 13829->13830 13831 7ff63b8a2314 13830->13831 14008 7ff63b8a2400 13830->14008 13831->13633 13834 7ff63b88df30 HeapFree 13833->13834 13834->13643 13836 7ff63bb01aa8 13834->13836 13840 7ff63b86e2f0 13837->13840 13838 7ff63b8648f0 111 API calls 13839 7ff63b86e426 13838->13839 13839->13668 13839->13669 13840->13838 13840->13839 13842 7ff63b864979 13841->13842 13843 7ff63b864904 13841->13843 13844 7ff63b8c76f0 111 API calls 13842->13844 13845 7ff63b8c76f0 111 API calls 13843->13845 13847 7ff63b864966 13843->13847 13844->13843 13846 7ff63b86498d 13845->13846 13848 7ff63b8649a4 13846->13848 13849 7ff63b8c76f0 111 API calls 13846->13849 13847->13673 13850 7ff63b8c76f0 111 API calls 13848->13850 13853 7ff63b864a09 13848->13853 13849->13848 13851 7ff63b864a30 13850->13851 13852 7ff63b864a59 13851->13852 13854 7ff63b8c76f0 111 API calls 13851->13854 13855 7ff63b8c76f0 111 API calls 13852->13855 13857 7ff63b864ac7 13852->13857 13853->13673 13854->13852 13856 7ff63b864aee 13855->13856 13858 7ff63b864b0c 13856->13858 13859 7ff63b8c76f0 111 API calls 13856->13859 13857->13673 13860 7ff63b8c76f0 111 API calls 13858->13860 13862 7ff63b864b80 13858->13862 13859->13858 13861 7ff63b864bad 13860->13861 13863 7ff63b864bc5 13861->13863 13864 7ff63b8c76f0 111 API calls 13861->13864 13862->13673 13865 7ff63b8c76f0 111 API calls 13863->13865 13867 7ff63b864c30 13863->13867 13864->13863 13866 7ff63b864c57 13865->13866 13868 7ff63b864c79 13866->13868 13869 7ff63b8c76f0 111 API calls 13866->13869 13867->13673 13870 7ff63b8c76f0 111 API calls 13868->13870 13873 7ff63b864cf3 13868->13873 13869->13868 13871 7ff63b864d1a 13870->13871 13872 7ff63b864d35 13871->13872 13874 7ff63b8c76f0 111 API calls 13871->13874 13875 7ff63b8c76f0 111 API calls 13872->13875 13877 7ff63b864da1 13872->13877 13873->13673 13874->13872 13876 7ff63b864dc8 13875->13876 13878 7ff63b864de5 13876->13878 13879 7ff63b8c76f0 111 API calls 13876->13879 13877->13673 13880 7ff63b8c76f0 111 API calls 13878->13880 13882 7ff63b864e50 13878->13882 13879->13878 13881 7ff63b864e77 13880->13881 13883 7ff63b864e95 13881->13883 13884 7ff63b8c76f0 111 API calls 13881->13884 13882->13673 13885 7ff63b8c76f0 111 API calls 13883->13885 13887 7ff63b864f00 13883->13887 13884->13883 13886 7ff63b864f27 13885->13886 13888 7ff63b864f49 13886->13888 13889 7ff63b8c76f0 111 API calls 13886->13889 13887->13673 13890 7ff63b8c76f0 111 API calls 13888->13890 13892 7ff63b864fbd 13888->13892 13889->13888 13891 7ff63b864fe4 13890->13891 13892->13673 13894 7ff63b8d44b0 111 API calls 13893->13894 13895 7ff63b8d456d 13894->13895 13897 7ff63b8d44b0 111 API calls 13896->13897 13898 7ff63b8da7ce 13897->13898 13900 7ff63b8d44b0 111 API calls 13899->13900 13901 7ff63b8da83e 13900->13901 13902 7ff63b8d44b0 111 API calls 13901->13902 13903 7ff63b8da878 13902->13903 13904 7ff63b8d44b0 111 API calls 13903->13904 13905 7ff63b8da8b8 13904->13905 13905->13684 13908 7ff63b8a1386 13906->13908 13907 7ff63b8a1603 13913 7ff63b8a1526 13907->13913 14013 7ff63b8da6f0 13907->14013 13908->13907 13910 7ff63b8da760 95 API calls 13908->13910 13912 7ff63b8a150b 13908->13912 13908->13913 13910->13907 13911 7ff63b8da6f0 95 API calls 13917 7ff63b8a17fd 13911->13917 13912->13911 13912->13913 13913->13792 13914 7ff63b8a186d 13914->13792 13915 7ff63b8a19b3 SetLastError GetFullPathNameW 13915->13917 13918 7ff63b8a19dc GetLastError 13915->13918 13916 7ff63b8648f0 95 API calls 13916->13917 13917->13914 13917->13915 13917->13916 13920 7ff63b8a19f5 GetLastError 13917->13920 13921 7ff63b8a1a2d 13917->13921 13918->13917 13919 7ff63b8a1a82 GetLastError 13918->13919 13922 7ff63b8a1a95 13919->13922 13923 7ff63b8a1aaa 13919->13923 13920->13917 13924 7ff63b8a1e04 13920->13924 13925 7ff63b8a1e1e 13921->13925 13943 7ff63b8a1a36 13921->13943 13927 7ff63b8522c0 HeapFree 13922->13927 13923->13914 13928 7ff63b8522c0 HeapFree 13923->13928 13926 7ff63b8d4530 95 API calls 13924->13926 13929 7ff63b8da760 95 API calls 13925->13929 13932 7ff63b8a1e1c 13926->13932 13927->13923 13928->13914 13929->13932 13930 7ff63b8a1bdf 13933 7ff63b8a1bf1 13930->13933 13937 7ff63b8648f0 95 API calls 13930->13937 13931 7ff63b8a1e70 13939 7ff63b8a1e98 13931->13939 13941 7ff63b8522c0 HeapFree 13931->13941 13932->13931 13936 7ff63b8522c0 HeapFree 13932->13936 13938 7ff63b8a1cc6 memcpy 13933->13938 13934 7ff63b8a1b86 memcpy 13934->13930 13934->13938 13935 7ff63b8a1bd2 13935->13930 13946 7ff63b8a1e35 13935->13946 13936->13931 13937->13933 13945 7ff63b8a1cf0 13938->13945 13942 7ff63b8ea360 6 API calls 13939->13942 13941->13939 13944 7ff63b8a1ea0 13942->13944 13943->13934 13943->13935 13943->13946 13947 7ff63b8a1370 95 API calls 13944->13947 13945->13914 13948 7ff63b8522c0 HeapFree 13945->13948 13949 7ff63b8c76f0 95 API calls 13946->13949 13950 7ff63b8a1ee0 13947->13950 13948->13914 13949->13932 13951 7ff63b89f310 95 API calls 13950->13951 13955 7ff63b8a1ee9 13950->13955 13953 7ff63b8a1f2c 13951->13953 13952 7ff63b8a21ce 13954 7ff63b8a21d4 memcpy 13952->13954 13953->13955 13956 7ff63b8a2058 SetLastError GetFullPathNameW 13953->13956 13957 7ff63b8648f0 95 API calls 13953->13957 13962 7ff63b8a2093 GetLastError 13953->13962 13964 7ff63b8a20fc 13953->13964 13974 7ff63b8a1f39 13953->13974 13954->13974 13955->13952 13955->13954 13960 7ff63b8a20f7 13955->13960 13955->13974 13956->13953 13958 7ff63b8a207a GetLastError 13956->13958 13957->13953 13958->13953 13961 7ff63b8a2162 GetLastError 13958->13961 13959 7ff63b8c76f0 95 API calls 13963 7ff63b8a223c 13959->13963 13960->13959 13965 7ff63b8a2193 13961->13965 13966 7ff63b8a2158 13961->13966 13962->13953 13967 7ff63b8a2214 13962->13967 13968 7ff63b8da760 95 API calls 13963->13968 13964->13963 13969 7ff63b8a2105 13964->13969 13971 7ff63b8522c0 HeapFree 13965->13971 13972 7ff63b8522c0 HeapFree 13966->13972 13966->13974 13970 7ff63b8d4530 95 API calls 13967->13970 13976 7ff63b8a222c 13968->13976 13973 7ff63b884ec0 95 API calls 13969->13973 13970->13976 13971->13966 13972->13974 13975 7ff63b8a211b 13973->13975 13974->13792 13975->13966 13981 7ff63b8522c0 HeapFree 13975->13981 13977 7ff63b8a2295 13976->13977 13978 7ff63b8522c0 HeapFree 13976->13978 13979 7ff63b8ea360 6 API calls 13976->13979 13980 7ff63b8522c0 HeapFree 13977->13980 13978->13976 13979->13976 13982 7ff63b8a22b1 13980->13982 13981->13966 13983 7ff63b8ea360 6 API calls 13982->13983 13984 7ff63b8a22b9 13983->13984 13985 7ff63b8a22e8 WaitOnAddress 13984->13985 13986 7ff63b8a22da WakeByAddressSingle 13984->13986 13987 7ff63b8a2305 GetLastError 13985->13987 13988 7ff63b8a230a 13985->13988 13986->13985 13987->13988 13989 7ff63b8a2314 13988->13989 13990 7ff63b8a2400 2 API calls 13988->13990 13989->13792 13990->13989 13993 7ff63b884ee7 13991->13993 14002 7ff63b884f13 13991->14002 13992 7ff63b885153 13994 7ff63b8c76f0 110 API calls 13992->13994 13993->13992 13993->14002 13996 7ff63b885161 13994->13996 13995 7ff63b88512f 13995->13817 13997 7ff63b88517c 13996->13997 13998 7ff63b8522c0 HeapFree 13996->13998 13999 7ff63b8ea360 6 API calls 13997->13999 13998->13997 14000 7ff63b885184 13999->14000 14028 7ff63b8947b0 14000->14028 14002->13995 14003 7ff63b884f40 memcpy 14002->14003 14016 7ff63b8647a0 14002->14016 14003->14002 14005 7ff63b8851e5 14005->13817 14007 7ff63b8557c0 HeapFree 14007->14005 14010 7ff63b8a2416 14008->14010 14009 7ff63b8a2440 14009->13831 14010->14009 14011 7ff63b8a245c WaitOnAddress 14010->14011 14011->14010 14012 7ff63b8a247c GetLastError 14011->14012 14012->14010 14014 7ff63b8d44b0 111 API calls 14013->14014 14015 7ff63b8da75e 14014->14015 14017 7ff63b864821 14016->14017 14018 7ff63b8647b1 14016->14018 14019 7ff63b8c76f0 111 API calls 14017->14019 14020 7ff63b8c76f0 111 API calls 14018->14020 14022 7ff63b86480e 14018->14022 14019->14018 14021 7ff63b864835 14020->14021 14023 7ff63b8c76f0 111 API calls 14021->14023 14024 7ff63b864858 14021->14024 14022->14002 14023->14024 14025 7ff63b8c76f0 111 API calls 14024->14025 14027 7ff63b8648c5 14024->14027 14026 7ff63b8648ec 14025->14026 14027->14002 14029 7ff63b8947e0 14028->14029 14030 7ff63b8947e8 NtReadFile 14028->14030 14029->14030 14031 7ff63b89483d 14030->14031 14032 7ff63b89482d WaitForSingleObject 14030->14032 14033 7ff63b8851b3 14031->14033 14034 7ff63b894851 14031->14034 14035 7ff63b89487d 14031->14035 14032->14031 14033->14005 14033->14007 14034->14033 14036 7ff63b89485d RtlNtStatusToDosError 14034->14036 14037 7ff63b882c30 108 API calls 14035->14037 14036->14033 14038 7ff63b8948b7 14037->14038 14040 7ff63b8d44b0 111 API calls 14039->14040 14041 7ff63b8c750c 14040->14041 14043 7ff63b8c841e 14042->14043 14052 7ff63b8c846b 14042->14052 14044 7ff63b8c84db 14043->14044 14043->14052 14047 7ff63b8c76f0 110 API calls 14044->14047 14045 7ff63b8c84bd 14046 7ff63b8522c0 HeapFree 14045->14046 14048 7ff63b8c84b8 14046->14048 14049 7ff63b8c84b6 14047->14049 14048->13502 14053 7ff63b8522c0 HeapFree 14049->14053 14050 7ff63b8c8496 14050->14048 14051 7ff63b8c76f0 110 API calls 14050->14051 14051->14049 14052->14045 14052->14048 14052->14050 14054 7ff63b8c8519 14053->14054 14055 7ff63b8ea360 6 API calls 14054->14055 14056 7ff63b8c8521 strlen 14055->14056 14056->13502 14058 7ff63b8e9ff9 abort 14057->14058 14058->13509 14060 7ff63b8a9c2e TlsGetValue 14059->14060 14061 7ff63b8a9ce2 14059->14061 14063 7ff63b874fc0 14060->14063 14065 7ff63b8a9c41 14060->14065 14120 7ff63b8a38c0 14061->14120 14063->13355 14063->13356 14064 7ff63b8a9cee TlsGetValue 14064->14063 14064->14065 14065->14063 14066 7ff63b8a9d03 14065->14066 14067 7ff63b8a9c88 TlsGetValue TlsSetValue 14065->14067 14068 7ff63b8c7710 106 API calls 14066->14068 14067->14063 14069 7ff63b8a9cad 14067->14069 14070 7ff63b8a9d12 14068->14070 14071 7ff63b8a9cc3 14069->14071 14075 7ff63b864290 HeapFree 14069->14075 14072 7ff63b8a9d2b 14070->14072 14076 7ff63b864290 HeapFree 14070->14076 14073 7ff63b8522c0 HeapFree 14071->14073 14074 7ff63b8ea360 6 API calls 14072->14074 14073->14063 14077 7ff63b8a9d33 ProcessPrng 14074->14077 14075->14071 14076->14072 14078 7ff63bb01c60 14077->14078 14080 7ff63b8a9bd1 14079->14080 14081 7ff63b8a9b3e TlsGetValue 14079->14081 14082 7ff63b8a38c0 107 API calls 14080->14082 14084 7ff63b8a9b4d 14081->14084 14087 7ff63b8a9b69 14081->14087 14083 7ff63b8a9bdd TlsGetValue 14082->14083 14083->14084 14083->14087 14085 7ff63b8a9bf2 14084->14085 14086 7ff63b8a9b8d TlsGetValue TlsSetValue 14084->14086 14084->14087 14089 7ff63b8c7710 107 API calls 14085->14089 14086->14087 14088 7ff63b8a9bb2 14086->14088 14087->13364 14090 7ff63b8522c0 HeapFree 14088->14090 14091 7ff63b8a9c01 14089->14091 14090->14087 14093 7ff63b8642a4 14092->14093 14094 7ff63b8642bf 14092->14094 14093->14094 14095 7ff63b8522c0 HeapFree 14093->14095 14094->13359 14095->14094 14099 7ff63b882c5f 14096->14099 14097 7ff63b882ca0 14098 7ff63b882caf 14097->14098 14101 7ff63b8557c0 HeapFree 14097->14101 14098->13364 14099->14097 14099->14098 14100 7ff63b8d44b0 111 API calls 14099->14100 14100->14097 14101->14098 14103 7ff63b8d44b0 111 API calls 14102->14103 14104 7ff63b8d432c 14103->14104 14104->13367 14106 7ff63b8757b0 111 API calls 14105->14106 14107 7ff63b856da1 14106->14107 14108 7ff63b8a9b20 111 API calls 14107->14108 14109 7ff63b856dc1 14108->14109 14110 7ff63b856dc6 14109->14110 14111 7ff63b856de9 14109->14111 14113 7ff63b856dda 14110->14113 14114 7ff63b8d44b0 111 API calls 14110->14114 14112 7ff63b8d42d0 111 API calls 14111->14112 14115 7ff63b856e01 14112->14115 14113->13383 14114->14115 14116 7ff63b864290 HeapFree 14115->14116 14117 7ff63b856e63 14115->14117 14116->14117 14118 7ff63b8ea360 6 API calls 14117->14118 14119 7ff63b856e6b 14118->14119 14119->13383 14121 7ff63b8a38d6 14120->14121 14122 7ff63b8a3955 14120->14122 14123 7ff63b8a3994 14121->14123 14124 7ff63b8a38fd 14121->14124 14128 7ff63b8a3966 14122->14128 14146 7ff63b85df40 14122->14146 14143 7ff63b85dec0 14123->14143 14127 7ff63b8a3903 TlsAlloc 14124->14127 14124->14128 14129 7ff63b8a39b7 14127->14129 14130 7ff63b8a3911 InitOnceComplete 14127->14130 14128->14064 14134 7ff63b8d44b0 108 API calls 14129->14134 14130->14128 14132 7ff63b8a3ad6 14136 7ff63b8a3aa8 14132->14136 14137 7ff63b8d4530 108 API calls 14132->14137 14133 7ff63b8a3a28 14133->14132 14135 7ff63b8a3ab2 14133->14135 14133->14136 14138 7ff63b8557c0 HeapFree 14133->14138 14134->14122 14135->14136 14139 7ff63b8d4530 108 API calls 14135->14139 14136->14064 14140 7ff63b8a3ba6 freeaddrinfo 14137->14140 14138->14133 14139->14132 14142 7ff63bb01868 14140->14142 14157 7ff63b8d4900 14143->14157 14147 7ff63b8d4900 111 API calls 14146->14147 14148 7ff63b85df85 14147->14148 14149 7ff63b8d4900 111 API calls 14148->14149 14150 7ff63b85dfd5 14149->14150 14151 7ff63b8d9ea7 14150->14151 14152 7ff63b8da6f0 111 API calls 14150->14152 14151->14133 14153 7ff63b8d9eef 14152->14153 14154 7ff63b8d9f97 14153->14154 14155 7ff63b8da6f0 111 API calls 14153->14155 14154->14133 14156 7ff63b8d9fdf 14155->14156 14158 7ff63b8d4932 14157->14158 14159 7ff63b8d49f6 14158->14159 14160 7ff63b8d44b0 111 API calls 14158->14160 14161 7ff63b8d44b0 111 API calls 14159->14161 14160->14158 14162 7ff63b8d4a85 14161->14162 14163 7ff63b8d44b0 111 API calls 14162->14163 14164 7ff63b8d4b10 14163->14164 14189 7ff63b8517b0 14165->14189 14166 7ff63b8514cd 14166->13406 14168 7ff63b880a70 14166->14168 14539 7ff63b880880 14168->14539 14170 7ff63b880a83 14171 7ff63b851528 14170->14171 14578 7ff63b880240 14170->14578 14175 7ff63b851630 14171->14175 14173 7ff63b880aa5 14173->14171 14174 7ff63b8557c0 HeapFree 14173->14174 14174->14171 14176 7ff63b851532 14175->14176 14177 7ff63b851648 14175->14177 14176->13335 14177->14176 14178 7ff63b851685 14177->14178 14179 7ff63b8522c0 HeapFree 14177->14179 14179->14178 14872 7ff63b8d45c0 14180->14872 14190 7ff63b851839 14189->14190 14191 7ff63b8517be 14189->14191 14192 7ff63b8c76f0 111 API calls 14190->14192 14193 7ff63b8c76f0 111 API calls 14191->14193 14195 7ff63b851826 14191->14195 14192->14191 14194 7ff63b85184f 14193->14194 14263 7ff63b8773f0 14194->14263 14195->14166 14197 7ff63b851898 14266 7ff63b8891b0 14197->14266 14198 7ff63b851887 14198->14197 14200 7ff63b852004 14198->14200 14201 7ff63b8518e1 14198->14201 14203 7ff63b8c76f0 111 API calls 14200->14203 14201->14197 14204 7ff63b8522c0 HeapFree 14201->14204 14202 7ff63b851945 14315 7ff63b8896d0 14202->14315 14242 7ff63b852013 14203->14242 14204->14197 14206 7ff63b852052 14208 7ff63b8520f8 14206->14208 14210 7ff63b8522c0 HeapFree 14206->14210 14207 7ff63b85195a 14211 7ff63b851450 162 API calls 14207->14211 14212 7ff63b851962 14207->14212 14214 7ff63b8522c0 HeapFree 14208->14214 14216 7ff63b852118 14208->14216 14209 7ff63b8522c0 HeapFree 14209->14206 14210->14208 14217 7ff63b851adf 14211->14217 14218 7ff63b8522c0 HeapFree 14212->14218 14221 7ff63b851995 14212->14221 14213 7ff63b851ac1 14213->14166 14214->14216 14215 7ff63b852168 14219 7ff63b8ea360 6 API calls 14215->14219 14216->14215 14222 7ff63b8522c0 HeapFree 14216->14222 14217->14212 14220 7ff63b8522c0 HeapFree 14217->14220 14218->14221 14223 7ff63b852170 14219->14223 14220->14212 14221->14213 14224 7ff63b8891b0 117 API calls 14221->14224 14222->14215 14225 7ff63b8519e2 14224->14225 14226 7ff63b8891b0 117 API calls 14225->14226 14227 7ff63b851a0f 14226->14227 14321 7ff63b852180 14227->14321 14229 7ff63b851a67 14230 7ff63b851a87 14229->14230 14232 7ff63b8522c0 HeapFree 14229->14232 14233 7ff63b851aa7 14230->14233 14235 7ff63b8522c0 HeapFree 14230->14235 14231 7ff63b851a31 14231->14229 14234 7ff63b852180 162 API calls 14231->14234 14232->14230 14233->14213 14236 7ff63b8522c0 HeapFree 14233->14236 14237 7ff63b851a5b 14234->14237 14235->14233 14236->14213 14237->14229 14238 7ff63b851b42 14237->14238 14239 7ff63b852015 14237->14239 14336 7ff63b8a1230 14238->14336 14346 7ff63b8d42b0 14239->14346 14242->14206 14242->14209 14243 7ff63b852023 14244 7ff63b8c76f0 111 API calls 14243->14244 14244->14242 14245 7ff63b851bba 14245->14243 14248 7ff63b851d40 14245->14248 14246 7ff63b851ec3 14247 7ff63b851ee8 CreateProcessW 14246->14247 14249 7ff63b8522c0 HeapFree 14246->14249 14250 7ff63b851f32 CloseHandle CloseHandle 14247->14250 14257 7ff63b851fc6 14247->14257 14248->14246 14251 7ff63b8517b0 162 API calls 14248->14251 14249->14247 14252 7ff63b851f65 14250->14252 14253 7ff63b851f51 14250->14253 14251->14248 14255 7ff63b851f85 14252->14255 14258 7ff63b8522c0 HeapFree 14252->14258 14254 7ff63b8522c0 HeapFree 14253->14254 14254->14252 14256 7ff63b851fa5 14255->14256 14259 7ff63b8522c0 HeapFree 14255->14259 14260 7ff63b851fbf 14256->14260 14262 7ff63b8522c0 HeapFree 14256->14262 14257->14229 14261 7ff63b8522c0 HeapFree 14257->14261 14258->14255 14259->14256 14260->14213 14261->14229 14262->14260 14349 7ff63b877510 14263->14349 14265 7ff63b877413 14265->14198 14267 7ff63b8891fc memcpy 14266->14267 14271 7ff63b8891d1 14266->14271 14384 7ff63b886f40 14267->14384 14269 7ff63b889259 14273 7ff63b8c76f0 111 API calls 14269->14273 14271->14267 14271->14269 14274 7ff63b889267 14273->14274 14275 7ff63b889282 14274->14275 14276 7ff63b8522c0 HeapFree 14274->14276 14277 7ff63b8ea360 6 API calls 14275->14277 14276->14275 14281 7ff63b88928a 14277->14281 14278 7ff63b8892e0 memcpy 14388 7ff63b888360 14278->14388 14279 7ff63b889390 14284 7ff63b8c76f0 111 API calls 14279->14284 14281->14278 14281->14279 14286 7ff63b88939e 14284->14286 14289 7ff63b8893b9 14286->14289 14291 7ff63b8522c0 HeapFree 14286->14291 14292 7ff63b8ea360 6 API calls 14289->14292 14291->14289 14293 7ff63b8893c1 14292->14293 14294 7ff63b888360 111 API calls 14293->14294 14299 7ff63b889400 14294->14299 14297 7ff63b889463 14300 7ff63b8894cc memcpy 14297->14300 14301 7ff63b8647a0 111 API calls 14297->14301 14298 7ff63b889524 14303 7ff63b8c76f0 111 API calls 14298->14303 14299->14297 14299->14298 14305 7ff63b889532 14299->14305 14391 7ff63b887c30 14300->14391 14301->14300 14303->14305 14307 7ff63b8da760 111 API calls 14305->14307 14306 7ff63b889501 14306->14202 14308 7ff63b889541 14307->14308 14309 7ff63b88955c 14308->14309 14310 7ff63b8522c0 HeapFree 14308->14310 14311 7ff63b8ea360 6 API calls 14309->14311 14310->14309 14312 7ff63b889564 14311->14312 14313 7ff63b8a1370 111 API calls 14312->14313 14314 7ff63b88958f 14313->14314 14499 7ff63b8930b0 14315->14499 14318 7ff63b889715 14318->14207 14319 7ff63b8557c0 HeapFree 14320 7ff63b88970a 14319->14320 14320->14207 14527 7ff63b852400 14321->14527 14324 7ff63b8521b0 14325 7ff63b851450 165 API calls 14324->14325 14326 7ff63b8521b7 14325->14326 14326->14231 14327 7ff63b8521b9 14530 7ff63b8888e0 14327->14530 14329 7ff63b8521e8 14330 7ff63b8521ec 14329->14330 14331 7ff63b8521ff 14329->14331 14332 7ff63b8794c0 116 API calls 14330->14332 14333 7ff63b851450 165 API calls 14331->14333 14334 7ff63b8521fd 14332->14334 14333->14334 14334->14326 14335 7ff63b8522c0 HeapFree 14334->14335 14335->14326 14339 7ff63b8a124c 14336->14339 14341 7ff63b8a1273 memcpy 14336->14341 14338 7ff63b8a12aa 14340 7ff63b8c76f0 111 API calls 14338->14340 14339->14338 14339->14341 14342 7ff63b8a12b8 14340->14342 14341->14245 14343 7ff63b8a12ea memcpy 14342->14343 14345 7ff63b8647a0 111 API calls 14342->14345 14343->14245 14345->14343 14347 7ff63b8d4530 111 API calls 14346->14347 14348 7ff63b8d42ce 14347->14348 14350 7ff63b89f310 111 API calls 14349->14350 14351 7ff63b877541 14350->14351 14352 7ff63b87754a 14351->14352 14358 7ff63b87755b 14351->14358 14353 7ff63b8557c0 HeapFree 14352->14353 14354 7ff63b877553 14353->14354 14354->14265 14355 7ff63b877638 SetLastError GetEnvironmentVariableW 14357 7ff63b877658 GetLastError 14355->14357 14355->14358 14356 7ff63b8648f0 111 API calls 14356->14358 14357->14358 14359 7ff63b877730 GetLastError 14357->14359 14358->14355 14358->14356 14360 7ff63b877671 GetLastError 14358->14360 14364 7ff63b8776a3 14358->14364 14361 7ff63b877710 14359->14361 14362 7ff63b877761 14359->14362 14360->14358 14363 7ff63b8777c7 14360->14363 14369 7ff63b8557c0 HeapFree 14361->14369 14373 7ff63b877719 14361->14373 14365 7ff63b8522c0 HeapFree 14362->14365 14368 7ff63b8d4530 111 API calls 14363->14368 14366 7ff63b8776ac 14364->14366 14367 7ff63b8777e1 14364->14367 14365->14361 14370 7ff63b884ec0 111 API calls 14366->14370 14372 7ff63b8da760 111 API calls 14367->14372 14371 7ff63b8777df 14368->14371 14369->14373 14374 7ff63b8776c2 14370->14374 14375 7ff63b877805 14371->14375 14376 7ff63b8ea360 6 API calls 14371->14376 14380 7ff63b8522c0 HeapFree 14371->14380 14372->14371 14373->14354 14377 7ff63b8522c0 HeapFree 14373->14377 14374->14361 14378 7ff63b8522c0 HeapFree 14374->14378 14379 7ff63b8522c0 HeapFree 14375->14379 14376->14371 14377->14354 14378->14361 14381 7ff63b877865 14379->14381 14380->14371 14382 7ff63b8ea360 6 API calls 14381->14382 14383 7ff63b87786d 14382->14383 14383->14265 14385 7ff63b886f75 14384->14385 14386 7ff63b8a1370 111 API calls 14385->14386 14387 7ff63b886fa0 14386->14387 14389 7ff63b8a1370 111 API calls 14388->14389 14390 7ff63b888387 14389->14390 14392 7ff63b887cd8 14391->14392 14394 7ff63b887c5f 14391->14394 14393 7ff63b888360 111 API calls 14392->14393 14397 7ff63b887ceb 14393->14397 14394->14392 14396 7ff63b8d44b0 111 API calls 14394->14396 14395 7ff63b887d15 14395->14306 14396->14392 14397->14395 14398 7ff63b8d4530 111 API calls 14397->14398 14400 7ff63b887daf 14397->14400 14398->14397 14399 7ff63b887e3e 14441 7ff63b8a0880 14399->14441 14400->14395 14400->14399 14402 7ff63b887e81 14400->14402 14408 7ff63b887de2 14400->14408 14404 7ff63b8c76f0 111 API calls 14402->14404 14403 7ff63b887e5e 14405 7ff63b8a0880 113 API calls 14403->14405 14406 7ff63b887e88 14404->14406 14405->14395 14407 7ff63b8c76f0 111 API calls 14406->14407 14409 7ff63b887e95 14407->14409 14408->14399 14408->14406 14410 7ff63b888360 111 API calls 14409->14410 14412 7ff63b887ecf 14410->14412 14411 7ff63b887f9e 14411->14306 14412->14411 14413 7ff63b887f12 14412->14413 14416 7ff63b8d4530 111 API calls 14412->14416 14414 7ff63b887f70 14413->14414 14417 7ff63b887fb3 14413->14417 14422 7ff63b887f35 14413->14422 14415 7ff63b8a0880 113 API calls 14414->14415 14418 7ff63b887f90 14415->14418 14416->14412 14419 7ff63b8c76f0 111 API calls 14417->14419 14420 7ff63b8a0880 113 API calls 14418->14420 14421 7ff63b887fba 14419->14421 14420->14411 14423 7ff63b8c76f0 111 API calls 14421->14423 14422->14414 14422->14421 14427 7ff63b887fc7 14423->14427 14424 7ff63b88800b memcpy 14424->14306 14425 7ff63b888032 14428 7ff63b8c76f0 111 API calls 14425->14428 14427->14424 14427->14425 14435 7ff63b88803f 14428->14435 14429 7ff63b88d78c 14429->14306 14430 7ff63b88d77e 14431 7ff63b88d7e0 111 API calls 14430->14431 14431->14429 14432 7ff63b88d7cc 14433 7ff63b8da7d0 111 API calls 14432->14433 14436 7ff63b88d7de 14433->14436 14434 7ff63b88d7ba 14437 7ff63b8da760 111 API calls 14434->14437 14435->14429 14435->14430 14435->14432 14435->14434 14439 7ff63b88d76c 14435->14439 14456 7ff63b88d7e0 14435->14456 14437->14432 14440 7ff63b8da6f0 111 API calls 14439->14440 14440->14430 14442 7ff63b8a08b1 14441->14442 14444 7ff63b8a0997 14442->14444 14445 7ff63b8a091d 14442->14445 14443 7ff63b8a0988 memcpy 14443->14403 14444->14443 14447 7ff63b8647a0 111 API calls 14444->14447 14448 7ff63b8a094b 14445->14448 14449 7ff63b8a0a7c 14445->14449 14447->14443 14461 7ff63b88d4d0 14448->14461 14450 7ff63b8647a0 111 API calls 14449->14450 14452 7ff63b8a0a8a 14450->14452 14454 7ff63b8647a0 111 API calls 14452->14454 14453 7ff63b8a0971 14453->14443 14453->14452 14455 7ff63b8a0aa0 14454->14455 14458 7ff63b88d843 14456->14458 14457 7ff63b88da47 14457->14435 14458->14457 14466 7ff63b8e9490 14458->14466 14494 7ff63b8dd3c0 14458->14494 14462 7ff63b88d4ef 14461->14462 14463 7ff63b88d586 memcpy 14462->14463 14464 7ff63b8647a0 111 API calls 14462->14464 14463->14453 14465 7ff63b88d5b7 14464->14465 14465->14463 14468 7ff63b8e94c0 14466->14468 14467 7ff63b8e95ae 14469 7ff63b8d4670 111 API calls 14467->14469 14468->14467 14473 7ff63b8e956d 14468->14473 14475 7ff63b8d4670 111 API calls 14468->14475 14472 7ff63b8e95c2 14469->14472 14470 7ff63b8e962c 14470->14458 14471 7ff63b8e9604 14476 7ff63b8e963e 14471->14476 14477 7ff63b8d4670 111 API calls 14471->14477 14478 7ff63b8e961f 14471->14478 14472->14470 14472->14471 14474 7ff63b8d4670 111 API calls 14472->14474 14473->14458 14474->14471 14475->14467 14476->14478 14479 7ff63b8d4670 111 API calls 14476->14479 14477->14476 14478->14458 14485 7ff63b8e96bc 14479->14485 14480 7ff63b8e97de 14481 7ff63b8d4670 111 API calls 14480->14481 14482 7ff63b8e97f2 14481->14482 14484 7ff63b8e985c 14482->14484 14486 7ff63b8e9834 14482->14486 14487 7ff63b8d4670 111 API calls 14482->14487 14483 7ff63b8e979d 14483->14458 14484->14458 14485->14480 14485->14483 14488 7ff63b8d4670 111 API calls 14485->14488 14489 7ff63b8e986e 14486->14489 14490 7ff63b8e984f 14486->14490 14491 7ff63b8d4670 111 API calls 14486->14491 14487->14486 14488->14480 14489->14490 14492 7ff63b8d4670 111 API calls 14489->14492 14490->14458 14491->14489 14493 7ff63b8e98ec 14492->14493 14493->14458 14495 7ff63b8dd3d7 14494->14495 14498 7ff63b8dd3cf 14494->14498 14496 7ff63b8dd290 111 API calls 14495->14496 14495->14498 14497 7ff63b8dd459 14496->14497 14497->14458 14498->14458 14509 7ff63b893220 14499->14509 14502 7ff63b893220 112 API calls 14503 7ff63b89311b 14502->14503 14504 7ff63b893121 14503->14504 14505 7ff63b89316c 14503->14505 14506 7ff63b8557c0 HeapFree 14504->14506 14507 7ff63b8896ef 14505->14507 14508 7ff63b8557c0 HeapFree 14505->14508 14506->14507 14507->14318 14507->14319 14508->14507 14510 7ff63b891020 111 API calls 14509->14510 14511 7ff63b8932a2 14510->14511 14512 7ff63b89336e 14511->14512 14516 7ff63b8932ae 14511->14516 14513 7ff63b8912c0 GetLastError 14512->14513 14515 7ff63b893379 CloseHandle 14513->14515 14514 7ff63b8930da 14514->14502 14514->14507 14515->14514 14516->14514 14517 7ff63b89f310 111 API calls 14516->14517 14518 7ff63b8932f2 14517->14518 14519 7ff63b893348 14518->14519 14520 7ff63b8a1800 111 API calls 14518->14520 14521 7ff63b8557c0 HeapFree 14519->14521 14525 7ff63b893335 14520->14525 14521->14514 14522 7ff63b89344f 14522->14514 14523 7ff63b8522c0 HeapFree 14522->14523 14523->14514 14524 7ff63b8933e3 14524->14519 14526 7ff63b8522c0 HeapFree 14524->14526 14525->14519 14525->14522 14525->14524 14526->14519 14533 7ff63b8528f0 14527->14533 14529 7ff63b85219f 14529->14324 14529->14327 14531 7ff63b8a1370 111 API calls 14530->14531 14532 7ff63b888919 14531->14532 14534 7ff63b852917 14533->14534 14535 7ff63b852920 CoTaskMemFree 14534->14535 14536 7ff63b852934 14534->14536 14538 7ff63b852949 14535->14538 14537 7ff63b884ec0 111 API calls 14536->14537 14537->14538 14538->14529 14540 7ff63b8808f6 14539->14540 14541 7ff63b88089e 14539->14541 14540->14170 14647 7ff63b8a99f0 14541->14647 14544 7ff63b8808db 14547 7ff63b8808ef 14544->14547 14666 7ff63b88ee00 14544->14666 14545 7ff63b8a2400 2 API calls 14545->14544 14548 7ff63b88094c 14547->14548 14549 7ff63b880968 14547->14549 14550 7ff63b8809ec 14548->14550 14551 7ff63b880955 14548->14551 14552 7ff63b880962 14549->14552 14556 7ff63b8557c0 HeapFree 14549->14556 14555 7ff63b8d44b0 111 API calls 14550->14555 14554 7ff63b8557c0 HeapFree 14551->14554 14553 7ff63b88099c 14552->14553 14560 7ff63b88ee00 111 API calls 14552->14560 14557 7ff63b8809b6 14553->14557 14558 7ff63b8809ae WakeByAddressSingle 14553->14558 14554->14552 14559 7ff63b880a1e 14555->14559 14556->14552 14557->14540 14672 7ff63b8644e0 14557->14672 14558->14557 14676 7ff63b8559a0 14559->14676 14560->14553 14564 7ff63b880a59 14566 7ff63b8ea360 6 API calls 14564->14566 14565 7ff63b8644e0 HeapFree 14565->14564 14567 7ff63b880a61 14566->14567 14568 7ff63b8d47c0 111 API calls 14567->14568 14569 7ff63b880a66 14568->14569 14570 7ff63b8d47c0 111 API calls 14569->14570 14571 7ff63b880a6b 14570->14571 14572 7ff63b880880 143 API calls 14571->14572 14573 7ff63b880a83 14572->14573 14574 7ff63b880ab6 14573->14574 14575 7ff63b880240 143 API calls 14573->14575 14574->14170 14576 7ff63b880aa5 14575->14576 14576->14574 14577 7ff63b8557c0 HeapFree 14576->14577 14577->14574 14704 7ff63b8750e0 14578->14704 14580 7ff63b88025b 14581 7ff63b880279 14580->14581 14582 7ff63b880266 14580->14582 14584 7ff63b8a2400 2 API calls 14581->14584 14586 7ff63b880272 14581->14586 14583 7ff63b880325 14582->14583 14582->14586 14585 7ff63b8d42d0 111 API calls 14583->14585 14584->14586 14587 7ff63b88033d 14585->14587 14589 7ff63b8802d6 14586->14589 14590 7ff63b8802c6 14586->14590 14588 7ff63b8d44b0 111 API calls 14587->14588 14591 7ff63b88036f 14588->14591 14592 7ff63b8802cb 14589->14592 14594 7ff63b8557c0 HeapFree 14589->14594 14590->14587 14590->14592 14595 7ff63b8ea360 6 API calls 14591->14595 14593 7ff63b88030e 14592->14593 14596 7ff63b8802ff WakeByAddressSingle 14592->14596 14593->14173 14594->14592 14597 7ff63b880385 14595->14597 14596->14593 14598 7ff63b880397 14597->14598 14599 7ff63b8557c0 HeapFree 14597->14599 14600 7ff63b8ea360 6 API calls 14598->14600 14599->14598 14601 7ff63b8803a8 14600->14601 14602 7ff63b8d47c0 111 API calls 14601->14602 14603 7ff63b8803ad 14602->14603 14604 7ff63b88042c 14603->14604 14605 7ff63b8803c6 14603->14605 14762 7ff63b8d12d0 14604->14762 14729 7ff63b89e240 14605->14729 14609 7ff63b880417 14609->14173 14615 7ff63b8557c0 HeapFree 14615->14609 14648 7ff63b8a9a0e TlsGetValue 14647->14648 14649 7ff63b8a9ac2 14647->14649 14651 7ff63b8808aa 14648->14651 14653 7ff63b8a9a21 14648->14653 14650 7ff63b8a38c0 107 API calls 14649->14650 14652 7ff63b8a9ace TlsGetValue 14650->14652 14651->14540 14651->14544 14651->14545 14652->14651 14652->14653 14653->14651 14654 7ff63b8a9ae3 14653->14654 14655 7ff63b8a9a68 TlsGetValue TlsSetValue 14653->14655 14656 7ff63b8c7710 107 API calls 14654->14656 14655->14651 14657 7ff63b8a9a8d 14655->14657 14661 7ff63b8a9af2 14656->14661 14658 7ff63b8a9aa3 14657->14658 14663 7ff63b8644e0 HeapFree 14657->14663 14660 7ff63b8522c0 HeapFree 14658->14660 14659 7ff63b8a9b0b 14662 7ff63b8ea360 6 API calls 14659->14662 14660->14651 14661->14659 14664 7ff63b8644e0 HeapFree 14661->14664 14665 7ff63b8a9b13 14662->14665 14663->14658 14664->14659 14680 7ff63b8a9800 14666->14680 14668 7ff63b88ee11 14669 7ff63b88ee16 14668->14669 14670 7ff63b8d4a90 111 API calls 14668->14670 14669->14547 14671 7ff63b88ee4b 14670->14671 14673 7ff63b8644f7 14672->14673 14674 7ff63b864506 14672->14674 14675 7ff63b8522c0 HeapFree 14673->14675 14674->14540 14675->14674 14677 7ff63b8559be 14676->14677 14678 7ff63b8559af 14676->14678 14677->14564 14677->14565 14678->14677 14679 7ff63b88ee00 111 API calls 14678->14679 14679->14677 14681 7ff63b8a9820 TlsGetValue 14680->14681 14682 7ff63b8a98c2 14680->14682 14684 7ff63b8a9854 14681->14684 14685 7ff63b8a9833 14681->14685 14683 7ff63b8a38c0 104 API calls 14682->14683 14683->14685 14684->14668 14685->14684 14686 7ff63b8a98e3 14685->14686 14687 7ff63b8a9879 TlsGetValue TlsSetValue 14685->14687 14688 7ff63b8c7710 104 API calls 14686->14688 14687->14684 14689 7ff63b8a98a1 14687->14689 14690 7ff63b8a98f2 14688->14690 14691 7ff63b8522c0 HeapFree 14689->14691 14692 7ff63b8a991e TlsGetValue 14690->14692 14693 7ff63b8a9936 14690->14693 14691->14684 14694 7ff63b8a992d 14692->14694 14697 7ff63b8a9951 14692->14697 14695 7ff63b8a38c0 104 API calls 14693->14695 14694->14668 14696 7ff63b8a9942 TlsGetValue 14695->14696 14696->14694 14696->14697 14697->14694 14698 7ff63b8a99da 14697->14698 14699 7ff63b8a998a TlsGetValue TlsSetValue 14697->14699 14700 7ff63b8c7710 104 API calls 14698->14700 14699->14694 14701 7ff63b8a99b3 14699->14701 14702 7ff63b8a99e9 14700->14702 14703 7ff63b8522c0 HeapFree 14701->14703 14703->14694 14705 7ff63b8a9b20 111 API calls 14704->14705 14706 7ff63b8750f2 14705->14706 14708 7ff63b8a9c10 111 API calls 14706->14708 14718 7ff63b875156 14706->14718 14727 7ff63b875138 14706->14727 14707 7ff63b8d4a90 111 API calls 14709 7ff63b875180 14707->14709 14710 7ff63b875106 14708->14710 14711 7ff63b8d42d0 111 API calls 14709->14711 14710->14709 14714 7ff63b875113 14710->14714 14716 7ff63b856d80 111 API calls 14710->14716 14712 7ff63b875198 14711->14712 14713 7ff63b8a9c10 111 API calls 14712->14713 14715 7ff63b8751b2 14713->14715 14717 7ff63b875119 14714->14717 14714->14718 14719 7ff63b8751c2 14715->14719 14722 7ff63b856d80 111 API calls 14715->14722 14716->14714 14717->14709 14720 7ff63b87511e 14717->14720 14718->14707 14721 7ff63b8d42d0 111 API calls 14719->14721 14725 7ff63b8751cd 14719->14725 14724 7ff63b864290 HeapFree 14720->14724 14720->14727 14723 7ff63b8751ff SwitchToThread 14721->14723 14722->14719 14728 7ff63bb01ba8 14723->14728 14724->14727 14725->14580 14727->14580 14730 7ff63b89e25a GetStdHandle 14729->14730 14743 7ff63b8803df 14729->14743 14731 7ff63b89e275 14730->14731 14730->14743 14732 7ff63b89e27b GetLastError 14731->14732 14733 7ff63b89e2ac 14731->14733 14732->14743 14734 7ff63b89e383 14733->14734 14735 7ff63b89e2c7 14733->14735 14836 7ff63b8948d0 14734->14836 14737 7ff63b89e2d4 14735->14737 14741 7ff63b89e399 14735->14741 14738 7ff63b89e445 14737->14738 14739 7ff63b89e2dd 14737->14739 14740 7ff63b8d44b0 111 API calls 14738->14740 14742 7ff63b89e477 14739->14742 14739->14743 14749 7ff63b89e324 14739->14749 14740->14742 14741->14743 14745 7ff63b89e3cf 14741->14745 14746 7ff63b89e48e 14741->14746 14753 7ff63b89e3e6 14741->14753 14744 7ff63b8da760 111 API calls 14742->14744 14743->14609 14743->14615 14744->14746 14750 7ff63b89e4a3 14745->14750 14745->14753 14748 7ff63b8da760 111 API calls 14746->14748 14747 7ff63b89e530 137 API calls 14747->14743 14748->14750 14749->14743 14751 7ff63b89e4d3 14749->14751 14752 7ff63b89e354 14749->14752 14754 7ff63b8d4a90 111 API calls 14750->14754 14844 7ff63b85df00 14751->14844 14767 7ff63b89e530 14752->14767 14753->14747 14754->14751 14758 7ff63b85df00 111 API calls 14759 7ff63b89e513 CloseHandle 14758->14759 14760 7ff63b8ea360 6 API calls 14759->14760 14761 7ff63b89e526 14760->14761 14763 7ff63b8d44b0 111 API calls 14762->14763 14764 7ff63b8d1324 14763->14764 14765 7ff63b8d44b0 111 API calls 14764->14765 14766 7ff63b8d1384 14765->14766 14769 7ff63b89e540 14767->14769 14768 7ff63b89e59c MultiByteToWideChar 14770 7ff63b89e729 14768->14770 14771 7ff63b89e5ca 14768->14771 14769->14768 14772 7ff63b89e7a2 14769->14772 14775 7ff63b8d44b0 111 API calls 14770->14775 14773 7ff63b89e5d8 WriteConsoleW 14771->14773 14774 7ff63b89e76a 14771->14774 14852 7ff63b8dc340 14772->14852 14778 7ff63b89e6fe GetLastError 14773->14778 14779 7ff63b89e609 14773->14779 14776 7ff63b8da760 111 API calls 14774->14776 14775->14774 14780 7ff63b89e77e 14776->14780 14788 7ff63b89e35f 14778->14788 14779->14780 14783 7ff63b89e61e 14779->14783 14779->14788 14847 7ff63b8d4670 14780->14847 14784 7ff63b89e697 14783->14784 14786 7ff63b89e632 WriteConsoleW 14783->14786 14784->14788 14789 7ff63b8da760 111 API calls 14784->14789 14786->14784 14787 7ff63b89e66c GetLastError 14786->14787 14791 7ff63b8557c0 HeapFree 14787->14791 14788->14743 14788->14758 14789->14772 14791->14784 14837 7ff63b894900 14836->14837 14838 7ff63b894908 NtWriteFile 14836->14838 14837->14838 14839 7ff63b89494d WaitForSingleObject 14838->14839 14841 7ff63b894964 14838->14841 14840 7ff63b894990 14839->14840 14839->14841 14842 7ff63b882c30 111 API calls 14840->14842 14841->14743 14843 7ff63b8949ca 14842->14843 14845 7ff63b8d4900 111 API calls 14844->14845 14846 7ff63b85df37 14845->14846 14848 7ff63b8d44b0 111 API calls 14847->14848 14849 7ff63b8d46de 14848->14849 14850 7ff63b8d44f0 111 API calls 14849->14850 14851 7ff63b8d479f 14850->14851 14857 7ff63b8dc3a0 14852->14857 14855 7ff63b8d44b0 111 API calls 14856 7ff63b8dc399 14855->14856 14859 7ff63b8dc3cb 14857->14859 14858 7ff63b8dc42f 14860 7ff63b8d44b0 111 API calls 14858->14860 14859->14858 14861 7ff63b8dc547 14859->14861 14863 7ff63b8d44b0 111 API calls 14859->14863 14864 7ff63b8dc55a 14859->14864 14860->14861 14862 7ff63b8dc340 111 API calls 14861->14862 14862->14864 14863->14858 14865 7ff63b8da7d0 111 API calls 14864->14865 14868 7ff63b8dc5b1 14864->14868 14865->14868 14866 7ff63b8d42b0 111 API calls 14866->14868 14867 7ff63b8dc340 111 API calls 14867->14868 14868->14866 14868->14867 14870 7ff63b8dc644 14868->14870 14869 7ff63b8d44b0 111 API calls 14871 7ff63b8dc358 14869->14871 14870->14869 14871->14855 14873 7ff63b8d44f0 111 API calls 14872->14873 14874 7ff63b8d4603 14873->14874 14875 7ff63b8d44b0 111 API calls 14874->14875 14876 7ff63b8d4667 14875->14876 14877 7ff63b8d44b0 111 API calls 14876->14877 14878 7ff63b8d46de 14877->14878 14879 7ff63b8d44f0 111 API calls 14878->14879 14880 7ff63b8d479f 14879->14880

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 7ff63b8517b0-7ff63b8517bc 1 7ff63b851839-7ff63b85183b call 7ff63b8c76f0 0->1 2 7ff63b8517be-7ff63b8517f1 0->2 7 7ff63b851840-7ff63b851896 call 7ff63b8c76f0 call 7ff63b8773f0 1->7 3 7ff63b851808 2->3 4 7ff63b8517f3-7ff63b851806 2->4 6 7ff63b85180a-7ff63b851824 call 7ff63b851720 3->6 4->6 6->7 12 7ff63b851826-7ff63b851838 6->12 15 7ff63b851898-7ff63b8518b0 7->15 16 7ff63b8518b2-7ff63b8518db call 7ff63b8522b0 7->16 18 7ff63b851922-7ff63b85195c call 7ff63b8891b0 call 7ff63b8a0760 call 7ff63b8896d0 15->18 21 7ff63b852004-7ff63b852013 call 7ff63b8c76f0 16->21 22 7ff63b8518e1-7ff63b85190a 16->22 39 7ff63b851ad8-7ff63b851aed call 7ff63b851450 18->39 40 7ff63b851962-7ff63b851982 18->40 31 7ff63b852030-7ff63b852038 21->31 24 7ff63b85190c-7ff63b851918 call 7ff63b8522c0 22->24 25 7ff63b85191d 22->25 24->25 25->18 33 7ff63b8520d8-7ff63b8520e3 31->33 34 7ff63b85203e-7ff63b852052 call 7ff63b8522c0 31->34 36 7ff63b8520f8-7ff63b852103 33->36 37 7ff63b8520e5-7ff63b8520f3 call 7ff63b8522c0 33->37 34->33 42 7ff63b852118-7ff63b852120 36->42 43 7ff63b852105-7ff63b852113 call 7ff63b8522c0 36->43 37->36 55 7ff63b851b02-7ff63b851b08 39->55 56 7ff63b851aef-7ff63b851afd call 7ff63b8522c0 39->56 46 7ff63b851984-7ff63b851990 call 7ff63b8522c0 40->46 47 7ff63b851995-7ff63b851998 40->47 51 7ff63b852168-7ff63b852171 call 7ff63b8ea360 42->51 52 7ff63b852122-7ff63b852163 call 7ff63b8522c0 42->52 43->42 46->47 48 7ff63b85199e-7ff63b851a37 call 7ff63b8a0760 call 7ff63b8891b0 call 7ff63b8a0760 call 7ff63b8891b0 call 7ff63b8a0760 call 7ff63b852180 47->48 49 7ff63b851ac1-7ff63b851ad7 47->49 75 7ff63b851a67-7ff63b851a72 48->75 76 7ff63b851a39-7ff63b851a61 call 7ff63b8a0760 call 7ff63b852180 48->76 52->51 55->46 61 7ff63b851b0e 55->61 56->55 61->47 77 7ff63b851a87-7ff63b851a92 75->77 78 7ff63b851a74-7ff63b851a82 call 7ff63b8522c0 75->78 76->75 89 7ff63b851b13-7ff63b851b3c call 7ff63b8a0760 call 7ff63b879070 76->89 82 7ff63b851aa7-7ff63b851aaf 77->82 83 7ff63b851a94-7ff63b851aa2 call 7ff63b8522c0 77->83 78->77 82->49 86 7ff63b851ab1-7ff63b851abc call 7ff63b8522c0 82->86 83->82 86->49 94 7ff63b851b42-7ff63b851c06 call 7ff63b8a1230 call 7ff63b8a0760 89->94 95 7ff63b852015-7ff63b852021 call 7ff63b8d42b0 89->95 102 7ff63b851d1b-7ff63b851d3a call 7ff63b8522b0 94->102 103 7ff63b851c0c-7ff63b851c0f 94->103 95->31 112 7ff63b852025-7ff63b85202b call 7ff63b8c76f0 102->112 113 7ff63b851d40-7ff63b851d61 102->113 103->102 105 7ff63b851c15-7ff63b851c1c 103->105 106 7ff63b851c29-7ff63b851c3c 105->106 107 7ff63b851c1e-7ff63b851c24 105->107 110 7ff63b851c73-7ff63b851c83 106->110 111 7ff63b851c3e-7ff63b851c50 106->111 109 7ff63b851cc8-7ff63b851ccd 107->109 117 7ff63b851ccf-7ff63b851d0d 109->117 110->109 114 7ff63b851c52-7ff63b851c71 111->114 115 7ff63b851c85-7ff63b851c91 111->115 112->31 118 7ff63b851d7e-7ff63b851d81 113->118 121 7ff63b851c94-7ff63b851c9b 114->121 115->121 122 7ff63b852023 117->122 123 7ff63b851d13-7ff63b851d16 117->123 119 7ff63b851d83-7ff63b851d86 118->119 120 7ff63b851de0-7ff63b851dea 118->120 124 7ff63b851d88-7ff63b851d8a 119->124 125 7ff63b851dc0-7ff63b851dc3 119->125 127 7ff63b851ec3-7ff63b851ed3 120->127 128 7ff63b851df0-7ff63b851e07 120->128 121->109 126 7ff63b851c9d-7ff63b851cc6 121->126 122->112 123->102 129 7ff63b851d8c-7ff63b851d91 124->129 125->120 132 7ff63b851dc5-7ff63b851dcd 125->132 126->117 130 7ff63b851ee8-7ff63b851f2c CreateProcessW 127->130 131 7ff63b851ed5-7ff63b851ee3 call 7ff63b8522c0 127->131 133 7ff63b851e0d-7ff63b851e20 call 7ff63b8517b0 128->133 134 7ff63b851d72-7ff63b851d79 128->134 135 7ff63b851d93-7ff63b851dbd 129->135 136 7ff63b851d70 129->136 140 7ff63b851fc6-7ff63b851fd4 call 7ff63b895eb0 130->140 141 7ff63b851f32-7ff63b851f4f CloseHandle * 2 130->141 131->130 138 7ff63b851e25-7ff63b851e38 132->138 139 7ff63b851dcf-7ff63b851dd4 132->139 133->134 134->118 135->133 136->134 147 7ff63b851e3a-7ff63b851e4e 138->147 148 7ff63b851e79-7ff63b851e87 138->148 139->129 159 7ff63b851fea-7ff63b851ff9 140->159 160 7ff63b851fd6-7ff63b851fe5 call 7ff63b8522c0 140->160 144 7ff63b851f65-7ff63b851f70 141->144 145 7ff63b851f51-7ff63b851f60 call 7ff63b8522c0 141->145 153 7ff63b851f72-7ff63b851f80 call 7ff63b8522c0 144->153 154 7ff63b851f85-7ff63b851f90 144->154 145->144 149 7ff63b851e8c-7ff63b851e9d 147->149 150 7ff63b851e50-7ff63b851e70 147->150 148->129 157 7ff63b851e72-7ff63b851e74 149->157 158 7ff63b851e9f-7ff63b851ebe 149->158 150->157 150->158 153->154 155 7ff63b851f92-7ff63b851fa0 call 7ff63b8522c0 154->155 156 7ff63b851fa5-7ff63b851fad 154->156 155->156 163 7ff63b851fbf-7ff63b851fc1 156->163 164 7ff63b851faf-7ff63b851fba call 7ff63b8522c0 156->164 157->129 158->129 159->78 166 7ff63b851fff 159->166 160->159 163->49 164->163 166->77
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: C:\Users$h$s\Public
      • API String ID: 0-3456253183
      • Opcode ID: a652e9657e5c05aff2a409c38d9dd38ed83f8ca8af2200ff06cfa7d44730c077
      • Instruction ID: 1a400eb23e30174bab3696d72c39023d63dea2792655c70fa88e2a2fbc80e11c
      • Opcode Fuzzy Hash: a652e9657e5c05aff2a409c38d9dd38ed83f8ca8af2200ff06cfa7d44730c077
      • Instruction Fuzzy Hash: 4A22E361F0C6C641FA25AB15D4003BAA751AF88BD0F044136DEDE87BE5DF7DE541A704

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: malloc$ExceptionFilterSleepUnhandledmemcpystrlen
      • String ID:
      • API String ID: 3806033187-0
      • Opcode ID: 81487d630e4aa8cf42415a112c6d860d500aeddbe03e023e2287122e7970c47c
      • Instruction ID: 42cfb5eb9739ff8782b0173281cec7bc524f9308c4e3365d10b7880de9370cfb
      • Opcode Fuzzy Hash: 81487d630e4aa8cf42415a112c6d860d500aeddbe03e023e2287122e7970c47c
      • Instruction Fuzzy Hash: 0F510635B09A4A85EB51AB15E9A06B923A1BF4DB90F446036D9CEC77B1DF3CE841A304

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: FileObjectSingleWaitWrite
      • String ID:
      • API String ID: 1507886151-0
      • Opcode ID: e3be11b6b9fd34c636410c389d103c2fe279785128bab275b29275d750e27821
      • Instruction ID: 2b657161e5fc740245f65afa585f6d9ff62d834dc0013b52e7f41ded1e7847a4
      • Opcode Fuzzy Hash: e3be11b6b9fd34c636410c389d103c2fe279785128bab275b29275d750e27821
      • Instruction Fuzzy Hash: 54316122F14B9599FB20CB74E8807ED37A4EB98758F544130EACD97BA8EF38D5958340

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 210 7ff63b891020-7ff63b89105e call 7ff63b89f310 213 7ff63b891060-7ff63b891065 210->213 214 7ff63b89106a-7ff63b89109a call 7ff63b8a1800 210->214 215 7ff63b89120c-7ff63b89121b 213->215 218 7ff63b8910a4-7ff63b8910b0 214->218 219 7ff63b89109c-7ff63b89109f 214->219 220 7ff63b8910b2-7ff63b8910b4 218->220 221 7ff63b8910bc-7ff63b8910be 218->221 219->215 222 7ff63b8910c0-7ff63b8910c8 220->222 223 7ff63b8910b6-7ff63b8910ba 220->223 221->222 224 7ff63b891105-7ff63b891109 221->224 225 7ff63b891119-7ff63b89111d 222->225 226 7ff63b8910ca-7ff63b8910cc 222->226 223->225 227 7ff63b8910ce-7ff63b8910db 224->227 228 7ff63b89110b-7ff63b89110f 224->228 229 7ff63b89111f-7ff63b891121 225->229 230 7ff63b891152-7ff63b891154 225->230 226->225 226->227 227->215 231 7ff63b8910e1-7ff63b891100 call 7ff63b8522c0 227->231 228->227 232 7ff63b891111-7ff63b891115 228->232 233 7ff63b891123-7ff63b89112c 229->233 234 7ff63b89115a-7ff63b891163 229->234 230->234 235 7ff63b89124b-7ff63b89125b 230->235 231->215 232->227 237 7ff63b891117 232->237 238 7ff63b89112e-7ff63b891132 233->238 239 7ff63b891165 233->239 234->238 234->239 235->239 240 7ff63b891261 235->240 237->225 242 7ff63b891238-7ff63b89123b 238->242 243 7ff63b891138-7ff63b891150 238->243 244 7ff63b891168-7ff63b8911a8 CreateFileW 239->244 249 7ff63b891266-7ff63b891281 GetLastError call 7ff63b8e9e8c 240->249 245 7ff63b8912a4-7ff63b8912a6 242->245 246 7ff63b89123d-7ff63b89123f 242->246 243->244 247 7ff63b8911aa-7ff63b8911b1 244->247 248 7ff63b89121c-7ff63b891234 GetLastError 244->248 245->227 250 7ff63b8912ac-7ff63b8912b1 245->250 246->250 253 7ff63b891241-7ff63b891246 246->253 254 7ff63b8911b3-7ff63b8911b7 247->254 255 7ff63b8911e8-7ff63b8911ed 247->255 251 7ff63b8911ef-7ff63b891206 call 7ff63b8522c0 248->251 252 7ff63b891236 248->252 263 7ff63b891283-7ff63b891292 call 7ff63b8522c0 249->263 264 7ff63b891297-7ff63b89129f 249->264 250->244 257 7ff63b891209 251->257 252->257 253->244 254->255 258 7ff63b8911b9-7ff63b8911c3 GetLastError 254->258 255->251 255->257 257->215 258->255 262 7ff63b8911c5-7ff63b8911e6 SetFileInformationByHandle 258->262 262->249 262->255 263->264 264->215
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorLast$File$CreateHandleInformation
      • String ID:
      • API String ID: 1834474996-0
      • Opcode ID: 87b9db5d41daed18cd49e87f9d904dfff9194c64b9439407e8899201472b36a1
      • Instruction ID: 4940f820720ccb99ee7becb7be8250f4f30b6fdfbd6ef4581cba69ad7917168c
      • Opcode Fuzzy Hash: 87b9db5d41daed18cd49e87f9d904dfff9194c64b9439407e8899201472b36a1
      • Instruction Fuzzy Hash: 5161E191F0C25365FF61AA6195013B97AA0AB08BD8F145131DDDEC7BE9CF3DD846A700

      Control-flow Graph

      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e24baa4a3222a3b121bb3ea5b1124ecf2755e13f390253a8ef35b734aad61fd6
      • Instruction ID: d058f858e8fd1cca2a67f5b6a9fd21b19e9d8fb9a223ced0480c85cbf2058c78
      • Opcode Fuzzy Hash: e24baa4a3222a3b121bb3ea5b1124ecf2755e13f390253a8ef35b734aad61fd6
      • Instruction Fuzzy Hash: AB310762F0CA46A4FF11DB6599063F95261AF4C7DCF584031DD8C87B65EEBCE1829340

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: DescriptionThread
      • String ID: main
      • API String ID: 2285587249-3207122276
      • Opcode ID: 5380cd00db58704def36b7ccb4bb153cbc0f4fe725073a28fa603d650e0d8a4c
      • Instruction ID: 0cda5240c6e1487b0718e6db4840fd6d9ea01ff9ce1cb7e14680449cdc1464e8
      • Opcode Fuzzy Hash: 5380cd00db58704def36b7ccb4bb153cbc0f4fe725073a28fa603d650e0d8a4c
      • Instruction Fuzzy Hash: 6B016121F04611D9FB10EB65D9452FC3361BB49388F940435DD8D97BA9DFB8E84AD340

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeTask
      • String ID:
      • API String ID: 734271698-0
      • Opcode ID: 29d8069532dba790baf713a852be8441b2559e1a3aa4df761d68a972b5e57dfd
      • Instruction ID: c3c697f2158c702c8f7e89e259935362e0317ee36ea583762a66c7fc602b4284
      • Opcode Fuzzy Hash: 29d8069532dba790baf713a852be8441b2559e1a3aa4df761d68a972b5e57dfd
      • Instruction Fuzzy Hash: 04F09011A1861740FB20EB25A0417BE63509FCC7A4F044131EACDCA776DDBCD243A700

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: CloseHandle
      • String ID:
      • API String ID: 2962429428-0
      • Opcode ID: 91ebae9c3fb5a4d4064cf8b1e5e9c19c10c6710b06920cc9dacc2f671af02453
      • Instruction ID: 7babb85abb9412c951e6e8853c6e026d7c750132c6aab7fd7d04aa4770be753b
      • Opcode Fuzzy Hash: 91ebae9c3fb5a4d4064cf8b1e5e9c19c10c6710b06920cc9dacc2f671af02453
      • Instruction Fuzzy Hash: BA518122B0478186EB309E62E8453EE77A1FB08798F004135DE9E8BB95DF7CE241A300

      Control-flow Graph

      APIs
      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF63B8A4883), ref: 00007FF63B8913A2
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorLast
      • String ID:
      • API String ID: 1452528299-0
      • Opcode ID: ad3f5cbfeedfcf13903e499c3268926a66de56c683ae8b6240a3490add6e2234
      • Instruction ID: 9ec04275ebb5fa8ea52583bae06e8f9b3f8a5438bf1221e487792ad6358508b2
      • Opcode Fuzzy Hash: ad3f5cbfeedfcf13903e499c3268926a66de56c683ae8b6240a3490add6e2234
      • Instruction Fuzzy Hash: E4313872B146518AF7208FA6E5417AD77B0BB58388F108124DF8963B55EF78EA81C750
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: ConsoleErrorLastWrite$ByteCharMultiWide
      • String ID:
      • API String ID: 1956605914-0
      • Opcode ID: d6fa8577fff9781698cb2784834ee00875b6a9474a146fdbbcde2ca34dbe5f4a
      • Instruction ID: ce2f53085e18db4a47ad1b12e1875b244551f4f9fd6be74d46fbacecd6c6ef4b
      • Opcode Fuzzy Hash: d6fa8577fff9781698cb2784834ee00875b6a9474a146fdbbcde2ca34dbe5f4a
      • Instruction Fuzzy Hash: 8E02E361F0869685FB209B61D8007F96A91AF4C794F448132EECDD7BE9DF7CD58AA300
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: a7d6bf26eabe0d1632d3d306af3a63d32fe6f755bfdca458dd88fe0c09068385
      • Instruction ID: bdfc85424bc167b84ae8a9f74a6f3fabed7922ac9958705c82578468ae83bb59
      • Opcode Fuzzy Hash: a7d6bf26eabe0d1632d3d306af3a63d32fe6f755bfdca458dd88fe0c09068385
      • Instruction Fuzzy Hash: 1A6237A2F08AD244FB719E25D4407B96791AB0ABE4F444131CEED9B7E5CF3CE691A700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorLast$FullNamePath
      • String ID:
      • API String ID: 2482867836-0
      • Opcode ID: ecfd8c3bd3adc06954fb10034e5eb142da56f09cc575d3ac51fc75926ebd95c3
      • Instruction ID: 3cf1ad074ef97e00638e5fe1f7d656d657bb823bb1b52e4f89cd9f883b39532e
      • Opcode Fuzzy Hash: ecfd8c3bd3adc06954fb10034e5eb142da56f09cc575d3ac51fc75926ebd95c3
      • Instruction Fuzzy Hash: 1142B462B08B9285EF699F65D8443F97265BF48BC8F048036DE9D977A5DF3CE241A300
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c9da844cb34b5c91b9cee35a265b611f789a8b874841022ab713eebbb5c2c564
      • Instruction ID: 72f245747c606f6ea649710eab756b83e8e72ae92545b527d089cfb54e4b5a21
      • Opcode Fuzzy Hash: c9da844cb34b5c91b9cee35a265b611f789a8b874841022ab713eebbb5c2c564
      • Instruction Fuzzy Hash: 93B2D362E04BC582EB108F2995412F86360FB687D8F469722DFAE537A6DF38E1D1D300
      APIs
      • WakeByAddressSingle.API-MS-WIN-CORE-SYNCH-L1-2-0(?,?,?,?,?,?,?,?,00000000,00000000,?,?,00007FF63B880AA5), ref: 00007FF63B880306
        • Part of subcall function 00007FF63B8EA360: RtlCaptureContext.KERNEL32 ref: 00007FF63B8EA3F2
        • Part of subcall function 00007FF63B8EA360: RtlUnwindEx.KERNEL32 ref: 00007FF63B8EA42F
        • Part of subcall function 00007FF63B8EA360: abort.MSVCRT ref: 00007FF63B8EA435
        • Part of subcall function 00007FF63B8EA360: RaiseException.KERNEL32 ref: 00007FF63B8EA472
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: AddressCaptureContextExceptionRaiseSingleUnwindWakeabort
      • String ID: StderrLock$lock count overflow in reentrant mutexlibrary\std\src\sync\reentrant_lock.rs
      • API String ID: 938658393-2484903514
      • Opcode ID: 96ea4ad3050c817a99897064625f6cd59b20030a83f0df2b89394212f8837f9d
      • Instruction ID: eebd91198759e474bb94a708e344b7b766737625baeff38ccae1e23116b71cd0
      • Opcode Fuzzy Hash: 96ea4ad3050c817a99897064625f6cd59b20030a83f0df2b89394212f8837f9d
      • Instruction Fuzzy Hash: 8AD1A122F08B4686EB14DB61D4113BD63A0EF89768F544636DAAEC77E1DF3CE5829340
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: memcpy
      • String ID: .Components$assertion failed: is_code_point_boundary(self, new_len)
      • API String ID: 3510742995-986385590
      • Opcode ID: 1b42b59c0f293a4dddcd1dcb890a694517bcee2be59998c833c92cc953d64465
      • Instruction ID: 02e5f5ff30e3ad6871c9daaf88e4efb833ed7d54fb25acb0f3cd8cb64377b5a1
      • Opcode Fuzzy Hash: 1b42b59c0f293a4dddcd1dcb890a694517bcee2be59998c833c92cc953d64465
      • Instruction Fuzzy Hash: 48F1F466F09A5286FE14DB61E8003B967A1AF0CBC8F444436DE8DD77A5EE3CE546E300
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID: 0-3916222277
      • Opcode ID: 9b69018c0ed3b186ba056a2dcec648e21db9b6eb5f04c4f3e3f4bfdca43a4d7f
      • Instruction ID: 21bb99de49aee18b8073b635fe0dae0d48305e9b2aea23da1315eee7ae99f28a
      • Opcode Fuzzy Hash: 9b69018c0ed3b186ba056a2dcec648e21db9b6eb5f04c4f3e3f4bfdca43a4d7f
      • Instruction Fuzzy Hash: 3202E462A08AC986EB708F2598493F92351F748BD8F044A33CE9E9B7A5DF38D185D304
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorFileObjectReadSingleStatusWait
      • String ID:
      • API String ID: 3583596364-0
      • Opcode ID: c9b21866faa3b89d0315cf257845c9edb6f0ad73a687b49f7712525f048a0ebc
      • Instruction ID: 73f7aaf69781c6b2e439acd75a4edb90308abe2c24200910e767c6028a69aa25
      • Opcode Fuzzy Hash: c9b21866faa3b89d0315cf257845c9edb6f0ad73a687b49f7712525f048a0ebc
      • Instruction Fuzzy Hash: E331A032F14A9589FB20CB70E8407AD33A0EB98358F548130EA8DD7BA8EF38D1918340
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: memcmp
      • String ID: .llvm./rust/deps\rustc-demangle-0.1.24\src/lib.rs$__ZN$`fmt::Error`s should be impossible without a `fmt::Formatter`
      • API String ID: 1475443563-1033176386
      • Opcode ID: fbd01bc7dca341960596535b4baaf29f25a68dd04a3453e8cf4c9293111851d4
      • Instruction ID: c6267813f0280d99e6a822a5fc0215d4e24f1bd0d0f9663160f67410f4adf9ff
      • Opcode Fuzzy Hash: fbd01bc7dca341960596535b4baaf29f25a68dd04a3453e8cf4c9293111851d4
      • Instruction Fuzzy Hash: 646244A2E1C9A285FB148E2094146BDAB61BB0D794F544336DEDE877E5DF3CE944E300
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: memcmp
      • String ID:
      • API String ID: 1475443563-0
      • Opcode ID: 7b8bd37ac05472c1f688518fb33f73d97958f5587a90275488d8cc1d6babc322
      • Instruction ID: e14f48b576d08d66293aad4d2fb419f2b4f1fcdd02d971f51b8ed7d242d4b53f
      • Opcode Fuzzy Hash: 7b8bd37ac05472c1f688518fb33f73d97958f5587a90275488d8cc1d6babc322
      • Instruction Fuzzy Hash: 8B320522F0869A85FB218B25D8006F86751AF1D7D9F844637EECE937A5DF38D146E308
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: memcpy
      • String ID:
      • API String ID: 3510742995-0
      • Opcode ID: 40f2bd7941c54a29647a8b9210481e05cdad55683e608500f8d317bb364a2669
      • Instruction ID: 4dc005ead39d0f2f58aaeb7e25b0a6a68a98728d9f6c3f87cb79c4766dc296a6
      • Opcode Fuzzy Hash: 40f2bd7941c54a29647a8b9210481e05cdad55683e608500f8d317bb364a2669
      • Instruction Fuzzy Hash: 6A52A572A14B8592DB10CF29D5446EC7764F758B98F819722DFAE533A1EF38E299C300
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 417020d1d7a5646c9e01f6c3bb1e62516b20a8488bfb65bae6cef5f62086aa1c
      • Instruction ID: d799cedce7e6b2e3bf3debe9288ee75a187c60853e18ad76cae81731ef660295
      • Opcode Fuzzy Hash: 417020d1d7a5646c9e01f6c3bb1e62516b20a8488bfb65bae6cef5f62086aa1c
      • Instruction Fuzzy Hash: 4232B362E04BD486E7118F29D5012E96760FB687D8F45A321EFAE537A6EF34E2D5C300
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 045032e43e5243348bda05fffaba070f9e70687af0d0abd52625bcc8eecd977b
      • Instruction ID: 413dde141d5eb890449a32678c1a9b5649450170991c53fc6d91486d64bb7574
      • Opcode Fuzzy Hash: 045032e43e5243348bda05fffaba070f9e70687af0d0abd52625bcc8eecd977b
      • Instruction Fuzzy Hash: 45F1D6A2E04B8582EA108F6984056EC2721F759BE8F419732DFBE673D1EF38E584D700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: memcmp
      • String ID: .llvm./rust/deps\rustc-demangle-0.1.24\src/lib.rs
      • API String ID: 1475443563-1822433098
      • Opcode ID: d4cda76c647002c9c0dca3d5d87d028cafbcea0ad1bfec7cc91d6084fac1c9a9
      • Instruction ID: ecfb9ae199771f82bc1249f490aff9fb85c3c2392c3af0404ffbe3975a187427
      • Opcode Fuzzy Hash: d4cda76c647002c9c0dca3d5d87d028cafbcea0ad1bfec7cc91d6084fac1c9a9
      • Instruction Fuzzy Hash: 6C32F222B186D58AEB60CF25A8147B96791FF09B94F40453BDE8E87BA4DF3CE545E300
      APIs
      Strings
      • called `Result::unwrap()` on an `Err` valueErrorLayoutError, xrefs: 00007FF63B8CB8DF
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: memcpy
      • String ID: called `Result::unwrap()` on an `Err` valueErrorLayoutError
      • API String ID: 3510742995-3725152123
      • Opcode ID: 81038fc792a85a7b2108a7629e570a67702d662dfe0d5b8f2563d0cca88e6b90
      • Instruction ID: 9ed4a14e1514ad9999e760d999dc897e042440e42aaa8df506bb78f317dcdd38
      • Opcode Fuzzy Hash: 81038fc792a85a7b2108a7629e570a67702d662dfe0d5b8f2563d0cca88e6b90
      • Instruction Fuzzy Hash: 87027D72F14F5988FB008BA0E8503EC73B5BB48748F54863ADE9D967A9EF389185D300
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 3f73c71891715dbaacf9de5ff9a6b009c0891da66bf2290eeb7d084683ff114a
      • Instruction ID: c36d373da662c74f78553142d2d3e6583bb29d136f3225321edf8f83ef3746d6
      • Opcode Fuzzy Hash: 3f73c71891715dbaacf9de5ff9a6b009c0891da66bf2290eeb7d084683ff114a
      • Instruction Fuzzy Hash: 7D029262B14A8985EB708F25D8483ED2761F758BD8F404633DE9E877A4DF39D286D304
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: memcpy
      • String ID:
      • API String ID: 3510742995-0
      • Opcode ID: b86706a7d2cf204e2e51d77cb9bad41f1a97247a187825014c65b4a4c7524c15
      • Instruction ID: 8a628d64268dcc1ba2f0c86e2f703b967249f0bf8a57cc59ea4fec51b5f3540e
      • Opcode Fuzzy Hash: b86706a7d2cf204e2e51d77cb9bad41f1a97247a187825014c65b4a4c7524c15
      • Instruction Fuzzy Hash: C9C1E362F1978681EE10DB26A4067B96761FF1DB9CF458536CEAD933A1EE7CA041E300
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID: 0-3916222277
      • Opcode ID: 5545588619da7bb89792b3fb494ee7201640f1602b5226a310355cfa4b7acd43
      • Instruction ID: 48f47b6574b50ec8d06b775edfd09dfa12da6657fce2cc32868e04087e98d39f
      • Opcode Fuzzy Hash: 5545588619da7bb89792b3fb494ee7201640f1602b5226a310355cfa4b7acd43
      • Instruction Fuzzy Hash: 4F424763B09AD442FB618B66E9007ED6750B748BD4F458232DE9E977A1EE3CD287D300
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: 0x0o00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899assertion failed: *curr > 19
      • API String ID: 0-1744301434
      • Opcode ID: 12b8772e55c1258e7ca1ef30fe6dcf2b8e3e5cc98b32bd2d7e346f2324c0c036
      • Instruction ID: ad1dcf70ff90f9e8279198dc16712c3c93afed18ecd470637164f3cf367fd847
      • Opcode Fuzzy Hash: 12b8772e55c1258e7ca1ef30fe6dcf2b8e3e5cc98b32bd2d7e346f2324c0c036
      • Instruction Fuzzy Hash: 7E620232A28A658AE725CB20E4147FC6760FB59344F906236EEDE93BE5DF3D9644D300
      Strings
      • 0b0x0o00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899assertion failed: *curr > 19, xrefs: 00007FF63B8E5400, 00007FF63B8E569B, 00007FF63B8E591C
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: 0b0x0o00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899assertion failed: *curr > 19
      • API String ID: 0-528522809
      • Opcode ID: f2614912107fd56ce8750da9af44e6e5b86572c458f76170d13e9200f7d5bc47
      • Instruction ID: 2302a8d5663b70d4fbb5e543eabf83929ab46cf9567d3f86c514eb9ed36c9a41
      • Opcode Fuzzy Hash: f2614912107fd56ce8750da9af44e6e5b86572c458f76170d13e9200f7d5bc47
      • Instruction Fuzzy Hash: BA223332B18A9586E7659B20E0147FDA764FB99744F80A036DECE83BA1DE3CD295D340
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: 00000000
      • API String ID: 0-3221785859
      • Opcode ID: 511ea21eaabec23d54837423cdc3bbd93fd86ca076700706d416f64bd714a5e1
      • Instruction ID: 2022854b00bacdac0bd8f712e769c6fd8c0cc815aa5eb1be0c4c35c111cf107f
      • Opcode Fuzzy Hash: 511ea21eaabec23d54837423cdc3bbd93fd86ca076700706d416f64bd714a5e1
      • Instruction Fuzzy Hash: 9D12E362B04B8189EB20CF25F8407E927A5BF48788F44863BDE8D87BA4DF78D545D740
      Strings
      • 0x0o00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899assertion failed: *curr > 19, xrefs: 00007FF63B8E6140, 00007FF63B8E6371, 00007FF63B8E65A1
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: 0x0o00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899assertion failed: *curr > 19
      • API String ID: 0-1744301434
      • Opcode ID: 7c9833d0eb53b1d94ae3c5d56b42e76e92e8facb375206c6059aa191ab40b316
      • Instruction ID: 02e4a0a5e17f507735f54588884e8321432d51b995766a431aa453535ded45cd
      • Opcode Fuzzy Hash: 7c9833d0eb53b1d94ae3c5d56b42e76e92e8facb375206c6059aa191ab40b316
      • Instruction Fuzzy Hash: 64027663A186A185EB24CF28D0147FD6761FB5A7A4F40A235DEDE97BE4EE3C9604D300
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: Iter
      • API String ID: 0-841058261
      • Opcode ID: c75392679c9487452fc1a751b1028014ffe07122866722351a3a91a8578faaf5
      • Instruction ID: ba67e2a49eb0b2a0782a1b57e7a9a482a436d5a70d01891196fc17eb103c485a
      • Opcode Fuzzy Hash: c75392679c9487452fc1a751b1028014ffe07122866722351a3a91a8578faaf5
      • Instruction Fuzzy Hash: 68F16726E0D69686FB658B20D6003FD67A2EF19788F444032DECDC67B5DF7DA586A300
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: memcpy
      • String ID:
      • API String ID: 3510742995-0
      • Opcode ID: 25ff006b35229316881f9d4f2c1f162d663e882e5b97efd1ef82d9ea625f88bc
      • Instruction ID: 2fc436b91cebdf0722472725d68ff6c6f4c63f229c53ebf48984b3eabdc3213c
      • Opcode Fuzzy Hash: 25ff006b35229316881f9d4f2c1f162d663e882e5b97efd1ef82d9ea625f88bc
      • Instruction Fuzzy Hash: 19028F53A18BC893E7118F2996012E96760FB687C8F46A711DF9E53766EF34E2E5C300
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: memcpy
      • String ID:
      • API String ID: 3510742995-0
      • Opcode ID: 40f4341b2393c8d88519353c63848b5f7e3b69d4e2285dd8b757317515c17fc7
      • Instruction ID: 362eb60a53bd9d00ed16cc1acf755c7bcb8c8f79069d1fedc9c681a9750d0616
      • Opcode Fuzzy Hash: 40f4341b2393c8d88519353c63848b5f7e3b69d4e2285dd8b757317515c17fc7
      • Instruction Fuzzy Hash: EDE1D4A2F04A9592FB11CF29D5006AC6721F758BC8B459732DFAE973A1EF38E594C304
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: falsetrue
      • API String ID: 0-2583396087
      • Opcode ID: 3c931abaa790965a00de698a11a96bf2fa9f29c303bde85a39a6071edfca1027
      • Instruction ID: 217ab60119e4d182406206f40ad1b50a871e5677d85f03456002d72946fad5cf
      • Opcode Fuzzy Hash: 3c931abaa790965a00de698a11a96bf2fa9f29c303bde85a39a6071edfca1027
      • Instruction Fuzzy Hash: 46B16C96E2DBA601FA23433E64016B449405F677E4A01D73BEDBD71BF1EF39E642A200
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorHandleLast
      • String ID:
      • API String ID: 2586478127-0
      • Opcode ID: ccdc4a8769f107b8b923ffd279c3e2f343628e55faa1909371611fed678b4723
      • Instruction ID: 97bf6d381961a88f5c95f18d2746ea28801970745c8e79b9287629ef01074436
      • Opcode Fuzzy Hash: ccdc4a8769f107b8b923ffd279c3e2f343628e55faa1909371611fed678b4723
      • Instruction Fuzzy Hash: F8C11662F09A9687EE04CF16E8046B96791BF0CBC4F548535DE9DD7BA5DE3CE442A300
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 17652e3a8254b6321586e6a427a5cc7d136a4433342daef490fe464ef3add8db
      • Instruction ID: 5c94cf14956c686e5369e5be9a9058029f88cd31726e71214cac66e2ffe23773
      • Opcode Fuzzy Hash: 17652e3a8254b6321586e6a427a5cc7d136a4433342daef490fe464ef3add8db
      • Instruction Fuzzy Hash: C0D1D352F08AC582FA018F2895055F86725FB697A8B46D332DE7E673D2EF34A5C5C304
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 093ae826fe15420fa045ddde67a755531767c9251c3b7ab0d2502e99507ad552
      • Instruction ID: c42a6a180220997a442de989761d92a21b5d37fac117c89ad8c730b013b8ec65
      • Opcode Fuzzy Hash: 093ae826fe15420fa045ddde67a755531767c9251c3b7ab0d2502e99507ad552
      • Instruction Fuzzy Hash: FCC1E762F04AD982FB11CF28C6049EC6321FB547E8B859322DE6E67395EF74E685C304
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: memcpy
      • String ID:
      • API String ID: 3510742995-0
      • Opcode ID: bad9ede1a7c196771ea4303c3629f95c172ced7c15b50dcb64c3bda053504e79
      • Instruction ID: 0cef11a081bcb12b277bae912b8bedc4c1b22dfe652e1610a3ee7433c037cb55
      • Opcode Fuzzy Hash: bad9ede1a7c196771ea4303c3629f95c172ced7c15b50dcb64c3bda053504e79
      • Instruction Fuzzy Hash: 12810512F196918AFB118A6588113FD2B51FB5D798F048939DE8ECBBD9DE3CD280E350
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: 0123456789abcdef
      • API String ID: 0-1757737011
      • Opcode ID: 01f622e2a1d6dfdbed27203ca3b1c284ea5d5d90bced9f323d75cb31d9cd0a59
      • Instruction ID: 6e3fee1a4661a77d213926ccaf7bc967cdb9116ef5b13c216de50b349f192a47
      • Opcode Fuzzy Hash: 01f622e2a1d6dfdbed27203ca3b1c284ea5d5d90bced9f323d75cb31d9cd0a59
      • Instruction Fuzzy Hash: F6611453E1C5D15AF3198E6859202BD2EA1AB19348F04853DDAEBE77F5CE3C9502E310
      Memory Dump Source
      • Source File: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 8bb91228751b0efc63ceca3f93e0858f718a14aa65448bcf9a1d37d741515f7d
      • Instruction ID: 62053d499f8979b776e939acfb9a8610fb04318510fc2a60ea6fb18c6ea97594
      • Opcode Fuzzy Hash: 8bb91228751b0efc63ceca3f93e0858f718a14aa65448bcf9a1d37d741515f7d
      • Instruction Fuzzy Hash: 08320523B042219FF7284A34C8517FD3792E799704F148135EFC9973DADE6D6949A340
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: memcpy
      • String ID:
      • API String ID: 3510742995-0
      • Opcode ID: 6933df55a50f57596572f4d4ed261b95670b8b2e777c41d223b685af9487db52
      • Instruction ID: 36a90a92af53e18b4702d8d161d2c6c0485ef5c512e82888d204c8baa949b115
      • Opcode Fuzzy Hash: 6933df55a50f57596572f4d4ed261b95670b8b2e777c41d223b685af9487db52
      • Instruction Fuzzy Hash: 68128172B14A5589EB04CBA5E4503FC77B1AB887A4F488231DFAD93BA8DF78D545D300
      Memory Dump Source
      • Source File: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: bc4f1bdbc699e5993380fca7d82b1bd7cdbfa05b0e47b11a06f7f93abbda0119
      • Instruction ID: 3983e114623889bca402628af17924ba039c1a6b93656e5b218aaea3e6fa9c86
      • Opcode Fuzzy Hash: bc4f1bdbc699e5993380fca7d82b1bd7cdbfa05b0e47b11a06f7f93abbda0119
      • Instruction Fuzzy Hash: 7AD12763B082218FF3188A39C8817BD3692E789754F14C279EF89D77DADE3D99459340
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: ad884ff55f7726e80c3b0436c3558f17546bec5d86aafa1267ead61c776d48b2
      • Instruction ID: 7c82c6bd75dbbb33e0099c1c5562a4ae9440876a757077aebf51ac491667faa7
      • Opcode Fuzzy Hash: ad884ff55f7726e80c3b0436c3558f17546bec5d86aafa1267ead61c776d48b2
      • Instruction Fuzzy Hash: F5D13AA2E1C69286F7148B94E4107FC2761EB89780F946136DDCF937A5CE7CAA46E340
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d9396d119a77d1c8e2bfc5931525acb9f5aa7c6d58bda2afad83dbb78b865e6e
      • Instruction ID: bb89cbfc24c475381f49a3b2cdc2f24adfed20f0151a223b1bdf60ffec143332
      • Opcode Fuzzy Hash: d9396d119a77d1c8e2bfc5931525acb9f5aa7c6d58bda2afad83dbb78b865e6e
      • Instruction Fuzzy Hash: 2671B572B19BC985EB70CF2598483E92691F748BD8F044637CE9E9B7A4DE38D641D304
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 3cc570ffb4ae56b960260507304eaa2a4c554c849a426bb6218ab45f6928df0f
      • Instruction ID: 7bb828845c47f025ddccaf150c09a47f30cd1633db31e09b34ddc33ad78a786f
      • Opcode Fuzzy Hash: 3cc570ffb4ae56b960260507304eaa2a4c554c849a426bb6218ab45f6928df0f
      • Instruction Fuzzy Hash: B8612EA3F196E09EE3219774A400AAC7F71DF15B44F0890AACFC857F96CA3AC115E751
      Memory Dump Source
      • Source File: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 1f34747f2e3f4212df9440228b02bf58113d0611040ea2d2a6e48c9568406757
      • Instruction ID: 72a7f27c79963c1fbfbe6938cdcfaccec5d9310ffee8180308058a053cb61fa1
      • Opcode Fuzzy Hash: 1f34747f2e3f4212df9440228b02bf58113d0611040ea2d2a6e48c9568406757
      • Instruction Fuzzy Hash: 13D0128BB0EAC305F1598554092517D2EC16B57E3570C416AEAA5863D2BF091906A212
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorLast$FullNamePath
      • String ID: \\?\$\\?\UNC\
      • API String ID: 2482867836-3019864461
      • Opcode ID: 2122492b4eb0333c77c7b5a8ddde4668f072be821119217e02c5428283a680cc
      • Instruction ID: 2629df62c8d589b921ec45e0e5ba6f05116d91856eff7e8123fe40e39043f303
      • Opcode Fuzzy Hash: 2122492b4eb0333c77c7b5a8ddde4668f072be821119217e02c5428283a680cc
      • Instruction Fuzzy Hash: EC12C062F086D285EB70AF2184443B96395FB0AB94F448136DEDD9B7E5DF3CE681A700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorLast$CaptureContextCurrentDirectoryEnvironmentExceptionRaiseStringsUnwindabort
      • String ID: Vars$called `Result::unwrap()` on an `Err` value$innerVarsOs
      • API String ID: 1982851867-2235028769
      • Opcode ID: e921b6a4486d3119278a64ef0d52a8b7fa698d28b42ae79f5503faa2cebf1a7f
      • Instruction ID: 5f28a3f910998013057b1e0486b993e6ca8fd6a1b9b38720809c6c34749dbd5b
      • Opcode Fuzzy Hash: e921b6a4486d3119278a64ef0d52a8b7fa698d28b42ae79f5503faa2cebf1a7f
      • Instruction Fuzzy Hash: 19F1F226F08B9289FB208F61E8017FD2764BB09798F444136EE9D977A9DFBC9641D340
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: QueryVirtual
      • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
      • API String ID: 1804819252-1534286854
      • Opcode ID: 0f8ee5c3b07aa3015d91298761b1289a543a31721db7804d6ca8c886fee2c95b
      • Instruction ID: e35737395192804eaffcc7b60e0505729cc7316b879709d3fa1dd94bb8624ebc
      • Opcode Fuzzy Hash: 0f8ee5c3b07aa3015d91298761b1289a543a31721db7804d6ca8c886fee2c95b
      • Instruction Fuzzy Hash: 0B51D032A08A4682EA109B11E8406FD77A1FF8DB94F845131EE8E873B4EF3CE581D740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: CloseHandle$ErrorFileLastSleepWritememset
      • String ID:
      • API String ID: 2935194761-0
      • Opcode ID: 5e261e4be4b7c29f38b8bf04ea2ed30613187c6286a186661ab4f3539da0a9a9
      • Instruction ID: 074612bbaa589161e1e3d10a877be9b9c62efcd367668b15c86a5ab02f8b192c
      • Opcode Fuzzy Hash: 5e261e4be4b7c29f38b8bf04ea2ed30613187c6286a186661ab4f3539da0a9a9
      • Instruction Fuzzy Hash: 5751A122A08AC685E7319B2198017FE2290FF4C7D8F545131DEDD8BBE9DF7CA186A740
      APIs
      Strings
      • environment variable not foundenvironment variable was not valid unicode: , xrefs: 00007FF63B877895
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorLast$EnvironmentVariable
      • String ID: environment variable not foundenvironment variable was not valid unicode:
      • API String ID: 2691138088-3632183283
      • Opcode ID: b98d200d987c2c93988564ca019bb7daa516f01dd3a31fefd1ac489696806e8e
      • Instruction ID: d5374c8b656d05248c4cee8f6bd3cf33842ac6f6d65fc757479eea94d4cb9d96
      • Opcode Fuzzy Hash: b98d200d987c2c93988564ca019bb7daa516f01dd3a31fefd1ac489696806e8e
      • Instruction Fuzzy Hash: B9A18D66B04AD289EB319F25D8453ED2364FB08B8CF044136DE9C9BBA9DF78D281D340
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: abort$CaptureContextExceptionRaiseUnwind
      • String ID: CCG
      • API String ID: 4122134289-1584390748
      • Opcode ID: fa4197c93fc63c602591c23bd2b149e4bf5c4b3e4635d0dc6cf042b1eb1ab0c0
      • Instruction ID: 67e3c1422a3f371ed00347ce18fe096e75f38738882065b4ee844d64eae84961
      • Opcode Fuzzy Hash: fa4197c93fc63c602591c23bd2b149e4bf5c4b3e4635d0dc6cf042b1eb1ab0c0
      • Instruction Fuzzy Hash: 4C314F72A08B8586E7209F24E4403A9B770FBDD788F50A226EACD53779DF79D195CB00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: CloseHandle$File$CreateErrorLastMappingView
      • String ID:
      • API String ID: 2116955982-0
      • Opcode ID: 9252a8afeb1f30eb626360f51b521bd483510a4a74b3c0a8a495604f82ab29b1
      • Instruction ID: b0e02ca820a0e8971910faffe9320bb504582d9461f64c0ca73a0f109a34a9a3
      • Opcode Fuzzy Hash: 9252a8afeb1f30eb626360f51b521bd483510a4a74b3c0a8a495604f82ab29b1
      • Instruction Fuzzy Hash: EC61AE22A08B8189FB619F65E4453FD67A0FB88398F184134EECD42BA5EF7CE195D740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: AddressSingleWake
      • String ID: <unnamed>$Box<dyn Any>aborting due to panic at $cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs$main
      • API String ID: 3114109732-1706025368
      • Opcode ID: 8085ea7aae40658ce346d6001ccfa5f99530c5a55c32b269bc0a9d9c23817a30
      • Instruction ID: 0ef8504a00d6a63f9c64e3d87697ee8c4371ea02c8b768a06436adc654c4c3c6
      • Opcode Fuzzy Hash: 8085ea7aae40658ce346d6001ccfa5f99530c5a55c32b269bc0a9d9c23817a30
      • Instruction Fuzzy Hash: B0C19F22A09A4A86FB219B20E4403BC27A0EF5D749F480536DACDC77E5DF3CE555E382
      APIs
      • TlsGetValue.KERNEL32(00000000,?,?,00007FF63B88EE11,?,?,?,?,?,00007FF63B88E29F), ref: 00007FF63B8A9824
      • TlsGetValue.KERNEL32(00000000,?,?,00007FF63B88EE11,?,?,?,?,?,00007FF63B88E29F), ref: 00007FF63B8A9887
      • TlsSetValue.KERNEL32(00000000,?,?,00007FF63B88EE11,?,?,?,?,?,00007FF63B88E29F), ref: 00007FF63B8A9897
      • TlsGetValue.KERNEL32(?,?,?,?,?,00000000,?,?,00007FF63B88EE11,?,?,?,?,?,00007FF63B88E29F), ref: 00007FF63B8A9922
      • TlsGetValue.KERNEL32(?,?,?,?,?,00000000,?,?,00007FF63B88EE11,?,?,?,?,?,00007FF63B88E29F), ref: 00007FF63B8A9946
      • TlsGetValue.KERNEL32(?,?,?,?,?,00000000,?,?,00007FF63B88EE11,?,?,?,?,?,00007FF63B88E29F), ref: 00007FF63B8A999C
      • TlsSetValue.KERNEL32(?,?,?,?,?,00000000,?,?,00007FF63B88EE11,?,?,?,?,?,00007FF63B88E29F), ref: 00007FF63B8A99A9
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: Value
      • String ID:
      • API String ID: 3702945584-0
      • Opcode ID: 9855c9a8d4bb63fe92913d480e523f0e464f9d2a7bfa59f23a0aa18dc8171208
      • Instruction ID: 851f5f36e13b438447e258b98ae60a5e33c7035cbc0d07d4673d84c12ad2aacb
      • Opcode Fuzzy Hash: 9855c9a8d4bb63fe92913d480e523f0e464f9d2a7bfa59f23a0aa18dc8171208
      • Instruction Fuzzy Hash: E251F422F0C6A646FA559B15854037DA791AF8DB80F488035DECDD77E2EE3DE843A740
      APIs
      • VirtualProtect.KERNEL32(00007FF63BB00190,00007FF63BB00198,00000001,?,?,?,?,?,00007FF63B851224,?,?,?,00007FF63B8513E6), ref: 00007FF63B8EADAD
      Strings
      • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 00007FF63B8EAF1A
      • Unknown pseudo relocation protocol version %d., xrefs: 00007FF63B8EAF26
      • Unknown pseudo relocation bit size %d., xrefs: 00007FF63B8EAF04
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: ProtectVirtual
      • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
      • API String ID: 544645111-1286557213
      • Opcode ID: 83b30d1ee4ab03ffbf7fdbd125f40f7ef3244a665f0a527f671ebf7a4aa69859
      • Instruction ID: 85fab374641a4619306459b554e8c4832fcfa319ca1af5f92d607f486ef1acba
      • Opcode Fuzzy Hash: 83b30d1ee4ab03ffbf7fdbd125f40f7ef3244a665f0a527f671ebf7a4aa69859
      • Instruction Fuzzy Hash: F091B436F0855786EA109B24D9402FD6291BF6DF64F54A231DDAE977F8DF3CE842A200
      APIs
      • TlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF63B8A98CE,00000000,?,?), ref: 00007FF63B8A3903
      • InitOnceComplete.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF63B8A98CE,00000000,?,?), ref: 00007FF63B8A394E
      Strings
      • assertion failed: len >= mem::size_of::<c::sockaddr_in6>(), xrefs: 00007FF63B8A3B8E
      • assertion failed: len >= mem::size_of::<c::sockaddr_in>()library\std\src\sys_common\net.rs, xrefs: 00007FF63B8A3B76
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: AllocCompleteInitOnce
      • String ID: assertion failed: len >= mem::size_of::<c::sockaddr_in6>()$assertion failed: len >= mem::size_of::<c::sockaddr_in>()library\std\src\sys_common\net.rs
      • API String ID: 622421136-513854611
      • Opcode ID: 74a2feb1e0133fab3b64d0fbefa5beeee472e55baf4a25a0c49fef12cb0e5819
      • Instruction ID: e2d644d2cfb288a235c47aaace65c64332cb98b522c819ac11f040b8580995fa
      • Opcode Fuzzy Hash: 74a2feb1e0133fab3b64d0fbefa5beeee472e55baf4a25a0c49fef12cb0e5819
      • Instruction Fuzzy Hash: F691AE22E046529AE710DF65E8407BD77B0FB48758F588036EE8D93BA4EF38E685D740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: ExceptionRaise
      • String ID: CCG $TSUR$TSUR
      • API String ID: 3997070919-4029986600
      • Opcode ID: 55554e98c817c919e66f2176ec202432409698ea6d5477c8f486d316a8577e33
      • Instruction ID: cf4cb5ec7b3eceeede2d5f10d5b180e82839d87d6fc25d2794a32ad82c59fc97
      • Opcode Fuzzy Hash: 55554e98c817c919e66f2176ec202432409698ea6d5477c8f486d316a8577e33
      • Instruction Fuzzy Hash: F731AF22E29E8582E6149B55D8102B82760FFDDB44F459235EE8D437A1EF38E6E6D700
      APIs
      Strings
      • assertion failed: is_code_point_boundary(self, new_len), xrefs: 00007FF63B88933A
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: memcpy
      • String ID: assertion failed: is_code_point_boundary(self, new_len)
      • API String ID: 3510742995-9383156
      • Opcode ID: 1d0b013b8046f6d0eb259ed9b4451d8bc8ee81aa73246cccc4a6afee629d43be
      • Instruction ID: a279247b6fa9d5b78f02f42a2b630d33b4b150f136149a1eaabcc4de34a1a2d0
      • Opcode Fuzzy Hash: 1d0b013b8046f6d0eb259ed9b4451d8bc8ee81aa73246cccc4a6afee629d43be
      • Instruction Fuzzy Hash: B2B1D552F08A9646FB019B6698002FD6761BF5DBC8F089431DE9D977A6DF3CE582E300
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: Handle$CloseErrorLast
      • String ID: called `Result::unwrap()` on an `Err` value
      • API String ID: 2105119405-2333694755
      • Opcode ID: 39a5bb1c39b83257ccc83678f5f6990cd6defe40eed6e8da5e5d891a8f5f991d
      • Instruction ID: ada9665c8f449559f3072c7adcb6fefaba8ec72e034daf5d78948be217db0a54
      • Opcode Fuzzy Hash: 39a5bb1c39b83257ccc83678f5f6990cd6defe40eed6e8da5e5d891a8f5f991d
      • Instruction Fuzzy Hash: 6A81C261E08A8A94FF108B60D5407FD3B61AF09798F449036DECD97BA9DE7CA199E340
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorLast$CompareOrdinalString
      • String ID:
      • API String ID: 2075851353-0
      • Opcode ID: b0b56f287cf12bc41f5206061b418a6344d8f4324afc95b77524bb8d933cfb00
      • Instruction ID: 5851ee00ced4b69dcbd31adbcc946d1fa24ce19e8e40f3ba4290874d3b071892
      • Opcode Fuzzy Hash: b0b56f287cf12bc41f5206061b418a6344d8f4324afc95b77524bb8d933cfb00
      • Instruction Fuzzy Hash: FF51AF22B09B468AEB109B61D8103FC37A4FB88B88F144531DECD877A6DF7CE5419340
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeTask$FolderKnownPathlstrlenmemcpy
      • String ID:
      • API String ID: 578397516-0
      • Opcode ID: 7aaa3a6036295c4da0237f3515f55e3984e5c2c7d645d4990d94ef2000d5c188
      • Instruction ID: c92ad3e48839569dcaf43561a8bca0c19ccfa5de9671ca25276a66b11874410e
      • Opcode Fuzzy Hash: 7aaa3a6036295c4da0237f3515f55e3984e5c2c7d645d4990d94ef2000d5c188
      • Instruction Fuzzy Hash: 42018416B1855241FB20EA56A0513BE9751AFCCBD0F088131EECD87B76DD7CD2429B00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeTask$FolderKnownPathlstrlen
      • String ID:
      • API String ID: 885572716-0
      • Opcode ID: 834b85390a2a52c17501fea409be2a3b07a5646b0cb1e4d732b6bbcfa62fa94a
      • Instruction ID: 973d9d1620dfa30a4a7b49264bc67190a1b608bb0023c74f382da712f9e38265
      • Opcode Fuzzy Hash: 834b85390a2a52c17501fea409be2a3b07a5646b0cb1e4d732b6bbcfa62fa94a
      • Instruction Fuzzy Hash: 5EF03011A1861340FB20EB55A4413BA53519FCC7A4F444131EACDCA7B6DEBCD642A700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeTask$FolderKnownPathlstrlen
      • String ID:
      • API String ID: 885572716-0
      • Opcode ID: 1a37300bd131dc23e13f186324e8fe623e27db6c85b2d96cdfdefd2b82f4ee29
      • Instruction ID: 72084c92235780b82de4d2bc8634cc49e800cbd5f4ca7aeb7447cd8022a8d861
      • Opcode Fuzzy Hash: 1a37300bd131dc23e13f186324e8fe623e27db6c85b2d96cdfdefd2b82f4ee29
      • Instruction Fuzzy Hash: 7FF03011A1861340FB20EB55A4513BE53519FCC7E4F484131EACDCA776DDBCD643A744
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeTask$FolderKnownPathlstrlen
      • String ID:
      • API String ID: 885572716-0
      • Opcode ID: 4b07427487f9f5671e3f5a8e3242b3511b709b45330fc3765a708aefb1ff3b8f
      • Instruction ID: b06954517cf01b69d360ec5d62d8a41fdbc80c940677eca888254f0a0d75dda9
      • Opcode Fuzzy Hash: 4b07427487f9f5671e3f5a8e3242b3511b709b45330fc3765a708aefb1ff3b8f
      • Instruction Fuzzy Hash: A0F03011A1861340FB20EB65A4517BE53519FCC7E4F444131EACDCA776DDBCD6429710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeTask$FolderKnownPathlstrlen
      • String ID:
      • API String ID: 885572716-0
      • Opcode ID: 38880fc186ab7fb8c80efdf4ebed188d508917ee0f83da720245019297b80da0
      • Instruction ID: 7a676f977c618ea83019b25057d3fb9a492020131edefbe088ae1e708e6f614f
      • Opcode Fuzzy Hash: 38880fc186ab7fb8c80efdf4ebed188d508917ee0f83da720245019297b80da0
      • Instruction Fuzzy Hash: 19F03011A1861380FB20EB15A4513BE53519FCC7E4F445131EACDCA776DEBCD6439B00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeTask$FolderKnownPathlstrlen
      • String ID:
      • API String ID: 885572716-0
      • Opcode ID: b8123952433213a2fb5bdf11f8dfb75bcfe2116d30493f6e2413c1214eaf569f
      • Instruction ID: 9e0db66e6887dbb85af6b3a79ce9b74b22534eea260c8ebc86d3256b949e3cd5
      • Opcode Fuzzy Hash: b8123952433213a2fb5bdf11f8dfb75bcfe2116d30493f6e2413c1214eaf569f
      • Instruction Fuzzy Hash: FAF03011A1861380FB20EB15A4513BE53519FCCBA4F484131EACDCA776DDBCD6429B40
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeTask$FolderKnownPathlstrlen
      • String ID:
      • API String ID: 885572716-0
      • Opcode ID: 560f5d9deb538c48138e62087de6bb89012e4bf62134e081db744dc6489cff75
      • Instruction ID: 6336382073de32e011f5a435e139c6284f8956cb7b29de93c85d8a3752ab069f
      • Opcode Fuzzy Hash: 560f5d9deb538c48138e62087de6bb89012e4bf62134e081db744dc6489cff75
      • Instruction Fuzzy Hash: CDF03011A1865340FB20EB15A4413BE63519FCC7A4F444131EACDCA776DDBCD6429B04
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeTask$FolderKnownPathlstrlen
      • String ID:
      • API String ID: 885572716-0
      • Opcode ID: 765b14d324591dd7dbb5c9e4810704154203ed939c8c401d4fafe383fe45e140
      • Instruction ID: 1c68893741f9cc8f31010a590879615dc07fd0ce850b64506ef2b3fb808e372c
      • Opcode Fuzzy Hash: 765b14d324591dd7dbb5c9e4810704154203ed939c8c401d4fafe383fe45e140
      • Instruction Fuzzy Hash: 8EF03011A1C61340FB20EB25A4413BA53519FCC7E4F444131EACDCA776DEBCD6429740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeTask$FolderKnownPathlstrlen
      • String ID:
      • API String ID: 885572716-0
      • Opcode ID: 84f1200789b04fe27f2d92febaec53b88600580e2f6059874441b250b3ade91e
      • Instruction ID: 5cc9be060508fbcb5babc06b18e1d4fe65d4638205a1e023e0684bfae3e3f7cd
      • Opcode Fuzzy Hash: 84f1200789b04fe27f2d92febaec53b88600580e2f6059874441b250b3ade91e
      • Instruction Fuzzy Hash: D7F03011A1861340FB20EB15A4413BE53519FCC7A4F444131EACDCA776DEBCD6429B40
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeTask$FolderKnownPathlstrlen
      • String ID:
      • API String ID: 885572716-0
      • Opcode ID: 817e1a30eac86eb090f9994de4614a9dca034a291c50cf07ead52d7b09f5d258
      • Instruction ID: 15d69ece1cd6353b948fe7e690808acd25dbefa326b25d666b03cca52de4aae3
      • Opcode Fuzzy Hash: 817e1a30eac86eb090f9994de4614a9dca034a291c50cf07ead52d7b09f5d258
      • Instruction Fuzzy Hash: 3AF03011A1861340FB20EB15A4513BE63519FCC7A4F444131EACECA776DDBCD6429700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeTask$FolderKnownPathlstrlen
      • String ID:
      • API String ID: 885572716-0
      • Opcode ID: d57d2c2b6a1d29a790100084cf7766824a511902db7252e25419bc630e94d805
      • Instruction ID: 70dc821fbf02d155dabb06a0b36ddf3224be54dac4d3a1c5ca941774c95b4cc9
      • Opcode Fuzzy Hash: d57d2c2b6a1d29a790100084cf7766824a511902db7252e25419bc630e94d805
      • Instruction Fuzzy Hash: 28F03A12A1861741FB20EB25A4417BE63519FCCBA4F485131EACDCABB6DEBCD642A704
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: ExceptionRaise
      • String ID: CCG $TSUR
      • API String ID: 3997070919-2088351922
      • Opcode ID: b7f37dd155eb697baee4333a51d4510cfa74eab51422b6cc498573e7c8516b16
      • Instruction ID: 4d874049215acbcf9846915bd8f42ea2ec2f8cd06558871dce208f4822504463
      • Opcode Fuzzy Hash: b7f37dd155eb697baee4333a51d4510cfa74eab51422b6cc498573e7c8516b16
      • Instruction Fuzzy Hash: 3D419D26F18A458AE7109B61E8503FC6764FB8CB84F548236EE8D537A5DF38E196D700
      APIs
      • WakeByAddressSingle.API-MS-WIN-CORE-SYNCH-L1-2-0(?,?,?,?,00007FF63B88E352), ref: 00007FF63B8A348E
      • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,00007FF63B88E352), ref: 00007FF63B8A34E9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: AddressSingleValueWake
      • String ID: assertion failed: is_unlocked(state)
      • API String ID: 741412973-3502192491
      • Opcode ID: 48f02ea38cc05c9d20fea00dddac4e8405406d7ae0167d4f862429d908957722
      • Instruction ID: 4c6ff50938c671096ec5543ff9ac5768abc37055bf4174f6e196d6bdc5f467ce
      • Opcode Fuzzy Hash: 48f02ea38cc05c9d20fea00dddac4e8405406d7ae0167d4f862429d908957722
      • Instruction Fuzzy Hash: A7218F22F0A4168AFB66961654003B953959FDD728F24C035DE8D867E4DD3DE983AB80
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: Value
      • String ID:
      • API String ID: 3702945584-0
      • Opcode ID: 68c9786fa88d8909b0327f2257ec91d1b152c0c4b7abb8785313471917f74c89
      • Instruction ID: abadfe5c8c7c8263197c5af0dedb5562d7b44eac97f84a4c0e1904f5bd38a5c3
      • Opcode Fuzzy Hash: 68c9786fa88d8909b0327f2257ec91d1b152c0c4b7abb8785313471917f74c89
      • Instruction Fuzzy Hash: E831CD22F0DA1642FA555B1595403BC6394AF8CB80F084435DECEC77F2EE7CE842A740
      APIs
      • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00007FF63B88EE11), ref: 00007FF63B8A9A12
      • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00007FF63B88EE11), ref: 00007FF63B8A9A73
      • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00007FF63B88EE11), ref: 00007FF63B8A9A83
      • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00007FF63B88EE11), ref: 00007FF63B8A9AD2
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: Value
      • String ID:
      • API String ID: 3702945584-0
      • Opcode ID: a4f0b2c96a2fed1340fdf17c3893d7c3d2c3731174bfdde67e07d3523745b4ed
      • Instruction ID: ee097a985fa404895ca35f6004177298b9dbc851e5a6d463ef9092ac8a2e393c
      • Opcode Fuzzy Hash: a4f0b2c96a2fed1340fdf17c3893d7c3d2c3731174bfdde67e07d3523745b4ed
      • Instruction Fuzzy Hash: 3B317C22F1D62246FA559A1595103BD6390AF8CB80F488436DECDC77E6DE7CF942A740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: Value
      • String ID:
      • API String ID: 3702945584-0
      • Opcode ID: a29ce489d6a994ba7e83554d514073fc3469352818fdb9668abb352a044f86ed
      • Instruction ID: 17e65560df409a2470e0f9433723f2dc587e6f86048e0c0394ffcd0dedb0b673
      • Opcode Fuzzy Hash: a29ce489d6a994ba7e83554d514073fc3469352818fdb9668abb352a044f86ed
      • Instruction Fuzzy Hash: D8217C21F0D66646EB556B1585403BCA795AF8CB80F488835DECDC77E2DE7CE8436B40
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2112024096.00007FF63B851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63B850000, based on PE: true
      • Associated: 00000000.00000002.2112005881.00007FF63B850000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112130696.00007FF63B8EC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63B8ED000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112148317.00007FF63BAF5000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112776811.00007FF63BB01000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112790932.00007FF63BB02000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2112804968.00007FF63BB05000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff63b850000_SecuriteInfo.jbxd
      Similarity
      • API ID: CloseHandle
      • String ID:
      • API String ID: 2962429428-0
      • Opcode ID: 6bd6caac4ad39668e3387a6095ec1d3a85d28f6c2940c8a041fab7740e11b7ee
      • Instruction ID: 01a1abf3bc6852c52dd7818db6bb7fa41150f99f8530ccb4b684f294eee36473
      • Opcode Fuzzy Hash: 6bd6caac4ad39668e3387a6095ec1d3a85d28f6c2940c8a041fab7740e11b7ee
      • Instruction Fuzzy Hash: F5F0FF16A1954282EB359A96E4463BD5360EB89794F485031DFCE877E1CFBCE8C7D304

      Execution Graph

      Execution Coverage:27.8%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:64%
      Total number of Nodes:25
      Total number of Limit Nodes:6
      execution_graph 67 b126c 72 b108c GetModuleFileNameW 67->72 69 b1274 70 b129e FreeLibrary 69->70 71 b12ac ExitProcess 69->71 70->71 73 b10a7 72->73 74 b10b5 72->74 86 b11a5 73->86 74->73 77 b10f1 wsprintfW SetDllDirectoryW 74->77 78 b111d LoadLibraryW 77->78 79 b1110 77->79 78->79 80 b1135 LoadLibraryW 78->80 92 b121c GetLastError FormatMessageW 79->92 80->79 82 b114c GetProcAddress 80->82 83 b116a GetProcAddress 82->83 84 b1163 82->84 83->69 84->79 87 b11b1 86->87 88 b11bb LocalAlloc 87->88 89 b11d7 MessageBoxW 88->89 90 b11e4 MessageBeep wsprintfW MessageBoxW LocalFree 88->90 91 b10e1 89->91 90->91 91->69 93 b11a5 6 API calls 92->93 94 b1253 93->94 95 b125d LocalFree 94->95 96 b111a 94->96 95->96 96->69

      Callgraph

      • Executed
      • Not Executed
      • Opacity -> Relevance
      • Disassembly available
      callgraph 0 Function_000B117E 4 Function_000B1000 0->4 1 Function_000B126C 2 Function_000B108C 1->2 3 Function_000B121C 2->3 6 Function_000B11A5 2->6 3->6 5 Function_000B1046 4->5 6->0

      Control-flow Graph

      APIs
      • GetModuleFileNameW.KERNEL32(00000000,000B3010,00000104,00000000,000B1274), ref: 000B109A
      • wsprintfW.USER32 ref: 000B10FC
      • SetDllDirectoryW.KERNEL32(000B3010), ref: 000B1106
      • LoadLibraryW.KERNEL32(ucrtbase.dll), ref: 000B1128
      • LoadLibraryW.KERNELBASE(calibre-launcher.dll), ref: 000B113A
      • GetProcAddress.KERNEL32(00000000,execute_python_entrypoint), ref: 000B1158
      • GetProcAddress.KERNEL32(simple_print), ref: 000B1175
      Strings
      • Executable path has no path separators, xrefs: 000B10D7
      • Unable to find ucrtbase.dll. You should install all Windows updates on your computer to get this file., xrefs: 000B112E
      • Failed to set DLL directory, xrefs: 000B1110
      • calibre-launcher.dll, xrefs: 000B1135
      • ucrtbase.dll, xrefs: 000B1123
      • execute_python_entrypoint, xrefs: 000B1152
      • Failed to load: calibre-launcher.dll, xrefs: 000B1145
      • Installation directory path too long, xrefs: 000B10AE
      • Failed to get the calibre-launcher dll entry point, xrefs: 000B1163
      • app\bin, xrefs: 000B10F1
      • simple_print, xrefs: 000B116A
      Memory Dump Source
      • Source File: 00000004.00000002.2250328543.00000000000B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 000B0000, based on PE: true
      • Associated: 00000004.00000002.2250303346.00000000000B0000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000004.00000002.2250351841.00000000000B2000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000004.00000002.2250377976.00000000000B4000.00000002.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_4_2_b0000_calibre.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc$DirectoryFileModuleNamewsprintf
      • String ID: Executable path has no path separators$Failed to get the calibre-launcher dll entry point$Failed to load: calibre-launcher.dll$Failed to set DLL directory$Installation directory path too long$Unable to find ucrtbase.dll. You should install all Windows updates on your computer to get this file.$app\bin$calibre-launcher.dll$execute_python_entrypoint$simple_print$ucrtbase.dll
      • API String ID: 3608902576-1364716815
      • Opcode ID: 7bd9e50051d14a44e9aa4d446635c80fecba28635742fb73acb8f73d7dc7dcc5
      • Instruction ID: 93b63e6f770329f836d568fb4f51ba8ac3b8e23c2898ef9777b575d1a2c2b333
      • Opcode Fuzzy Hash: 7bd9e50051d14a44e9aa4d446635c80fecba28635742fb73acb8f73d7dc7dcc5
      • Instruction Fuzzy Hash: 46117D30A7831575FA64776D7C3BFDA2A986F11B40F500A22F700F90E2E6D8D890D745

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 23 b126c-b127b call b108c 26 b127d-b128a 23->26 27 b1292-b1294 23->27 29 b128d-b1290 26->29 28 b1295-b129c 27->28 30 b129e-b12a5 FreeLibrary 28->30 31 b12ac-b12ad ExitProcess 28->31 29->28 30->31
      APIs
        • Part of subcall function 000B108C: GetModuleFileNameW.KERNEL32(00000000,000B3010,00000104,00000000,000B1274), ref: 000B109A
      • FreeLibrary.KERNELBASE(?), ref: 000B129F
      • ExitProcess.KERNEL32 ref: 000B12AD
      Strings
      Memory Dump Source
      • Source File: 00000004.00000002.2250328543.00000000000B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 000B0000, based on PE: true
      • Associated: 00000004.00000002.2250303346.00000000000B0000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000004.00000002.2250351841.00000000000B2000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000004.00000002.2250377976.00000000000B4000.00000002.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_4_2_b0000_calibre.jbxd
      Similarity
      • API ID: ExitFileFreeLibraryModuleNameProcess
      • String ID: calibre$calibre.gui_launch
      • API String ID: 2405871167-4149245690
      • Opcode ID: 3ab5895ce043cf68a5fe6e807e059f74a2ac8deac134fb895e4b8454904db074
      • Instruction ID: 1f8c827e3d9e15603d2a2a9da05810c30433de5bb6bb5337c83ff1febec7afcd
      • Opcode Fuzzy Hash: 3ab5895ce043cf68a5fe6e807e059f74a2ac8deac134fb895e4b8454904db074
      • Instruction Fuzzy Hash: 7BE0863063422067F7287B74DC29FE737D8AF01B01F500214B505EA1A1C6ADEA6087E5

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 40 b121c-b124b GetLastError FormatMessageW 41 b124e call b11a5 40->41 42 b1253-b125b 41->42 43 b125d-b1260 LocalFree 42->43 44 b1266-b126b 42->44 43->44
      APIs
      • GetLastError.KERNEL32(?,7591F550,?,?,000B111A,Failed to get the calibre-launcher dll entry point), ref: 000B1227
      • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000400,?,00000000,00000000,?,7591F550,?,?,000B111A,Failed to get the calibre-launcher dll entry point), ref: 000B1241
        • Part of subcall function 000B11A5: LocalAlloc.KERNEL32(00000040,00000000,000B3010,?,000B10E1,Executable path has no path separators,000B2040,00000001), ref: 000B11C9
        • Part of subcall function 000B11A5: MessageBoxW.USER32(00000000,?,00000000,00000010), ref: 000B11DC
      • LocalFree.KERNEL32(?,?,000B111A,Failed to get the calibre-launcher dll entry point), ref: 000B1260
      Memory Dump Source
      • Source File: 00000004.00000002.2250328543.00000000000B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 000B0000, based on PE: true
      • Associated: 00000004.00000002.2250303346.00000000000B0000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000004.00000002.2250351841.00000000000B2000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000004.00000002.2250377976.00000000000B4000.00000002.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_4_2_b0000_calibre.jbxd
      Similarity
      • API ID: LocalMessage$AllocErrorFormatFreeLast
      • String ID:
      • API String ID: 1114563587-0
      • Opcode ID: 97765442c21eb78b54dcc0915ea331e03d9c1202d4bf884d2abcb3c0db65e589
      • Instruction ID: 802d60f78c682e016a8cf9857840fcdec08a3c3a1be083b0c2d95792548fcbbc
      • Opcode Fuzzy Hash: 97765442c21eb78b54dcc0915ea331e03d9c1202d4bf884d2abcb3c0db65e589
      • Instruction Fuzzy Hash: 79F01272901118FBEB116B96DD09DDFBEBCEF85791B100165F605A2161D6714F10D7A0

      Control-flow Graph

      APIs
      • LocalAlloc.KERNEL32(00000040,00000000,000B3010,?,000B10E1,Executable path has no path separators,000B2040,00000001), ref: 000B11C9
      • MessageBoxW.USER32(00000000,?,00000000,00000010), ref: 000B11DC
      • MessageBeep.USER32(00000010), ref: 000B11E4
      • wsprintfW.USER32 ref: 000B11F9
      • MessageBoxW.USER32(00000000,00000000,00000000,00000010), ref: 000B1209
      • LocalFree.KERNEL32(00000000), ref: 000B1210
      Strings
      Memory Dump Source
      • Source File: 00000004.00000002.2250328543.00000000000B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 000B0000, based on PE: true
      • Associated: 00000004.00000002.2250303346.00000000000B0000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000004.00000002.2250351841.00000000000B2000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000004.00000002.2250377976.00000000000B4000.00000002.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_4_2_b0000_calibre.jbxd
      Similarity
      • API ID: Message$Local$AllocBeepFreewsprintf
      • String ID: %s %s (Error Code: %d)
      • API String ID: 827487744-988622853
      • Opcode ID: a4f3f3d05c701116289ec8a8d161a3c4e6818d3941026bfbd15b8639325fdff1
      • Instruction ID: 5a6c8f169fa81e5467c1d2cc2415919ca288d9e69ae6146cbf0caac54bb4c17a
      • Opcode Fuzzy Hash: a4f3f3d05c701116289ec8a8d161a3c4e6818d3941026bfbd15b8639325fdff1
      • Instruction Fuzzy Hash: 11018172551218FBEB127FA0DC09FDE3FA9EF093A0F404511FF09991A2D6758920DBA5