Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
73zGJqwgDy.exe

Overview

General Information

Sample name:73zGJqwgDy.exe
renamed because original name is a hash value
Original sample name:9f2385763546df324e9ba77aa2ba312c890ffdbc0e6e379281ba321c0242318d.exe
Analysis ID:1436571
MD5:31c73b1faf2ac14c68e5ec56bfb6d3a6
SHA1:27b775e8543494a1d3bb3a5d11ebe9b7fb9a401b
SHA256:9f2385763546df324e9ba77aa2ba312c890ffdbc0e6e379281ba321c0242318d
Tags:exemofongo-loader
Infos:

Detection

MofongoLoader
Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected MofongoLoader
Found direct / indirect Syscall (likely to bypass EDR)
Adds / modifies Windows certificates
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain checking for process token information
JA3 SSL client fingerprint seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains an invalid checksum
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • 73zGJqwgDy.exe (PID: 6708 cmdline: "C:\Users\user\Desktop\73zGJqwgDy.exe" MD5: 31C73B1FAF2AC14C68E5EC56BFB6D3A6)
    • msedge.exe (PID: 4176 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" MD5: BF154738460E4AB1D388970E1AB13FAB)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000003.2032161793.0000016028D31000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_MofongoLoaderYara detected MofongoLoaderJoe Security
    00000000.00000003.2031415601.0000016028BAC000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_MofongoLoaderYara detected MofongoLoaderJoe Security
      00000000.00000000.2029784787.00007FF79B681000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_MofongoLoaderYara detected MofongoLoaderJoe Security
        00000000.00000003.2031549611.0000016028BC6000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_MofongoLoaderYara detected MofongoLoaderJoe Security
          00000000.00000003.2033297065.0000016028B9A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_MofongoLoaderYara detected MofongoLoaderJoe Security
            Click to see the 4 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 73zGJqwgDy.exeVirustotal: Detection: 14%Perma Link
            Source: 73zGJqwgDy.exeStatic PE information: certificate valid
            Source: unknownHTTPS traffic detected: 172.67.174.47:443 -> 192.168.2.6:49702 version: TLS 1.2
            Source: 73zGJqwgDy.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6B79F4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF79B6B79F4
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B681530 _Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,Concurrency::details::WorkQueue::IsStructuredEmpty,InternetOpenW,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,Concurrency::details::WorkQueue::IsStructuredEmpty,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,InternetConnectW,InternetCloseHandle,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,Concurrency::details::WorkQueue::IsStructuredEmpty,HttpSendRequestA,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,InternetReadFile,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,MultiByteToWideChar,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,MultiByteToWideChar,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,InternetCloseHandle,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,0_2_00007FF79B681530
            Source: global trafficDNS traffic detected: DNS query: checkcloudnet.com
            Source: unknownHTTP traffic detected: POST /check/connection HTTP/1.1Content-Type: application/jsonUser-Agent: UA/1Host: checkcloudnet.comContent-Length: 99Cache-Control: no-cache
            Source: 73zGJqwgDy.exe, 00000000.00000002.2060864742.0000016028B38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACe
            Source: 73zGJqwgDy.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
            Source: 73zGJqwgDy.exe, 00000000.00000002.2060864742.0000016028B38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: 73zGJqwgDy.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
            Source: 73zGJqwgDy.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
            Source: 73zGJqwgDy.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
            Source: 73zGJqwgDy.exe, 00000000.00000003.2033297065.0000016028B9A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.usertrust.
            Source: 73zGJqwgDy.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
            Source: 73zGJqwgDy.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
            Source: 73zGJqwgDy.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
            Source: 73zGJqwgDy.exeString found in binary or memory: http://ocsp.comodoca.com0
            Source: 73zGJqwgDy.exeString found in binary or memory: http://ocsp.sectigo.com0
            Source: 73zGJqwgDy.exe, 00000000.00000002.2060864742.0000016028BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://checkcloudnet.com/
            Source: 73zGJqwgDy.exe, 00000000.00000002.2060864742.0000016028BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://checkcloudnet.com/.
            Source: 73zGJqwgDy.exe, 73zGJqwgDy.exe, 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmp, 73zGJqwgDy.exe, 00000000.00000003.2060139022.0000016028D3F000.00000004.00000020.00020000.00000000.sdmp, 73zGJqwgDy.exe, 00000000.00000003.2060260743.0000016028BDE000.00000004.00000020.00020000.00000000.sdmp, 73zGJqwgDy.exe, 00000000.00000002.2060864742.0000016028BD8000.00000004.00000020.00020000.00000000.sdmp, 73zGJqwgDy.exe, 00000000.00000002.2060973626.0000016028BE1000.00000004.00000020.00020000.00000000.sdmp, 73zGJqwgDy.exe, 00000000.00000002.2061054833.0000016028D3F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://checkcloudnet.com/check/connection
            Source: 73zGJqwgDy.exe, 00000000.00000002.2060864742.0000016028BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://checkcloudnet.com/check/connection&
            Source: 73zGJqwgDy.exe, 00000000.00000002.2060864742.0000016028B8B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://checkcloudnet.com/check/connectionPt
            Source: 73zGJqwgDy.exe, 00000000.00000003.2060260743.0000016028BDE000.00000004.00000020.00020000.00000000.sdmp, 73zGJqwgDy.exe, 00000000.00000002.2060973626.0000016028BE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://checkcloudnet.com/check/connectionT
            Source: 73zGJqwgDy.exe, 00000000.00000003.2060139022.0000016028D3F000.00000004.00000020.00020000.00000000.sdmp, 73zGJqwgDy.exe, 00000000.00000002.2061054833.0000016028D3F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://checkcloudnet.com/check/connectionUn
            Source: 73zGJqwgDy.exe, 00000000.00000002.2060864742.0000016028B38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://checkcloudnet.com/check/connectionlowed
            Source: 73zGJqwgDy.exeString found in binary or memory: https://sectigo.com/CPS0
            Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
            Source: unknownHTTPS traffic detected: 172.67.174.47:443 -> 192.168.2.6:49702 version: TLS 1.2
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B692160 shared_ptr,shared_ptr,GetModuleHandleA,shared_ptr,shared_ptr,GetModuleHandleA,shared_ptr,shared_ptr,GetModuleHandleA,shared_ptr,shared_ptr,GetModuleHandleA,shared_ptr,shared_ptr,GetModuleHandleA,shared_ptr,shared_ptr,GetModuleHandleA,shared_ptr,shared_ptr,GetModuleHandleA,CreatePipe,SetHandleInformation,CreateProcessA,CloseHandle,CloseHandle,NtCreateSection,CloseHandle,CloseHandle,CloseHandle,CloseHandle,GetCurrentProcess,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,GetStdHandle,ReadFile,GetCurrentProcess,CloseHandle,CloseHandle,CloseHandle,CloseHandle,0_2_00007FF79B692160
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6BDF200_2_00007FF79B6BDF20
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6AB4A00_2_00007FF79B6AB4A0
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6921600_2_00007FF79B692160
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6A7CB00_2_00007FF79B6A7CB0
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6BAB5C0_2_00007FF79B6BAB5C
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6B1B2C0_2_00007FF79B6B1B2C
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6BEA240_2_00007FF79B6BEA24
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6A7AC80_2_00007FF79B6A7AC8
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6A89F40_2_00007FF79B6A89F4
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6B79F40_2_00007FF79B6B79F4
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6AB9AC0_2_00007FF79B6AB9AC
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6A7E980_2_00007FF79B6A7E98
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6B0E0C0_2_00007FF79B6B0E0C
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6AF4480_2_00007FF79B6AF448
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6A84E00_2_00007FF79B6A84E0
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6AC3000_2_00007FF79B6AC300
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6AE1700_2_00007FF79B6AE170
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6BC1340_2_00007FF79B6BC134
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6B21AC0_2_00007FF79B6B21AC
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6B167C0_2_00007FF79B6B167C
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6B962C0_2_00007FF79B6B962C
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6B66980_2_00007FF79B6B6698
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6A95800_2_00007FF79B6A9580
            Source: 73zGJqwgDy.exe, 00000000.00000003.2033094783.0000016029223000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudSecurity.exeX8 vs 73zGJqwgDy.exe
            Source: 73zGJqwgDy.exe, 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCloudSecurity.exeX8 vs 73zGJqwgDy.exe
            Source: 73zGJqwgDy.exeBinary or memory string: OriginalFilenameCloudSecurity.exeX8 vs 73zGJqwgDy.exe
            Source: classification engineClassification label: mal60.troj.evad.winEXE@3/0@1/1
            Source: 73zGJqwgDy.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: 73zGJqwgDy.exeVirustotal: Detection: 14%
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeFile read: C:\Users\user\Desktop\73zGJqwgDy.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\73zGJqwgDy.exe "C:\Users\user\Desktop\73zGJqwgDy.exe"
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"Jump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
            Source: 73zGJqwgDy.exeStatic PE information: certificate valid
            Source: 73zGJqwgDy.exeStatic PE information: Image base 0x140000000 > 0x60000000
            Source: 73zGJqwgDy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: 73zGJqwgDy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: 73zGJqwgDy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: 73zGJqwgDy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: 73zGJqwgDy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: 73zGJqwgDy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: 73zGJqwgDy.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: 73zGJqwgDy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: 73zGJqwgDy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: 73zGJqwgDy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: 73zGJqwgDy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: 73zGJqwgDy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: 73zGJqwgDy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000003.2032161793.0000016028D31000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.2031415601.0000016028BAC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.2029784787.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.2031549611.0000016028BC6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.2033297065.0000016028B9A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.2033207199.0000016028D31000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.2031259852.0000016028B9B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.2033094783.0000016029181000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B690B50 _Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,CheckTokenMembership,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,0_2_00007FF79B690B50
            Source: 73zGJqwgDy.exeStatic PE information: real checksum: 0xa7e3c should be: 0xa907f
            Source: 73zGJqwgDy.exeStatic PE information: section name: _RDATA
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B681530 _Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,Concurrency::details::WorkQueue::IsStructuredEmpty,InternetOpenW,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,Concurrency::details::WorkQueue::IsStructuredEmpty,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,InternetConnectW,InternetCloseHandle,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,Concurrency::details::WorkQueue::IsStructuredEmpty,HttpSendRequestA,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,InternetReadFile,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,MultiByteToWideChar,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,MultiByteToWideChar,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,InternetCloseHandle,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,0_2_00007FF79B681530
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOTJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-22591
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6B79F4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF79B6B79F4
            Source: 73zGJqwgDy.exe, 00000000.00000002.2060973626.0000016028BFC000.00000004.00000020.00020000.00000000.sdmp, 73zGJqwgDy.exe, 00000000.00000002.2060864742.0000016028B8B000.00000004.00000020.00020000.00000000.sdmp, 73zGJqwgDy.exe, 00000000.00000003.2060260743.0000016028BFC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6A6CD0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF79B6A6CD0
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B690B50 _Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,CheckTokenMembership,_Mtx_guard::~_Mtx_guard,_Mtx_guard::~_Mtx_guard,LoadLibraryA,GetProcAddress,0_2_00007FF79B690B50
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6BBE4C GetProcessHeap,0_2_00007FF79B6BBE4C
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6A6CD0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF79B6A6CD0
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6A1060 SetUnhandledExceptionFilter,0_2_00007FF79B6A1060
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6A0EBC IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF79B6A0EBC
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6A02BC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF79B6A02BC

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeNtCreateSection: Indirect: 0x7FF79B692665Jump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"Jump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6C1040 cpuid 0_2_00007FF79B6C1040
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF79B6BBB34
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00007FF79B6BB958
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: GetLocaleInfoW,0_2_00007FF79B6BBA08
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: GetLocaleInfoW,0_2_00007FF79B6B39E8
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,0_2_00007FF79B6BB100
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: EnumSystemLocalesW,0_2_00007FF79B6BB44C
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: GetLocaleInfoW,0_2_00007FF79B6BB800
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: EnumSystemLocalesW,0_2_00007FF79B6BB51C
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF79B6BB5B4
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: EnumSystemLocalesW,0_2_00007FF79B6B35A8
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeCode function: 0_2_00007FF79B6A0DA0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF79B6A0DA0
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: C:\Users\user\Desktop\73zGJqwgDy.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 BlobJump to behavior
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Native API
            1
            DLL Side-Loading
            11
            Process Injection
            1
            Disable or Modify Tools
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            11
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            Abuse Elevation Control Mechanism
            11
            Process Injection
            LSASS Memory1
            Query Registry
            Remote Desktop ProtocolData from Removable Media1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            1
            Abuse Elevation Control Mechanism
            Security Account Manager21
            Security Software Discovery
            SMB/Windows Admin SharesData from Network Shared Drive2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            DLL Side-Loading
            NTDS1
            File and Directory Discovery
            Distributed Component Object ModelInput Capture3
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets23
            System Information Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            73zGJqwgDy.exe14%VirustotalBrowse
            73zGJqwgDy.exe11%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            checkcloudnet.com0%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
            https://sectigo.com/CPS00%URL Reputationsafe
            http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%URL Reputationsafe
            http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%URL Reputationsafe
            http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
            http://ocsp.sectigo.com00%URL Reputationsafe
            http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
            http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
            http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#0%URL Reputationsafe
            http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
            https://checkcloudnet.com/check/connectionUn0%Avira URL Cloudsafe
            https://checkcloudnet.com/check/connection&0%Avira URL Cloudsafe
            https://checkcloudnet.com/check/connectionT0%Avira URL Cloudsafe
            http://crl.usertrust.0%Avira URL Cloudsafe
            https://checkcloudnet.com/.0%Avira URL Cloudsafe
            https://checkcloudnet.com/check/connection0%Avira URL Cloudsafe
            https://checkcloudnet.com/check/connectionlowed0%Avira URL Cloudsafe
            https://checkcloudnet.com/0%Avira URL Cloudsafe
            https://checkcloudnet.com/check/connectionPt0%Avira URL Cloudsafe
            https://checkcloudnet.com/.0%VirustotalBrowse
            https://checkcloudnet.com/check/connectionT0%VirustotalBrowse
            https://checkcloudnet.com/check/connection0%VirustotalBrowse
            https://checkcloudnet.com/check/connectionlowed0%VirustotalBrowse
            https://checkcloudnet.com/check/connection&0%VirustotalBrowse
            https://checkcloudnet.com/0%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            checkcloudnet.com
            172.67.174.47
            truefalseunknown
            NameMaliciousAntivirus DetectionReputation
            https://checkcloudnet.com/check/connectionfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://checkcloudnet.com/check/connectionUn73zGJqwgDy.exe, 00000000.00000003.2060139022.0000016028D3F000.00000004.00000020.00020000.00000000.sdmp, 73zGJqwgDy.exe, 00000000.00000002.2061054833.0000016028D3F000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t73zGJqwgDy.exefalse
            • URL Reputation: safe
            unknown
            https://checkcloudnet.com/check/connection&73zGJqwgDy.exe, 00000000.00000002.2060864742.0000016028BD8000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://sectigo.com/CPS073zGJqwgDy.exefalse
            • URL Reputation: safe
            unknown
            http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y73zGJqwgDy.exefalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl073zGJqwgDy.exefalse
            • URL Reputation: safe
            unknown
            http://ocsp.sectigo.com073zGJqwgDy.exefalse
            • URL Reputation: safe
            unknown
            http://crl.usertrust.73zGJqwgDy.exe, 00000000.00000003.2033297065.0000016028B9A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#73zGJqwgDy.exefalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#73zGJqwgDy.exefalse
            • URL Reputation: safe
            unknown
            https://checkcloudnet.com/.73zGJqwgDy.exe, 00000000.00000002.2060864742.0000016028BD8000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://checkcloudnet.com/check/connectionT73zGJqwgDy.exe, 00000000.00000003.2060260743.0000016028BDE000.00000004.00000020.00020000.00000000.sdmp, 73zGJqwgDy.exe, 00000000.00000002.2060973626.0000016028BE1000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#73zGJqwgDy.exefalse
            • URL Reputation: safe
            unknown
            https://checkcloudnet.com/check/connectionlowed73zGJqwgDy.exe, 00000000.00000002.2060864742.0000016028B38000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://checkcloudnet.com/73zGJqwgDy.exe, 00000000.00000002.2060864742.0000016028BD8000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://checkcloudnet.com/check/connectionPt73zGJqwgDy.exe, 00000000.00000002.2060864742.0000016028B8B000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            172.67.174.47
            checkcloudnet.comUnited States
            13335CLOUDFLARENETUSfalse
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1436571
            Start date and time:2024-05-06 02:34:04 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 4m 9s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:8
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:73zGJqwgDy.exe
            renamed because original name is a hash value
            Original Sample Name:9f2385763546df324e9ba77aa2ba312c890ffdbc0e6e379281ba321c0242318d.exe
            Detection:MAL
            Classification:mal60.troj.evad.winEXE@3/0@1/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 99%
            • Number of executed functions: 39
            • Number of non-executed functions: 86
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            No simulations
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            172.67.174.47Hy424UHYHW.exeGet hashmaliciousMofongoLoaderBrowse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              checkcloudnet.comJ5kltefeTK.exeGet hashmaliciousMofongoLoaderBrowse
              • 104.21.30.238
              R3vjRWX78A.exeGet hashmaliciousMofongoLoaderBrowse
              • 104.21.30.238
              Hy424UHYHW.exeGet hashmaliciousMofongoLoaderBrowse
              • 172.67.174.47
              hhuMIEqMI4.exeGet hashmaliciousMofongoLoaderBrowse
              • 104.21.30.238
              6K9cOetNqp.exeGet hashmaliciousMofongoLoaderBrowse
              • 104.21.30.238
              hoe3lPtxUv.exeGet hashmaliciousMofongoLoaderBrowse
              • 104.21.30.238
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              CLOUDFLARENETUSJ5kltefeTK.exeGet hashmaliciousMofongoLoaderBrowse
              • 104.21.30.238
              qxn9Zvy1at.exeGet hashmaliciousMofongoLoaderBrowse
              • 172.67.214.45
              https://reactivate-account.live/Get hashmaliciousUnknownBrowse
              • 172.67.74.152
              https://rkr.wyd.mybluehost.me/bont/off/MTTRBDFH/index.php?FGDD=1Get hashmaliciousHTMLPhisherBrowse
              • 104.17.25.14
              https://igrejavideiravl.com/css/MTTRBDFH/index.php?FGDD=1Get hashmaliciousHTMLPhisherBrowse
              • 104.17.25.14
              http://hotwaterspecialistsydney.com.auGet hashmaliciousUnknownBrowse
              • 104.18.10.207
              https://yxl.oha.mybluehost.me/DO/net/login.phpGet hashmaliciousUnknownBrowse
              • 162.247.243.29
              https://launchedmaleperf0rmesxx.z13.web.core.windows.net/index.htmlGet hashmaliciousTechSupportScamBrowse
              • 104.17.25.14
              pDWZMd3100.elfGet hashmaliciousMirai, GafgytBrowse
              • 8.47.122.39
              https://srv69476.seohost.com.pl/public/jeieTM3XihA3VcSzLhEBi7OyIY8jw7GIGet hashmaliciousUnknownBrowse
              • 104.21.234.144
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              37f463bf4616ecd445d4a1937da06e19J5kltefeTK.exeGet hashmaliciousMofongoLoaderBrowse
              • 172.67.174.47
              qxn9Zvy1at.exeGet hashmaliciousMofongoLoaderBrowse
              • 172.67.174.47
              R3vjRWX78A.exeGet hashmaliciousMofongoLoaderBrowse
              • 172.67.174.47
              Hy424UHYHW.exeGet hashmaliciousMofongoLoaderBrowse
              • 172.67.174.47
              hhuMIEqMI4.exeGet hashmaliciousMofongoLoaderBrowse
              • 172.67.174.47
              6K9cOetNqp.exeGet hashmaliciousMofongoLoaderBrowse
              • 172.67.174.47
              hoe3lPtxUv.exeGet hashmaliciousMofongoLoaderBrowse
              • 172.67.174.47
              BS4GDarWw6.exeGet hashmaliciousVidarBrowse
              • 172.67.174.47
              Arrival Notice.pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
              • 172.67.174.47
              E7236252-receipt.vbsGet hashmaliciousXWormBrowse
              • 172.67.174.47
              No context
              No created / dropped files found
              File type:PE32+ executable (GUI) x86-64, for MS Windows
              Entropy (8bit):4.894351813667311
              TrID:
              • Win64 Executable GUI (202006/5) 92.65%
              • Win64 Executable (generic) (12005/4) 5.51%
              • Generic Win/DOS Executable (2004/3) 0.92%
              • DOS Executable Generic (2002/1) 0.92%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:73zGJqwgDy.exe
              File size:685'800 bytes
              MD5:31c73b1faf2ac14c68e5ec56bfb6d3a6
              SHA1:27b775e8543494a1d3bb3a5d11ebe9b7fb9a401b
              SHA256:9f2385763546df324e9ba77aa2ba312c890ffdbc0e6e379281ba321c0242318d
              SHA512:41caca74f9b7d1702bf125824fac51a3ef375351d90a8a2794275f1e4838d6c79c44b0593ae5c975a89042e4d55017022f0d496457b0319a29b744114e3baede
              SSDEEP:6144:xwrGnfIRzRSPpwMHjH4ZGL3O0b83ii96AMaJB8udk4+xZRtiKzvzaOLVY9:xAGwtRSPuMHjH0GL3OB3x6Faa69
              TLSH:05E47EC6E6640CECF57688388D73721AA9617CB9432056C726907676DB336E4F93B703
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........ZY...Y...Y......._...............I...Y...X..._X..I..._X..K..._X..........^...Y...1...6X..]...6X..X...6X..X...RichY..........
              Icon Hash:0c961b1311919080
              Entrypoint:0x14002097c
              Entrypoint Section:.text
              Digitally signed:true
              Imagebase:0x140000000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Time Stamp:0x65D52C37 [Tue Feb 20 22:48:23 2024 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:6
              OS Version Minor:0
              File Version Major:6
              File Version Minor:0
              Subsystem Version Major:6
              Subsystem Version Minor:0
              Import Hash:9e618d3714c6ac086a06d7e977b5ceb1
              Signature Valid:true
              Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
              Signature Validation Error:The operation completed successfully
              Error Number:0
              Not Before, Not After
              • 15/05/2023 02:00:00 15/05/2024 01:59:59
              Subject Chain
              • CN=GreenEngine OU, O=GreenEngine OU, S=Harjumaa, C=EE
              Version:3
              Thumbprint MD5:47413D0F40F4C211F6527804E95DBB34
              Thumbprint SHA-1:69B1966E16949B9C76A66C82EB077109F764EBA2
              Thumbprint SHA-256:A0D0C4ACBCCEBD5C03FF416E1AD2487E7A936F799A57D84EDE3CC9F8C0BCD819
              Serial:6AB35C5785260695E9C012514DB0C299
              Instruction
              dec eax
              sub esp, 28h
              call 00007FC8F0D67680h
              dec eax
              add esp, 28h
              jmp 00007FC8F0D670D7h
              int3
              int3
              dec eax
              sub esp, 28h
              call 00007FC8F0D67A10h
              test eax, eax
              je 00007FC8F0D67283h
              dec eax
              mov eax, dword ptr [00000030h]
              dec eax
              mov ecx, dword ptr [eax+08h]
              jmp 00007FC8F0D67267h
              dec eax
              cmp ecx, eax
              je 00007FC8F0D67276h
              xor eax, eax
              dec eax
              cmpxchg dword ptr [0003899Ch], ecx
              jne 00007FC8F0D67250h
              xor al, al
              dec eax
              add esp, 28h
              ret
              mov al, 01h
              jmp 00007FC8F0D67259h
              int3
              int3
              int3
              dec eax
              sub esp, 28h
              test ecx, ecx
              jne 00007FC8F0D67269h
              mov byte ptr [00038985h], 00000001h
              call 00007FC8F0D67459h
              call 00007FC8F0D68BB8h
              test al, al
              jne 00007FC8F0D67266h
              xor al, al
              jmp 00007FC8F0D67276h
              call 00007FC8F0D7617Bh
              test al, al
              jne 00007FC8F0D6726Bh
              xor ecx, ecx
              call 00007FC8F0D68BC8h
              jmp 00007FC8F0D6724Ch
              mov al, 01h
              dec eax
              add esp, 28h
              ret
              int3
              int3
              inc eax
              push ebx
              dec eax
              sub esp, 20h
              cmp byte ptr [0003894Ch], 00000000h
              mov ebx, ecx
              jne 00007FC8F0D672C9h
              cmp ecx, 01h
              jnbe 00007FC8F0D672CCh
              call 00007FC8F0D67986h
              test eax, eax
              je 00007FC8F0D6728Ah
              test ebx, ebx
              jne 00007FC8F0D67286h
              dec eax
              lea ecx, dword ptr [00038936h]
              call 00007FC8F0D75F9Ah
              test eax, eax
              jne 00007FC8F0D67272h
              dec eax
              lea ecx, dword ptr [0003893Eh]
              call 00007FC8F0D6728Ah
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x55ea40x50.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x620000x481ca.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x5b0000x4758.pdata
              IMAGE_DIRECTORY_ENTRY_SECURITY0xa4a000x2ce8.rsrc
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x610000xad8.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x503d00x1c.rdata
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x502900x140.rdata
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x440000x2f8.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x42b140x42c007537927333c051664949aefc61fd5a1aFalse0.45422591877340823data6.130993027929059IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0x440000x128b60x12a00db38c9bfabbf3462d8921fc81bba7ffbFalse0.40687919463087246data4.88570170944556IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x570000x31a00x1800faaede84d1ee141a6e2b3f859f8aa999False0.15836588541666666data3.216862681128812IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .pdata0x5b0000x47580x4800111bb645f8306dbe2dcb9e0e4e7bb530False0.4660373263888889data5.517520409001171IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              _RDATA0x600000x1f40x20043c0e7d2b7012672ebc0b5fead60d58cFalse0.509765625data4.194331301484952IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x610000xad80xc000f6bcfae9a63d31ff4bf3727432f9489False0.47265625data5.258543532793456IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              .rsrc0x620000x481ca0x48200a5f727b7d39d4259faeb98440a981cb6False0.048090202556325824data2.052089933396767IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_ICON0x622800x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m0.24379432624113476
              RT_ICON0x626e80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 2835 x 2835 px/m0.16434426229508198
              RT_ICON0x630700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/m0.13297373358348968
              RT_ICON0x641180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2835 x 2835 px/m0.08952282157676349
              RT_ICON0x666c00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2835 x 2835 px/m0.06914265470004724
              RT_ICON0x6a8e80x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864, resolution 2835 x 2835 px/m0.052843178473828044
              RT_ICON0x73d900x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2835 x 2835 px/m0.04186383532473678
              RT_ICON0x845b80x25228Device independent bitmap graphic, 192 x 384 x 32, image size 147456, resolution 2835 x 2835 px/m0.031701993372955345
              RT_GROUP_ICON0xa97e00x76data0.7372881355932204
              RT_VERSION0xa98580x36cdata0.4189497716894977
              RT_MANIFEST0xa9bc40x606XML 1.0 document, ASCII textEnglishUnited States0.45395590142671854
              DLLImport
              KERNEL32.dllMultiByteToWideChar, GetStdHandle, ReadFile, CloseHandle, LoadLibraryA, CreatePipe, GetCurrentProcess, CreateProcessA, GetModuleHandleA, SetEndOfFile, SetHandleInformation, GetProcAddress, WriteConsoleW, HeapSize, WideCharToMultiByte, GetStringTypeW, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, EncodePointer, DecodePointer, LCMapStringEx, GetCPInfo, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlPcToFileHeader, RaiseException, RtlUnwindEx, GetLastError, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, WriteFile, GetModuleFileNameW, ExitProcess, GetModuleHandleExW, GetCommandLineA, GetCommandLineW, HeapAlloc, HeapFree, GetFileType, HeapReAlloc, GetFileSizeEx, SetFilePointerEx, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, GetProcessHeap, ReadConsoleW, CreateFileW, RtlUnwind
              ADVAPI32.dllOpenProcessToken
              WININET.dllInternetCloseHandle
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              TimestampSource PortDest PortSource IPDest IP
              May 6, 2024 02:34:47.810739994 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:47.810786009 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:47.810913086 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:47.819674969 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:47.819690943 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.056312084 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.056442022 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.077299118 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.077322006 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.077522039 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.077677965 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.079463005 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.124110937 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.568388939 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.568587065 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.568603039 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.568681955 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.626329899 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.626373053 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.626398087 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.626396894 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.626410007 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.626617908 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.626617908 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.626729012 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.626773119 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.626780033 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.626806021 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.626827955 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.626836061 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.626852989 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.626892090 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.627329111 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.627372026 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.627660990 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.627701044 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.627706051 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.627738953 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.627743006 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.627748966 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.627769947 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.627803087 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.627806902 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.627837896 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.628416061 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.628454924 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.628460884 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.628493071 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.628498077 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.628534079 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.628537893 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.628547907 CEST44349702172.67.174.47192.168.2.6
              May 6, 2024 02:34:48.628585100 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.628596067 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.808921099 CEST49702443192.168.2.6172.67.174.47
              May 6, 2024 02:34:48.808948040 CEST44349702172.67.174.47192.168.2.6
              TimestampSource PortDest PortSource IPDest IP
              May 6, 2024 02:34:47.653430939 CEST5700553192.168.2.61.1.1.1
              May 6, 2024 02:34:47.805388927 CEST53570051.1.1.1192.168.2.6
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              May 6, 2024 02:34:47.653430939 CEST192.168.2.61.1.1.10x5cc2Standard query (0)checkcloudnet.comA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              May 6, 2024 02:34:47.805388927 CEST1.1.1.1192.168.2.60x5cc2No error (0)checkcloudnet.com172.67.174.47A (IP address)IN (0x0001)false
              May 6, 2024 02:34:47.805388927 CEST1.1.1.1192.168.2.60x5cc2No error (0)checkcloudnet.com104.21.30.238A (IP address)IN (0x0001)false
              • checkcloudnet.com
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.649702172.67.174.474436708C:\Users\user\Desktop\73zGJqwgDy.exe
              TimestampBytes transferredDirectionData
              2024-05-06 00:34:48 UTC155OUTPOST /check/connection HTTP/1.1
              Content-Type: application/json
              User-Agent: UA/1
              Host: checkcloudnet.com
              Content-Length: 99
              Cache-Control: no-cache
              2024-05-06 00:34:48 UTC99OUTData Raw: 7b 22 61 70 70 69 64 22 3a 22 37 33 34 30 65 38 39 34 2d 37 37 64 33 2d 34 62 31 62 2d 39 64 63 63 2d 61 34 33 64 65 63 33 38 65 65 39 31 22 2c 22 64 65 76 69 63 65 69 64 22 3a 22 35 32 31 32 32 34 36 31 32 32 36 35 38 33 36 39 33 34 30 35 31 31 37 32 34 37 36 37 35 36 36 33 34 31 30 30 33 22 7d
              Data Ascii: {"appid":"7340e894-77d3-4b1b-9dcc-a43dec38ee91","deviceid":"5212246122658369340511724767566341003"}
              2024-05-06 00:34:48 UTC377INHTTP/1.1 200 OK
              Date: Mon, 06 May 2024 00:34:48 GMT
              Content-Type: text/html; charset=UTF-8
              Transfer-Encoding: chunked
              Connection: close
              Cache-Control: no-store
              Vary: Accept-Encoding
              CF-Cache-Status: DYNAMIC
              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
              report-to:
              Server: cloudflare
              CF-RAY: 87f4e2fb9ae54c20-MIA
              alt-svc: h3=":443"; ma=86400
              2024-05-06 00:34:48 UTC364INData Raw: 31 36 35 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 27 65 6e 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 27 55 54 46 2d 38 27 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 76 69 65 77 70 6f 72 74 27 20 63 6f 6e 74 65 6e 74 3d 27 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 27 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 64 65 73 63 72 69 70 74 69 6f 6e 27 20 63 6f 6e 74 65 6e 74 3d 27 54 68 65 20 74 72 61 64 69 74 69 6f 6e 20 6f 66 20 73 74 61 72 74 69 6e 67 20 79 6f 75 72 20 70 72 6f 67 72 61 6d 6d 69 6e 67 20 6a 6f 75 72 6e 65 79 20 77 69 74 68 20 61 20 22 48 65 6c 6c 6f 20 57 6f 72 6c 64 22 20 61 70 70 6c 69 63 61
              Data Ascii: 165<!DOCTYPE html><html lang='en'><head><meta charset='UTF-8'><meta name='viewport' content='width=device-width, initial-scale=1.0'><meta name='description' content='The tradition of starting your programming journey with a "Hello World" applica
              2024-05-06 00:34:48 UTC1369INData Raw: 35 38 34 32 0d 0a 0a 09 3c 6c 69 6e 6b 20 72 65 6c 3d 27 69 63 6f 6e 27 20 74 79 70 65 3d 27 69 6d 61 67 65 2f 70 6e 67 27 20 68 72 65 66 3d 27 64 61 74 61 3a 69 6d 61 67 65 2f 70 6e 67 3b 62 61 73 65 36 34 2c 69 56 42 4f 52 77 30 4b 47 67 6f 41 41 41 41 4e 53 55 68 45 55 67 41 41 41 67 41 41 41 41 49 41 43 41 59 41 41 41 44 30 65 4e 54 36 41 41 41 41 42 48 4e 43 53 56 51 49 43 41 67 49 66 41 68 6b 69 41 41 41 41 41 6c 77 53 46 6c 7a 41 41 41 4f 78 41 41 41 44 73 51 42 6c 53 73 4f 47 77 41 41 41 42 6c 30 52 56 68 30 55 32 39 6d 64 48 64 68 63 6d 55 41 64 33 64 33 4c 6d 6c 75 61 33 4e 6a 59 58 42 6c 4c 6d 39 79 5a 35 76 75 50 42 6f 41 41 43 41 41 53 55 52 42 56 48 69 63 37 64 31 35 6d 42 78 58 65 66 62 2f 2b 36 6e 75 47 59 30 6b 32 35 49 74 32 51 34 45 62
              Data Ascii: 5842<link rel='icon' type='image/png' href='data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAgAAAAIACAYAAAD0eNT6AAAABHNCSVQICAgIfAhkiAAAAAlwSFlzAAAOxAAADsQBlSsOGwAAABl0RVh0U29mdHdhcmUAd3d3Lmlua3NjYXBlLm9yZ5vuPBoAACAASURBVHic7d15mBxXefb/+6nuGY0k25It2Q4Eb
              2024-05-06 00:34:48 UTC1369INData Raw: 46 71 66 66 66 50 77 44 41 45 62 49 64 41 45 79 33 4b 66 53 2f 44 33 7a 52 5a 7a 39 32 67 59 30 64 32 54 78 63 39 2f 79 74 59 32 50 6e 53 38 45 2f 53 50 36 34 4c 6c 52 34 69 38 7a 65 4f 72 6c 77 36 50 4c 4c 69 6a 62 65 71 72 35 66 37 68 31 37 68 6e 6e 77 44 35 49 2f 4e 76 58 71 65 76 2f 39 41 77 42 45 53 48 77 70 34 49 75 76 33 76 4e 32 75 62 30 35 36 58 34 54 5a 2f 72 69 34 4d 4b 46 4c 2f 6c 77 30 65 36 62 37 74 44 68 59 51 39 2b 39 5a 53 78 74 37 76 73 6a 55 70 68 43 32 55 64 47 4f 51 7a 45 34 73 57 76 72 7a 56 69 66 39 49 47 79 37 33 33 48 48 48 37 48 32 48 75 64 36 51 52 6d 32 53 65 76 37 39 41 34 42 35 4a 2f 44 7a 50 37 46 2b 38 64 57 4a 64 5a 64 55 52 2f 33 46 50 2f 6d 51 72 79 31 38 2f 6b 78 4f 58 70 49 30 50 47 7a 68 78 38 39 66 2f 48 2f 64 39 4f
              Data Ascii: FqfffPwDAEbIdAEy3KfS/D3zRZz92gY0d2Txc9/ytY2PnS8E/SP64LlR4i8zeOrlw6PLLijbeqr5f7h17hnnwD5I/NvXqev/9AwBESHwp4Iuv3vN2ub056X4TZ/ri4MKFL/lw0e6b7tDhYQ9+9ZSxt7vsjUphC2UdGOQzE4sWvrzVif9IGy733HHH7H2Hud6QRm2Sev79A4B5J/DzP7F+8dWJdZdUR/3FP/mQry18/kxOXpI0PGzhx89f/H/d9O
              2024-05-06 00:34:48 UTC1369INData Raw: 67 74 7a 65 74 30 6b 36 4f 65 47 36 4d 43 66 32 45 6c 66 34 6b 6f 75 76 47 76 75 4e 44 6a 79 64 4d 53 38 58 50 51 46 6d 61 45 44 53 67 31 31 4b 35 4a 36 73 58 70 61 31 41 43 44 4a 6e 2f 37 4c 70 2b 37 39 52 30 6c 76 62 50 65 56 46 31 2b 31 35 79 38 6b 2b 39 4d 4f 46 48 57 34 43 79 2b 2b 61 75 38 33 50 33 48 2b 77 6e 65 32 2b 38 4b 4c 72 74 70 7a 73 65 51 64 6d 70 30 34 61 50 62 76 33 30 56 58 37 6e 32 70 7a 46 2f 62 67 61 4b 51 6a 4e 39 70 2f 67 47 51 41 64 6d 36 42 4e 42 6b 72 6a 64 63 66 50 58 65 6a 32 36 34 33 41 64 6e 39 41 4a 33 75 2b 54 4b 73 54 64 49 39 6f 45 4f 6c 33 5a 77 77 48 2b 36 2b 4b 71 78 39 32 2b 34 33 47 64 38 49 39 38 6c 56 34 32 39 78 70 54 4f 59 68 56 74 76 33 39 71 31 6d 64 2b 61 53 66 72 41 67 44 4d 58 43 59 44 67 43 54 4a 2f 65 56
              Data Ascii: gtzet0k6OeG6MCf2Elf4kouvGvuNDjydMS8XPQFmaEDSg11K5J6sXpa1ACDJn/7Lp+79R0lvbPeVF1+15y8k+9MOFHW4Cy++au83P3H+wne2+8KLrtpzseQdmp04aPbv30VX7n2pzF/bgaKQjN9p/gGQAdm6BNBkrjdcfPXej2643Adn9AJ3u+TKsTdI9oEOl3ZwwH+6+Kqx92+43Gd8I98lV429xpTOYhVtv39q1md+aSfrAgDMXCYDgCTJ/eV
              2024-05-06 00:34:48 UTC1369INData Raw: 63 62 63 2f 51 51 7a 65 34 69 37 50 30 56 53 62 68 5a 64 56 4e 33 39 77 30 45 51 66 46 66 53 79 65 35 2b 69 61 51 58 4a 31 74 6c 59 73 62 4e 37 47 50 75 2f 68 2f 75 76 69 73 49 67 73 65 35 2b 39 39 4c 4f 72 50 62 68 53 58 46 7a 48 34 64 68 75 48 57 49 41 69 32 6d 64 6e 33 4a 69 63 6e 66 39 4a 6f 4e 47 35 74 64 65 7a 36 39 65 75 50 32 37 74 33 37 79 4e 79 75 64 77 6a 33 66 30 73 4d 7a 76 62 33 5a 38 73 66 6c 65 6a 41 2f 69 68 51 72 74 32 6d 64 6c 5a 31 57 72 31 39 73 4f 2b 64 6d 4f 78 57 50 79 32 6d 56 33 54 68 58 6f 32 31 32 71 31 70 30 76 79 35 6e 2f 2f 53 4e 4c 32 55 71 6c 30 72 36 54 58 7a 4b 5a 44 4d 2f 75 48 73 62 47 78 66 37 72 2b 2b 75 76 33 4a 6c 58 6b 62 46 51 71 6c 55 65 45 59 58 69 6c 70 44 50 61 65 4e 6d 58 61 37 58 61 73 2f 58 41 39 32 4e 62
              Data Ascii: cbc/QQze4i7P0VSbhZdVN39w0EQfFfSye5+iaQXJ1tlYsbN7GPu/h/uvisIgse5+99LOrPbhSXFzH4dhuHWIAi2mdn3Jicnf9JoNG5tdez69euP27t37yNyudwj3f0sMzvb3Z8sflejA/ihQrt2mdlZ1Wr19sO+dmOxWPy2mV3ThXo212q1p0vy5n//SNL2Uql0r6TXzKZDM/uHsbGxf7r++uv3JlXkbFQqlUeEYXilpDPaeNmXa7Xas/XA92Nb
              2024-05-06 00:34:48 UTC1369INData Raw: 6d 30 33 2b 76 76 64 66 2f 64 6e 47 61 50 56 43 77 57 6e 32 56 6d 6e 35 4d 30 31 4b 45 61 56 67 5a 42 55 46 32 31 61 74 58 78 55 51 63 30 56 78 4f 38 70 45 50 6a 59 78 34 68 41 41 44 7a 42 77 47 67 63 2f 59 48 51 66 41 33 63 51 65 55 79 2b 57 56 5a 76 59 66 36 76 7a 4e 31 59 38 66 48 42 7a 63 4f 44 77 38 48 50 6e 37 75 31 61 72 62 5a 5a 30 52 59 66 72 51 4a 38 6a 41 41 43 48 63 41 4a 46 6c 41 2f 47 54 66 32 76 58 72 33 36 52 48 65 2f 58 41 64 32 39 45 74 44 2b 64 70 72 72 34 32 39 34 53 38 4d 77 2f 38 72 4b 57 71 6c 52 59 41 41 41 42 79 6d 33 77 4e 41 76 39 66 66 71 2f 61 62 32 62 76 69 44 68 67 59 47 50 69 41 70 49 65 6b 56 49 38 6b 79 63 7a 65 57 71 6c 55 48 68 66 56 33 6d 67 30 76 69 76 70 53 79 6d 57 68 44 35 44 41 41 41 4f 36 66 63 54 61 4c 2f 58 33
              Data Ascii: m03+vvdf/dnGaPVCwWn2Vmn5M01KEaVgZBUF21atXxUQc0VxO8pEPjYx4hAADzBwGgc/YHQfA3cQeUy+WVZvYf6vzN1Y8fHBzcODw8HPn7u1arbZZ0RYfrQJ8jAACHcAJFlA/GTf2vXr36RHe/XAd29EtD+dprr4294S8Mw/8rKWqlRYAAABym3wNAv9ffq/ab2bviDhgYGPiApIekVI8kyczeWqlUHhfV3mg0vivpSymWhD5DAAAO6fcTaL/X3
              2024-05-06 00:34:48 UTC1369INData Raw: 65 66 77 38 36 5a 63 32 61 4e 5a 45 72 2f 72 6c 37 49 38 56 61 70 76 4f 64 35 6d 57 4a 6c 73 7a 73 4b 57 6b 57 67 2f 35 41 41 41 41 4f 36 66 63 54 61 4c 2f 58 33 33 4d 6d 4a 79 63 6a 54 35 79 44 67 34 4f 6a 6b 71 5a 53 4c 43 66 4f 6c 71 69 47 44 52 73 32 35 43 51 39 4d 63 56 61 30 43 63 49 41 41 41 51 77 63 78 57 52 37 56 74 32 72 52 70 74 37 74 48 6e 6e 68 54 64 6e 6c 55 77 35 31 33 33 72 6c 53 50 62 68 30 4d 62 71 50 41 41 41 63 30 75 2b 66 6f 50 75 39 2f 70 37 6a 37 73 2b 4e 61 77 2b 43 34 4c 4b 55 53 6f 6e 7a 2f 56 71 74 39 72 57 6f 78 71 6d 70 71 51 76 53 4c 41 62 39 67 77 41 41 4e 50 58 37 58 66 54 39 58 6e 38 76 4d 72 4f 48 46 34 76 46 33 34 39 71 76 2b 75 75 75 2f 37 62 33 58 2b 57 5a 6b 31 48 63 76 64 33 78 7a 53 62 6d 54 30 37 74 57 4c 51 56 77
              Data Ascii: efw86Zc2aNZEr/rl7I8VapvOd5mWJlszsKWkWg/5AAAAO6fcTaL/X33MmJycjT5yDg4OjkqZSLCfOlqiGDRs25CQ9McVa0CcIAAAQwcxWR7Vt2rRpt7tHnnhTdnlUw5133rlSPbh0MbqPAAAc0u+foPu9/p7j7s+Naw+C4LKUSonz/Vqt9rWoxqmpqQvSLAb9gwAANPX7XfT9Xn8vMrOHF4vF349qv+uuu/7b3X+WZk1Hcvd3xzSbmT07tWLQVw
              2024-05-06 00:34:48 UTC1369INData Raw: 6e 50 77 78 43 77 51 41 74 4d 58 4d 54 6f 68 70 6a 6d 76 72 69 48 4b 35 48 44 66 6d 73 6a 61 37 57 31 6f 71 6c 58 35 33 4c 76 56 30 77 75 54 6b 35 49 79 6d 67 53 57 64 57 43 36 58 32 2f 30 37 64 31 72 63 79 65 33 52 71 56 55 78 41 38 32 5a 69 38 6a 70 2f 42 68 6e 42 6b 46 77 51 37 46 59 66 4d 76 4b 6c 53 73 58 4a 6c 31 58 4b 35 56 4b 70 52 41 45 77 62 66 4e 37 42 56 70 6a 49 66 35 69 51 43 41 64 73 55 39 58 74 53 4e 52 34 39 61 6a 6e 6e 32 32 57 63 66 71 78 6c 65 7a 7a 33 43 61 2b 64 57 54 76 49 47 42 67 5a 6d 66 4f 33 65 33 53 2f 75 5a 43 33 74 63 76 65 7a 59 70 70 50 4c 35 56 4b 35 36 52 57 7a 44 51 4b 68 63 4a 6a 4a 52 30 37 79 35 63 50 6d 74 6e 62 68 6f 61 47 66 6c 67 73 46 6c 2b 32 66 76 33 36 42 55 6e 57 64 6c 43 68 55 48 68 43 75 56 7a 2b 7a 7a 41
              Data Ascii: nPwxCwQAtMXMTohpjmvriHK5HDfmsja7W1oqlX53LvV0wuTk5IymgSWdWC6X2/07d1rcye3RqVUxA82Zi8jp/BhnBkFwQ7FYfMvKlSsXJl1XK5VKpRAEwbfN7BVpjIf5iQCAdsU9XtSNR49ajnn22Wcfqxlezz3Ca+dWTvIGBgZmfO3e3S/uZC3tcvezYppPL5VK56RWzDQKhcJjJR07y5cPmtnbhoaGflgsFl+2fv36BUnWdlChUHhCuVz+zzA
              2024-05-06 00:34:48 UTC1369INData Raw: 56 41 6f 4c 4d 33 6c 63 73 39 79 39 78 64 4a 4b 6b 76 4b 64 61 44 57 4f 50 2f 75 37 75 39 78 39 2b 38 31 47 6f 33 78 4a 44 70 63 74 57 72 56 38 51 73 58 4c 6c 77 34 4e 54 57 31 4d 41 7a 44 45 33 4f 35 33 4d 50 63 2f 54 52 33 50 38 50 4d 7a 70 58 30 6b 43 54 47 61 57 45 73 6c 38 75 64 76 57 58 4c 6c 68 38 66 39 72 55 62 53 71 58 53 64 6b 6b 4e 48 51 67 72 76 65 61 44 51 52 43 38 5a 58 52 30 39 4f 36 6b 4f 79 34 55 43 6e 6c 4a 79 33 4f 35 33 4f 2b 46 59 58 68 47 45 41 52 72 33 58 32 39 70 45 56 4a 6a 34 58 2b 6b 2f 67 2f 68 6c 4b 70 39 44 6c 4a 4c 30 71 36 58 38 7a 49 4e 32 75 31 32 70 4e 61 66 4e 31 4b 70 56 4a 44 30 6a 6b 64 48 48 76 4b 7a 42 35 66 72 56 61 2f 33 36 71 78 58 43 36 2f 7a 74 33 66 33 63 48 78 5a 57 5a 66 71 6c 61 72 7a 7a 37 79 36 34 56 43
              Data Ascii: VAoLM3lcs9y9xdJKkvKdaDWOP/u7u9x9+81Go3xJDpctWrV8QsXLlw4NTW1MAzDE3O53MPc/TR3P8PMzpX0kCTGaWEsl8udvWXLlh8f9rUbSqXSdkkNHQgrveaDQRC8ZXR09O6kOy4UCnlJy3O53O+FYXhGEARr3X29pEVJj4X+k/g/hlKp9DlJL0q6X8zIN2u12pNafN1KpVJD0jkdHHvKzB5frVa/36qxXC6/zt3f3cHxZWZfqlarzz7y64VC


              Click to jump to process

              Click to jump to process

              Click to jump to process

              Target ID:0
              Start time:02:34:46
              Start date:06/05/2024
              Path:C:\Users\user\Desktop\73zGJqwgDy.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\user\Desktop\73zGJqwgDy.exe"
              Imagebase:0x7ff79b680000
              File size:685'800 bytes
              MD5 hash:31C73B1FAF2AC14C68E5EC56BFB6D3A6
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_MofongoLoader, Description: Yara detected MofongoLoader, Source: 00000000.00000003.2032161793.0000016028D31000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_MofongoLoader, Description: Yara detected MofongoLoader, Source: 00000000.00000003.2031415601.0000016028BAC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_MofongoLoader, Description: Yara detected MofongoLoader, Source: 00000000.00000000.2029784787.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
              • Rule: JoeSecurity_MofongoLoader, Description: Yara detected MofongoLoader, Source: 00000000.00000003.2031549611.0000016028BC6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_MofongoLoader, Description: Yara detected MofongoLoader, Source: 00000000.00000003.2033297065.0000016028B9A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_MofongoLoader, Description: Yara detected MofongoLoader, Source: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
              • Rule: JoeSecurity_MofongoLoader, Description: Yara detected MofongoLoader, Source: 00000000.00000003.2033207199.0000016028D31000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_MofongoLoader, Description: Yara detected MofongoLoader, Source: 00000000.00000003.2031259852.0000016028B9B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_MofongoLoader, Description: Yara detected MofongoLoader, Source: 00000000.00000003.2033094783.0000016029181000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              Reputation:low
              Has exited:true

              Target ID:3
              Start time:02:34:49
              Start date:06/05/2024
              Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              Wow64 process (32bit):
              Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
              Imagebase:
              File size:4'210'216 bytes
              MD5 hash:BF154738460E4AB1D388970E1AB13FAB
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate
              Has exited:false

              Reset < >

                Execution Graph

                Execution Coverage:10.3%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:19.5%
                Total number of Nodes:794
                Total number of Limit Nodes:11
                execution_graph 22418 7ff79b6a0800 22439 7ff79b6a09cc 22418->22439 22421 7ff79b6a0821 __scrt_acquire_startup_lock 22424 7ff79b6a0961 22421->22424 22430 7ff79b6a083f __scrt_release_startup_lock 22421->22430 22422 7ff79b6a0957 22518 7ff79b6a0ebc 7 API calls 2 library calls 22422->22518 22519 7ff79b6a0ebc 7 API calls 2 library calls 22424->22519 22426 7ff79b6a096c BuildCatchObjectHelperInternal 22427 7ff79b6a0864 22428 7ff79b6a08ea 22445 7ff79b6ad50c 22428->22445 22430->22427 22430->22428 22515 7ff79b6ad8c4 39 API calls __GSHandlerCheck_EH 22430->22515 22432 7ff79b6a08ef 22451 7ff79b692eb0 22432->22451 22434 7ff79b6a090c 22516 7ff79b6a100c GetModuleHandleW 22434->22516 22436 7ff79b6a0913 22436->22426 22517 7ff79b6a0b50 7 API calls 22436->22517 22438 7ff79b6a092a 22438->22427 22440 7ff79b6a09d4 22439->22440 22441 7ff79b6a09e0 __scrt_dllmain_crt_thread_attach 22440->22441 22442 7ff79b6a0819 22441->22442 22443 7ff79b6a09ed 22441->22443 22442->22421 22442->22422 22443->22442 22520 7ff79b6a2360 7 API calls 2 library calls 22443->22520 22446 7ff79b6ad531 22445->22446 22447 7ff79b6ad51c 22445->22447 22446->22432 22447->22446 22521 7ff79b6ad1c8 42 API calls Concurrency::details::SchedulerProxy::DeleteThis 22447->22521 22449 7ff79b6ad53a 22449->22446 22522 7ff79b6ad398 12 API calls 3 library calls 22449->22522 22452 7ff79b692ede _Mtx_guard::~_Mtx_guard 22451->22452 22453 7ff79b692f09 QueryFullProcessImageNameW 22452->22453 22454 7ff79b692f36 22453->22454 22458 7ff79b692f2f ctype 22453->22458 22523 7ff79b690b50 22454->22523 22456 7ff79b692f3b 22532 7ff79b690e30 22456->22532 22458->22434 22459 7ff79b692f4c 22459->22458 22460 7ff79b693001 22459->22460 22461 7ff79b692f67 _Mtx_guard::~_Mtx_guard 22459->22461 22460->22458 22536 7ff79b683d40 22460->22536 22461->22460 22464 7ff79b692f80 LoadLibraryA GetProcAddress 22461->22464 22463 7ff79b693036 _Mtx_guard::~_Mtx_guard 22540 7ff79b687e50 22463->22540 22464->22461 22468 7ff79b693096 22586 7ff79b6840b0 22468->22586 22470 7ff79b6930a4 _Mtx_guard::~_Mtx_guard 22589 7ff79b691520 OpenProcessToken 22470->22589 22472 7ff79b6930c3 _Mtx_guard::~_Mtx_guard 22621 7ff79b6938d0 22472->22621 22476 7ff79b693164 22630 7ff79b693830 22476->22630 22479 7ff79b693880 41 API calls 22480 7ff79b6931ee 22479->22480 22481 7ff79b6840b0 Concurrency::details::UMSFreeVirtualProcessorRoot::Activate 39 API calls 22480->22481 22482 7ff79b6931fc 22481->22482 22483 7ff79b6840b0 Concurrency::details::UMSFreeVirtualProcessorRoot::Activate 39 API calls 22482->22483 22484 7ff79b69320a 22483->22484 22485 7ff79b6840b0 Concurrency::details::UMSFreeVirtualProcessorRoot::Activate 39 API calls 22484->22485 22486 7ff79b693218 22485->22486 22487 7ff79b6840b0 Concurrency::details::UMSFreeVirtualProcessorRoot::Activate 39 API calls 22486->22487 22488 7ff79b693226 _Mtx_guard::~_Mtx_guard 22487->22488 22489 7ff79b683d40 _Mpunct 41 API calls 22488->22489 22490 7ff79b693250 22489->22490 22633 7ff79b687db0 22490->22633 22492 7ff79b69329d _Mtx_guard::~_Mtx_guard 22493 7ff79b683d40 _Mpunct 41 API calls 22492->22493 22494 7ff79b6932ef 22493->22494 22637 7ff79b681530 22494->22637 22496 7ff79b69332c 22497 7ff79b693342 22496->22497 22498 7ff79b69337c std::ios_base::_Init 22496->22498 22499 7ff79b6840e0 Concurrency::details::SchedulerBase::PushRunnableToInactive 39 API calls 22497->22499 22748 7ff79b691ec0 22498->22748 22500 7ff79b693357 22499->22500 22501 7ff79b6840b0 Concurrency::details::UMSFreeVirtualProcessorRoot::Activate 39 API calls 22500->22501 22503 7ff79b693365 22501->22503 22504 7ff79b6840b0 Concurrency::details::UMSFreeVirtualProcessorRoot::Activate 39 API calls 22503->22504 22504->22458 22505 7ff79b6933a9 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock _Mtx_guard::~_Mtx_guard 22755 7ff79b692160 22505->22755 22507 7ff79b6933fd 22794 7ff79b684110 22507->22794 22511 7ff79b693420 22512 7ff79b6840b0 Concurrency::details::UMSFreeVirtualProcessorRoot::Activate 39 API calls 22511->22512 22513 7ff79b69342e 22512->22513 22514 7ff79b6840b0 Concurrency::details::UMSFreeVirtualProcessorRoot::Activate 39 API calls 22513->22514 22514->22458 22515->22428 22516->22436 22517->22438 22518->22424 22519->22426 22520->22442 22521->22449 22522->22446 22524 7ff79b690bae _Mtx_guard::~_Mtx_guard 22523->22524 22525 7ff79b690bbd LoadLibraryA GetProcAddress 22524->22525 22526 7ff79b690c37 _Mtx_guard::~_Mtx_guard 22525->22526 22527 7ff79b690c3b ctype 22526->22527 22528 7ff79b690c5e LoadLibraryA GetProcAddress CheckTokenMembership 22526->22528 22527->22456 22529 7ff79b690cba _Mtx_guard::~_Mtx_guard 22528->22529 22530 7ff79b690ce1 LoadLibraryA GetProcAddress 22529->22530 22531 7ff79b690d2f 22530->22531 22531->22527 22533 7ff79b690f80 _Mtx_guard::~_Mtx_guard 22532->22533 22534 7ff79b690f8f LoadLibraryA GetProcAddress 22533->22534 22535 7ff79b690fc5 ctype 22534->22535 22535->22459 22537 7ff79b683d67 Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct _WChar_traits 22536->22537 22800 7ff79b682a50 22537->22800 22539 7ff79b683d8c 22539->22463 22541 7ff79b687e77 Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct char_traits 22540->22541 22808 7ff79b685b70 22541->22808 22543 7ff79b687e9c 22544 7ff79b691060 22543->22544 22545 7ff79b6910a4 std::ios_base::_Init 22544->22545 22859 7ff79b695c40 22545->22859 22547 7ff79b6910cd 22548 7ff79b6910f1 _Mtx_guard::~_Mtx_guard 22547->22548 22553 7ff79b69113e Concurrency::details::WorkQueue::IsStructuredEmpty 22547->22553 22549 7ff79b687e50 _Mpunct 41 API calls 22548->22549 22550 7ff79b69110b 22549->22550 22551 7ff79b697d40 73 API calls 22550->22551 22552 7ff79b691123 22551->22552 22555 7ff79b6840e0 Concurrency::details::SchedulerBase::PushRunnableToInactive 39 API calls 22552->22555 22863 7ff79b693680 22553->22863 22560 7ff79b691131 ctype 22555->22560 22556 7ff79b69122f 22557 7ff79b6938d0 41 API calls 22556->22557 22558 7ff79b69124c 22557->22558 22559 7ff79b693880 41 API calls 22558->22559 22561 7ff79b691274 22559->22561 22560->22468 22562 7ff79b6840b0 Concurrency::details::UMSFreeVirtualProcessorRoot::Activate 39 API calls 22561->22562 22565 7ff79b691282 22562->22565 22563 7ff79b691459 _Mtx_guard::~_Mtx_guard 22564 7ff79b687e50 _Mpunct 41 API calls 22563->22564 22566 7ff79b691473 22564->22566 22565->22563 22568 7ff79b6912f2 22565->22568 22567 7ff79b6840b0 Concurrency::details::UMSFreeVirtualProcessorRoot::Activate 39 API calls 22566->22567 22570 7ff79b69148b 22567->22570 22869 7ff79b69e030 22568->22869 22571 7ff79b6840b0 Concurrency::details::UMSFreeVirtualProcessorRoot::Activate 39 API calls 22570->22571 22572 7ff79b691499 22571->22572 22573 7ff79b697d40 73 API calls 22572->22573 22574 7ff79b6914a7 22573->22574 22575 7ff79b6840e0 Concurrency::details::SchedulerBase::PushRunnableToInactive 39 API calls 22574->22575 22575->22560 22576 7ff79b69131f std::ios_base::failure::failure 22577 7ff79b6840b0 Concurrency::details::UMSFreeVirtualProcessorRoot::Activate 39 API calls 22576->22577 22578 7ff79b691417 22577->22578 22579 7ff79b6840b0 Concurrency::details::UMSFreeVirtualProcessorRoot::Activate 39 API calls 22578->22579 22580 7ff79b691425 22579->22580 22581 7ff79b6840b0 Concurrency::details::UMSFreeVirtualProcessorRoot::Activate 39 API calls 22580->22581 22582 7ff79b691433 22581->22582 22873 7ff79b697d40 22582->22873 22584 7ff79b691441 22585 7ff79b6840e0 Concurrency::details::SchedulerBase::PushRunnableToInactive 39 API calls 22584->22585 22585->22560 23211 7ff79b684be0 22586->23211 22588 7ff79b6840c3 Concurrency::details::WorkQueue::IsStructuredEmpty 22588->22470 22590 7ff79b691589 _Mtx_guard::~_Mtx_guard 22589->22590 22592 7ff79b691564 ctype 22589->22592 22591 7ff79b6915ad LoadLibraryA GetProcAddress GetTokenInformation 22590->22591 22593 7ff79b691610 Concurrency::details::WorkQueue::IsStructuredEmpty std::ios_base::_Init 22591->22593 22592->22472 23215 7ff79b696e80 22593->23215 22595 7ff79b69164e _Mtx_guard::~_Mtx_guard 22596 7ff79b69166b LoadLibraryA GetProcAddress 22595->22596 23219 7ff79b683640 22596->23219 22598 7ff79b6916b2 GetTokenInformation 22599 7ff79b69173c CloseHandle 22598->22599 22600 7ff79b6916fc CloseHandle 22598->22600 22604 7ff79b691757 std::ios_base::_Init Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock 22599->22604 22601 7ff79b691717 22600->22601 22602 7ff79b684110 Concurrency::agent::wait_for_all 39 API calls 22601->22602 22603 7ff79b69172f 22602->22603 22603->22592 23221 7ff79b696a20 22604->23221 22606 7ff79b691783 _Mtx_guard::~_Mtx_guard 22607 7ff79b6917a0 LoadLibraryA GetProcAddress 22606->22607 22608 7ff79b6917db 22607->22608 23227 7ff79b6974e0 81 API calls 3 library calls 22608->23227 22610 7ff79b691817 _Mtx_guard::~_Mtx_guard 22611 7ff79b691833 LoadLibraryA GetProcAddress 22610->22611 22619 7ff79b69186e _Mtx_guard::~_Mtx_guard 22611->22619 22612 7ff79b69190c 23229 7ff79b69dfe0 41 API calls 22612->23229 22614 7ff79b691921 23230 7ff79b697e10 39 API calls std::bad_exception::~bad_exception 22614->23230 22616 7ff79b691939 22618 7ff79b684110 Concurrency::agent::wait_for_all 39 API calls 22616->22618 22617 7ff79b6918bc LoadLibraryA GetProcAddress 22617->22619 22618->22603 22619->22612 22619->22617 23228 7ff79b697790 81 API calls 3 library calls 22619->23228 22622 7ff79b6938f5 Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct char_traits 22621->22622 22624 7ff79b693932 Concurrency::details::WorkQueue::IsStructuredEmpty 22622->22624 23306 7ff79b684dd0 41 API calls _Mpunct 22622->23306 23302 7ff79b696780 22624->23302 22626 7ff79b69311f 22627 7ff79b693880 22626->22627 23307 7ff79b68bfe0 22627->23307 22629 7ff79b6938aa std::ios_base::failure::failure 22629->22476 23316 7ff79b696330 22630->23316 22632 7ff79b6931a9 22632->22479 22634 7ff79b687dd2 Concurrency::details::WorkQueue::IsStructuredEmpty std::ios_base::failure::failure 22633->22634 23323 7ff79b685d30 22634->23323 22636 7ff79b687e36 22636->22492 22638 7ff79b68154f _Mtx_guard::~_Mtx_guard ctype 22637->22638 22639 7ff79b6815b3 LoadLibraryA GetProcAddress 22638->22639 23330 7ff79b685100 22639->23330 22641 7ff79b6815ef InternetOpenW 22642 7ff79b681626 _Mtx_guard::~_Mtx_guard 22641->22642 22644 7ff79b68168f _Mtx_guard::~_Mtx_guard 22641->22644 22643 7ff79b683d40 _Mpunct 41 API calls 22642->22643 22646 7ff79b681640 22643->22646 22645 7ff79b681728 LoadLibraryA GetProcAddress 22644->22645 22647 7ff79b681764 Concurrency::details::WorkQueue::IsStructuredEmpty 22645->22647 22648 7ff79b6840e0 Concurrency::details::SchedulerBase::PushRunnableToInactive 39 API calls 22646->22648 22655 7ff79b681790 _Mtx_guard::~_Mtx_guard 22647->22655 22656 7ff79b681850 _Mtx_guard::~_Mtx_guard 22647->22656 22649 7ff79b681658 22648->22649 22650 7ff79b6840e0 Concurrency::details::SchedulerBase::PushRunnableToInactive 39 API calls 22649->22650 22651 7ff79b681666 22650->22651 22652 7ff79b6840b0 Concurrency::details::UMSFreeVirtualProcessorRoot::Activate 39 API calls 22651->22652 22653 7ff79b681674 22652->22653 22654 7ff79b6840e0 Concurrency::details::SchedulerBase::PushRunnableToInactive 39 API calls 22653->22654 22660 7ff79b681682 ctype 22654->22660 22657 7ff79b6817ac LoadLibraryA GetProcAddress 22655->22657 22658 7ff79b68186c LoadLibraryA GetProcAddress InternetConnectW 22656->22658 22661 7ff79b6817e7 _Mtx_guard::~_Mtx_guard 22657->22661 22659 7ff79b6818ec InternetCloseHandle 22658->22659 22664 7ff79b681960 _Mtx_guard::~_Mtx_guard 22658->22664 22662 7ff79b681901 _Mtx_guard::~_Mtx_guard 22659->22662 22660->22496 22666 7ff79b683d40 _Mpunct 41 API calls 22661->22666 22663 7ff79b683d40 _Mpunct 41 API calls 22662->22663 22665 7ff79b681911 22663->22665 22667 7ff79b68197c LoadLibraryA GetProcAddress 22664->22667 22668 7ff79b6840e0 Concurrency::details::SchedulerBase::PushRunnableToInactive 39 API calls 22665->22668 22669 7ff79b681801 22666->22669 22670 7ff79b6819b5 _Mtx_guard::~_Mtx_guard 22667->22670 22672 7ff79b681929 22668->22672 22671 7ff79b6840e0 Concurrency::details::SchedulerBase::PushRunnableToInactive 39 API calls 22669->22671 22684 7ff79b681a1c _Mtx_guard::~_Mtx_guard 22670->22684 22685 7ff79b681b36 _Mtx_guard::~_Mtx_guard 22670->22685 22673 7ff79b681819 22671->22673 22674 7ff79b6840e0 Concurrency::details::SchedulerBase::PushRunnableToInactive 39 API calls 22672->22674 22675 7ff79b6840e0 Concurrency::details::SchedulerBase::PushRunnableToInactive 39 API calls 22673->22675 22676 7ff79b681937 22674->22676 22677 7ff79b681827 22675->22677 22678 7ff79b6840b0 Concurrency::details::UMSFreeVirtualProcessorRoot::Activate 39 API calls 22676->22678 22679 7ff79b6840b0 Concurrency::details::UMSFreeVirtualProcessorRoot::Activate 39 API calls 22677->22679 22680 7ff79b681945 22678->22680 22681 7ff79b681835 22679->22681 22682 7ff79b6840e0 Concurrency::details::SchedulerBase::PushRunnableToInactive 39 API calls 22680->22682 22683 7ff79b6840e0 Concurrency::details::SchedulerBase::PushRunnableToInactive 39 API calls 22681->22683 22682->22660 22711 7ff79b681843 22683->22711 22687 7ff79b681a38 LoadLibraryA GetProcAddress 22684->22687 22686 7ff79b681b52 LoadLibraryA GetProcAddress 22685->22686 22688 7ff79b681b8e Concurrency::details::WorkQueue::IsStructuredEmpty 22686->22688 22689 7ff79b681a76 _Mtx_guard::~_Mtx_guard 22687->22689 22690 7ff79b681be4 HttpSendRequestA 22688->22690 22691 7ff79b681a92 LoadLibraryA GetProcAddress 22689->22691 22693 7ff79b681c21 _Mtx_guard::~_Mtx_guard 22690->22693 22709 7ff79b681d95 std::ios_base::_Init _Mtx_guard::~_Mtx_guard 22690->22709 22692 7ff79b681acd _Mtx_guard::~_Mtx_guard 22691->22692 22694 7ff79b683d40 _Mpunct 41 API calls 22692->22694 22695 7ff79b681c3d LoadLibraryA GetProcAddress 22693->22695 22696 7ff79b681ae7 22694->22696 22700 7ff79b681c7b _Mtx_guard::~_Mtx_guard 22695->22700 22697 7ff79b6840e0 Concurrency::details::SchedulerBase::PushRunnableToInactive 39 API calls 22696->22697 22698 7ff79b681aff 22697->22698 22699 7ff79b6840e0 Concurrency::details::SchedulerBase::PushRunnableToInactive 39 API calls 22698->22699 22701 7ff79b681b0d 22699->22701 22704 7ff79b681c97 LoadLibraryA GetProcAddress 22700->22704 22705 7ff79b6840b0 Concurrency::details::UMSFreeVirtualProcessorRoot::Activate 39 API calls 22701->22705 22702 7ff79b681dd1 LoadLibraryA GetProcAddress InternetReadFile 22703 7ff79b681eb5 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock 22702->22703 22702->22709 22707 7ff79b681ec2 MultiByteToWideChar 22703->22707 22713 7ff79b681cd5 _Mtx_guard::~_Mtx_guard 22704->22713 22706 7ff79b681b1b 22705->22706 22708 7ff79b6840e0 Concurrency::details::SchedulerBase::PushRunnableToInactive 39 API calls 22706->22708 22710 7ff79b681f1d Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock 22707->22710 22708->22711 22709->22702 22709->22703 23338 7ff79b6839f0 41 API calls 4 library calls 22709->23338 22715 7ff79b681f42 MultiByteToWideChar 22710->22715 22711->22660 22714 7ff79b681cf1 LoadLibraryA GetProcAddress 22713->22714 22717 7ff79b681d2c _Mtx_guard::~_Mtx_guard 22714->22717 22716 7ff79b683d40 _Mpunct 41 API calls 22715->22716 22718 7ff79b681f82 22716->22718 22722 7ff79b683d40 _Mpunct 41 API calls 22717->22722 23332 7ff79b6841b0 22718->23332 22720 7ff79b681f9f 22721 7ff79b6840e0 Concurrency::details::SchedulerBase::PushRunnableToInactive 39 API calls 22720->22721 22730 7ff79b681fac _Mtx_guard::~_Mtx_guard shared_ptr 22721->22730 22723 7ff79b681d46 22722->22723 22724 7ff79b6840e0 Concurrency::details::SchedulerBase::PushRunnableToInactive 39 API calls 22723->22724 22725 7ff79b681d5e 22724->22725 22726 7ff79b6840e0 Concurrency::details::SchedulerBase::PushRunnableToInactive 39 API calls 22725->22726 22727 7ff79b681d6c 22726->22727 22728 7ff79b6840b0 Concurrency::details::UMSFreeVirtualProcessorRoot::Activate 39 API calls 22727->22728 22729 7ff79b681d7a 22728->22729 22731 7ff79b6840e0 Concurrency::details::SchedulerBase::PushRunnableToInactive 39 API calls 22729->22731 22732 7ff79b68201a LoadLibraryA GetProcAddress InternetCloseHandle 22730->22732 22731->22711 23336 7ff79b682760 22732->23336 22734 7ff79b682062 _Mtx_guard::~_Mtx_guard 22735 7ff79b682074 LoadLibraryA GetProcAddress 22734->22735 22736 7ff79b6820b2 _Mtx_guard::~_Mtx_guard 22735->22736 22737 7ff79b6820ce LoadLibraryA GetProcAddress 22736->22737 22738 7ff79b682109 22737->22738 22739 7ff79b684110 Concurrency::agent::wait_for_all 39 API calls 22738->22739 22740 7ff79b682136 22739->22740 22741 7ff79b6840e0 Concurrency::details::SchedulerBase::PushRunnableToInactive 39 API calls 22740->22741 22742 7ff79b682144 22741->22742 22743 7ff79b6840e0 Concurrency::details::SchedulerBase::PushRunnableToInactive 39 API calls 22742->22743 22744 7ff79b682152 22743->22744 22745 7ff79b6840b0 Concurrency::details::UMSFreeVirtualProcessorRoot::Activate 39 API calls 22744->22745 22746 7ff79b682160 22745->22746 22747 7ff79b6840e0 Concurrency::details::SchedulerBase::PushRunnableToInactive 39 API calls 22746->22747 22747->22711 23349 7ff79b691ab0 22748->23349 22750 7ff79b691eea 23364 7ff79b691dc0 22750->23364 22752 7ff79b691f0d 22753 7ff79b684110 Concurrency::agent::wait_for_all 39 API calls 22752->22753 22754 7ff79b691f22 22753->22754 22754->22505 22756 7ff79b69219b shared_ptr 22755->22756 22757 7ff79b6921c5 GetModuleHandleA 22756->22757 22758 7ff79b6921eb shared_ptr 22757->22758 22759 7ff79b69222f GetModuleHandleA 22758->22759 22760 7ff79b692255 shared_ptr 22759->22760 22761 7ff79b692299 GetModuleHandleA 22760->22761 22762 7ff79b6922bf shared_ptr 22761->22762 22763 7ff79b692303 GetModuleHandleA 22762->22763 22764 7ff79b692329 shared_ptr 22763->22764 22765 7ff79b69236d GetModuleHandleA 22764->22765 22766 7ff79b692393 shared_ptr 22765->22766 22767 7ff79b6923d7 GetModuleHandleA 22766->22767 22768 7ff79b6923fd shared_ptr 22767->22768 22769 7ff79b692441 GetModuleHandleA 22768->22769 23369 7ff79b691f40 22769->23369 22771 7ff79b692467 CreatePipe 22772 7ff79b6924d1 SetHandleInformation 22771->22772 22778 7ff79b6924ca ctype 22771->22778 22773 7ff79b6924f2 CreateProcessA 22772->22773 22772->22778 22774 7ff79b6925ef NtCreateSection 22773->22774 22775 7ff79b6925cc CloseHandle CloseHandle 22773->22775 22776 7ff79b6926af GetCurrentProcess 22774->22776 22777 7ff79b692670 CloseHandle CloseHandle CloseHandle CloseHandle 22774->22777 22775->22778 22779 7ff79b692752 22776->22779 22777->22778 22778->22507 22780 7ff79b69275d CloseHandle CloseHandle CloseHandle CloseHandle 22779->22780 22781 7ff79b69279c 22779->22781 22780->22778 22782 7ff79b69283d CloseHandle CloseHandle CloseHandle CloseHandle 22781->22782 22783 7ff79b69287c 22781->22783 22782->22778 22784 7ff79b692950 22783->22784 22785 7ff79b692911 CloseHandle CloseHandle CloseHandle CloseHandle 22783->22785 22786 7ff79b692b6a GetCurrentProcess 22784->22786 22788 7ff79b692995 CloseHandle GetStdHandle 22784->22788 22785->22778 22787 7ff79b692baf CloseHandle CloseHandle CloseHandle CloseHandle 22786->22787 22787->22778 22792 7ff79b6929cc 22788->22792 22789 7ff79b6929f2 ReadFile 22790 7ff79b692a34 __std_exception_copy 22789->22790 22789->22792 22790->22786 22792->22789 22792->22790 22793 7ff79b6929d9 __std_exception_copy 22792->22793 23371 7ff79b6a03c4 8 API calls std::_Locinfo::_Locinfo_ctor 22792->23371 22793->22778 23372 7ff79b684b10 22794->23372 22797 7ff79b6840e0 22798 7ff79b684ca0 UnDecorator::getVbTableType 39 API calls 22797->22798 22799 7ff79b6840f3 Concurrency::details::WorkQueue::IsStructuredEmpty 22798->22799 22799->22511 22801 7ff79b682a86 _Mpunct 22800->22801 22803 7ff79b682a95 Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct 22801->22803 22806 7ff79b684dd0 41 API calls _Mpunct 22801->22806 22805 7ff79b682acf Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct _aligned_msize ctype type_info::_name_internal_method 22803->22805 22807 7ff79b682910 41 API calls 3 library calls 22803->22807 22805->22539 22806->22803 22807->22805 22809 7ff79b685ba6 _Mpunct 22808->22809 22811 7ff79b685bb5 Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct 22809->22811 22814 7ff79b684dd0 41 API calls _Mpunct 22809->22814 22813 7ff79b685bef Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct ctype Concurrency::cancellation_token_source::~cancellation_token_source UnDecorator::getVbTableType 22811->22813 22815 7ff79b685aa0 22811->22815 22813->22543 22814->22811 22818 7ff79b6828b0 22815->22818 22817 7ff79b685ad0 Concurrency::details::WorkQueue::IsStructuredEmpty allocator Concurrency::details::FreeThreadProxyFactory::Retire 22817->22813 22821 7ff79b684e30 22818->22821 22822 7ff79b684e48 allocator 22821->22822 22825 7ff79b682860 22822->22825 22827 7ff79b68286e allocator 22825->22827 22826 7ff79b68288c 22828 7ff79b68288a 22826->22828 22840 7ff79b6844b0 22826->22840 22827->22826 22829 7ff79b682880 22827->22829 22828->22817 22832 7ff79b6829c0 22829->22832 22833 7ff79b6829e8 22832->22833 22834 7ff79b6829e3 22832->22834 22836 7ff79b6844b0 allocator 4 API calls 22833->22836 22843 7ff79b684ae0 RtlPcToFileHeader RaiseException stdext::threads::lock_error::lock_error Concurrency::cancel_current_task 22834->22843 22838 7ff79b6829f2 22836->22838 22839 7ff79b682a12 22838->22839 22844 7ff79b6a6fc0 39 API calls 2 library calls 22838->22844 22839->22828 22845 7ff79b6a0268 22840->22845 22843->22833 22846 7ff79b6a0273 22845->22846 22847 7ff79b6844c3 22846->22847 22849 7ff79b6a0292 22846->22849 22854 7ff79b6acbb4 22846->22854 22847->22828 22850 7ff79b6a029d 22849->22850 22857 7ff79b69ee28 RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc Concurrency::cancel_current_task 22849->22857 22858 7ff79b6a0d80 RtlPcToFileHeader RaiseException stdext::threads::lock_error::lock_error Concurrency::cancel_current_task 22850->22858 22855 7ff79b6acbf0 std::_Facet_Register EnterCriticalSection LeaveCriticalSection 22854->22855 22856 7ff79b6acbc2 22855->22856 22856->22846 22860 7ff79b695c62 Concurrency::details::WorkQueue::IsStructuredEmpty 22859->22860 22876 7ff79b695cd0 22860->22876 22864 7ff79b6936d3 Concurrency::details::WorkQueue::IsStructuredEmpty std::ios_base::failure::failure std::ios_base::_Init ctype 22863->22864 23084 7ff79b693800 22864->23084 22868 7ff79b69375b ctype UnDecorator::getVbTableType 22868->22556 22870 7ff79b69e05a Concurrency::details::WorkQueue::IsStructuredEmpty 22869->22870 23180 7ff79b696220 22870->23180 23191 7ff79b696fd0 22873->23191 22875 7ff79b697d5c std::bad_exception::~bad_exception 22875->22584 22877 7ff79b695cf7 Concurrency::details::WorkQueue::IsStructuredEmpty 22876->22877 22886 7ff79b687a50 22877->22886 22883 7ff79b695dcb 22884 7ff79b695c81 22883->22884 22903 7ff79b68f500 41 API calls 2 library calls 22883->22903 22884->22547 22887 7ff79b687a77 22886->22887 22904 7ff79b68e100 22887->22904 22890 7ff79b695c00 22973 7ff79b687c10 22890->22973 22892 7ff79b695c13 22978 7ff79b698c40 22892->22978 22894 7ff79b695c31 22895 7ff79b69c830 22894->22895 22896 7ff79b69c85b 22895->22896 22902 7ff79b69c857 strtoxl 22895->22902 22984 7ff79b69fdcc 22896->22984 22899 7ff79b698c40 Concurrency::event::~event 39 API calls 22900 7ff79b69c894 22899->22900 22992 7ff79b6956f0 81 API calls 7 library calls 22900->22992 22902->22883 22903->22884 22913 7ff79b68b100 22904->22913 22908 7ff79b68e144 22909 7ff79b68e16b 22908->22909 22924 7ff79b68f500 41 API calls 2 library calls 22908->22924 22911 7ff79b687b22 22909->22911 22925 7ff79b69fa2c 7 API calls 2 library calls 22909->22925 22911->22890 22926 7ff79b68c5e0 22913->22926 22916 7ff79b6a0268 std::_Facet_Register 4 API calls 22918 7ff79b68b185 std::ios_base::_Init 22916->22918 22917 7ff79b68b1ab 22920 7ff79b68f970 22917->22920 22918->22917 22929 7ff79b6889a0 49 API calls std::ios_base::_Init 22918->22929 22921 7ff79b68f98c 22920->22921 22941 7ff79b687510 22921->22941 22923 7ff79b68f9a5 strtoxl 22923->22908 22924->22909 22925->22911 22930 7ff79b68c610 22926->22930 22929->22917 22931 7ff79b68b17b 22930->22931 22932 7ff79b68c66a 22930->22932 22931->22916 22934 7ff79b68c67f std::make_error_code 22932->22934 22938 7ff79b6a1208 RtlPcToFileHeader RaiseException 22932->22938 22939 7ff79b688840 41 API calls std::ios_base::failure::failure 22934->22939 22936 7ff79b68c6de 22940 7ff79b6a1208 RtlPcToFileHeader RaiseException 22936->22940 22938->22934 22939->22936 22940->22931 22955 7ff79b69eef8 22941->22955 22943 7ff79b687534 22959 7ff79b6896e0 22943->22959 22945 7ff79b68754d std::locale::_Getfacet 22954 7ff79b68757a 22945->22954 22969 7ff79b68a650 81 API calls 2 library calls 22945->22969 22948 7ff79b687628 ctype 22948->22923 22949 7ff79b687598 22950 7ff79b68759e 22949->22950 22952 7ff79b6875a6 std::ios_base::_Init 22949->22952 22970 7ff79b68bd60 RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc Concurrency::cancel_current_task 22950->22970 22971 7ff79b69f130 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection std::_Facet_Register 22952->22971 22965 7ff79b69ef70 22954->22965 22956 7ff79b69ef07 22955->22956 22957 7ff79b69ef0c 22955->22957 22972 7ff79b6ab434 6 API calls std::_Lockit::_Lockit 22956->22972 22957->22943 22960 7ff79b689741 ctype 22959->22960 22961 7ff79b689703 22959->22961 22960->22945 22962 7ff79b69eef8 std::_Lockit::_Lockit 6 API calls 22961->22962 22963 7ff79b68970f 22962->22963 22964 7ff79b69ef70 std::_Lockit::~_Lockit LeaveCriticalSection 22963->22964 22964->22960 22966 7ff79b69ef84 22965->22966 22967 7ff79b69ef7b LeaveCriticalSection 22965->22967 22966->22948 22969->22949 22970->22954 22971->22954 22974 7ff79b6a0268 std::_Facet_Register 4 API calls 22973->22974 22975 7ff79b687ccc std::ios_base::_Init 22974->22975 22976 7ff79b687cf2 Concurrency::event::~event 22975->22976 22982 7ff79b6889a0 49 API calls std::ios_base::_Init 22975->22982 22976->22892 22980 7ff79b698c6c Concurrency::event::~event 22978->22980 22979 7ff79b698cf3 ctype Concurrency::event::~event 22979->22894 22980->22979 22983 7ff79b6aa03c 39 API calls 2 library calls 22980->22983 22982->22976 22983->22979 22985 7ff79b69fe12 22984->22985 22987 7ff79b69c86e 22985->22987 22993 7ff79b6ac254 22985->22993 22987->22899 22987->22902 22990 7ff79b69fe60 22990->22987 23013 7ff79b6aa1bc 22990->23013 22992->22902 22994 7ff79b6ac188 22993->22994 22995 7ff79b6ac1ae 22994->22995 22998 7ff79b6ac1e1 22994->22998 23033 7ff79b6ac168 11 API calls memcpy_s 22995->23033 22997 7ff79b6ac1b3 23034 7ff79b6a6fa0 39 API calls _invalid_parameter_noinfo 22997->23034 23000 7ff79b6ac1f4 22998->23000 23001 7ff79b6ac1e7 22998->23001 23021 7ff79b6b4314 23000->23021 23035 7ff79b6ac168 11 API calls memcpy_s 23001->23035 23004 7ff79b69fe45 23004->22987 23012 7ff79b6aab08 67 API calls _invalid_parameter_noinfo 23004->23012 23006 7ff79b6ac215 23028 7ff79b6b7120 23006->23028 23007 7ff79b6ac208 23036 7ff79b6ac168 11 API calls memcpy_s 23007->23036 23010 7ff79b6ac228 Concurrency::event::~event 23037 7ff79b6aa090 LeaveCriticalSection 23010->23037 23012->22990 23014 7ff79b6aa1ec 23013->23014 23070 7ff79b6aa09c 23014->23070 23016 7ff79b6aa22a 23019 7ff79b6aa23f 23016->23019 23081 7ff79b6a6bb0 39 API calls 2 library calls 23016->23081 23017 7ff79b6aa205 23017->23016 23080 7ff79b6a6bb0 39 API calls 2 library calls 23017->23080 23019->22987 23038 7ff79b6ab3c4 EnterCriticalSection 23021->23038 23023 7ff79b6b432b 23024 7ff79b6b4388 19 API calls 23023->23024 23025 7ff79b6b4336 23024->23025 23026 7ff79b6ab418 Concurrency::details::SchedulerProxy::DeleteThis LeaveCriticalSection 23025->23026 23027 7ff79b6ac1fe 23026->23027 23027->23006 23027->23007 23039 7ff79b6b6e1c 23028->23039 23031 7ff79b6b717a 23031->23010 23033->22997 23034->23004 23035->23004 23036->23004 23044 7ff79b6b6e57 __vcrt_InitializeCriticalSectionEx 23039->23044 23041 7ff79b6b70f5 23058 7ff79b6a6fa0 39 API calls _invalid_parameter_noinfo 23041->23058 23043 7ff79b6b7027 23043->23031 23051 7ff79b6bf35c 23043->23051 23049 7ff79b6b701e 23044->23049 23054 7ff79b6be7c8 45 API calls 4 library calls 23044->23054 23046 7ff79b6b7089 23046->23049 23055 7ff79b6be7c8 45 API calls 4 library calls 23046->23055 23048 7ff79b6b70a8 23048->23049 23056 7ff79b6be7c8 45 API calls 4 library calls 23048->23056 23049->23043 23057 7ff79b6ac168 11 API calls memcpy_s 23049->23057 23059 7ff79b6be960 23051->23059 23054->23046 23055->23048 23056->23049 23057->23041 23058->23043 23060 7ff79b6be995 23059->23060 23061 7ff79b6be977 23059->23061 23060->23061 23064 7ff79b6be9b1 23060->23064 23062 7ff79b6ac168 memcpy_s 11 API calls 23061->23062 23063 7ff79b6be97c 23062->23063 23065 7ff79b6a6fa0 _invalid_parameter_noinfo 39 API calls 23063->23065 23066 7ff79b6bef6c 97 API calls 23064->23066 23068 7ff79b6be988 23065->23068 23067 7ff79b6be9dc 23066->23067 23067->23068 23069 7ff79b6b9268 _Fputc LeaveCriticalSection 23067->23069 23068->23031 23069->23068 23071 7ff79b6aa0e5 23070->23071 23072 7ff79b6aa0b7 23070->23072 23079 7ff79b6aa0d7 Concurrency::event::~event 23071->23079 23082 7ff79b6aa084 EnterCriticalSection 23071->23082 23083 7ff79b6a6ed0 39 API calls 2 library calls 23072->23083 23075 7ff79b6aa0fb 23076 7ff79b6aa118 Concurrency::event::~event 66 API calls 23075->23076 23077 7ff79b6aa107 23076->23077 23078 7ff79b6aa090 _Fgetc LeaveCriticalSection 23077->23078 23078->23079 23079->23017 23080->23016 23081->23019 23083->23079 23103 7ff79b69c030 23084->23103 23087 7ff79b693b70 23088 7ff79b693bb7 Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct 23087->23088 23089 7ff79b693800 type_info::_name_internal_method 58 API calls 23088->23089 23090 7ff79b693c27 23089->23090 23091 7ff79b693c32 _Mpunct 23090->23091 23095 7ff79b693d95 Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::cancellation_token_source::~cancellation_token_source 23090->23095 23097 7ff79b693c67 Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct 23091->23097 23101 7ff79b693d08 Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct 23091->23101 23169 7ff79b684dd0 41 API calls _Mpunct 23091->23169 23094 7ff79b693d56 Concurrency::cancellation_token_source::~cancellation_token_source 23094->22868 23171 7ff79b696f10 39 API calls Concurrency::cancellation_token_source::~cancellation_token_source 23095->23171 23099 7ff79b685aa0 _Mpunct 41 API calls 23097->23099 23098 7ff79b693de8 ctype 23098->22868 23100 7ff79b693ca6 Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::cancellation_token_source::~cancellation_token_source UnDecorator::getVbTableType 23099->23100 23100->23101 23166 7ff79b684750 23100->23166 23170 7ff79b697ac0 58 API calls type_info::_name_internal_method 23101->23170 23104 7ff79b69c055 23103->23104 23105 7ff79b69c04b 23103->23105 23107 7ff79b6998d0 type_info::_name_internal_method 58 API calls 23104->23107 23108 7ff79b693754 23104->23108 23109 7ff79b6998d0 23105->23109 23107->23108 23108->22868 23108->23087 23110 7ff79b6998e4 23109->23110 23112 7ff79b6998f1 _aligned_msize 23109->23112 23113 7ff79b69de20 23110->23113 23112->23104 23114 7ff79b69de33 _aligned_msize 23113->23114 23115 7ff79b69de38 _aligned_msize 23114->23115 23117 7ff79b69e540 23114->23117 23115->23112 23118 7ff79b69e553 _aligned_msize ~_Mpunct 23117->23118 23119 7ff79b69e57b _aligned_msize 23118->23119 23121 7ff79b69e140 23118->23121 23119->23115 23122 7ff79b69e16b _aligned_msize ~_Mpunct Concurrency::event::~event 23121->23122 23123 7ff79b69e1eb 23122->23123 23125 7ff79b69e199 _aligned_msize ctype shared_ptr 23122->23125 23130 7ff79b69e236 Concurrency::details::WorkQueue::IsStructuredEmpty 23122->23130 23162 7ff79b6942e0 55 API calls _Fgetc 23123->23162 23125->23119 23127 7ff79b69e263 _aligned_msize 23129 7ff79b6840b0 Concurrency::details::UMSFreeVirtualProcessorRoot::Activate 39 API calls 23127->23129 23129->23125 23130->23125 23130->23127 23131 7ff79b69e357 23130->23131 23134 7ff79b69e37d Concurrency::details::WorkQueue::IsStructuredEmpty 23130->23134 23141 7ff79b6aa68c 23130->23141 23163 7ff79b69d240 41 API calls 2 library calls 23130->23163 23165 7ff79b69c170 41 API calls 23130->23165 23132 7ff79b69e455 23131->23132 23136 7ff79b69e362 _aligned_msize 23131->23136 23135 7ff79b6840b0 Concurrency::details::UMSFreeVirtualProcessorRoot::Activate 39 API calls 23132->23135 23138 7ff79b69e3fd _aligned_msize 23134->23138 23164 7ff79b6ab324 41 API calls 3 library calls 23134->23164 23135->23125 23137 7ff79b6840b0 Concurrency::details::UMSFreeVirtualProcessorRoot::Activate 39 API calls 23136->23137 23137->23125 23140 7ff79b6840b0 Concurrency::details::UMSFreeVirtualProcessorRoot::Activate 39 API calls 23138->23140 23140->23125 23142 7ff79b6aa6c6 23141->23142 23143 7ff79b6aa6a8 23141->23143 23144 7ff79b6aa084 _Fgetc EnterCriticalSection 23142->23144 23145 7ff79b6ac168 memcpy_s 11 API calls 23143->23145 23146 7ff79b6aa6cb 23144->23146 23147 7ff79b6aa6ad 23145->23147 23148 7ff79b6aa780 23146->23148 23150 7ff79b6b28f4 _Ungetc 39 API calls 23146->23150 23149 7ff79b6a6fa0 _invalid_parameter_noinfo 39 API calls 23147->23149 23151 7ff79b6aa640 53 API calls 23148->23151 23155 7ff79b6aa6b8 23149->23155 23154 7ff79b6aa6e7 23150->23154 23152 7ff79b6aa788 23151->23152 23153 7ff79b6aa090 _Fgetc LeaveCriticalSection 23152->23153 23153->23155 23154->23148 23156 7ff79b6aa755 23154->23156 23155->23130 23157 7ff79b6ac168 memcpy_s 11 API calls 23156->23157 23158 7ff79b6aa75a 23157->23158 23159 7ff79b6a6fa0 _invalid_parameter_noinfo 39 API calls 23158->23159 23160 7ff79b6aa765 23159->23160 23161 7ff79b6c1344 _local_unwind RtlUnwind 23160->23161 23161->23155 23162->23125 23163->23130 23164->23134 23165->23130 23172 7ff79b6851e0 23166->23172 23169->23097 23170->23094 23171->23098 23175 7ff79b682e30 23172->23175 23174 7ff79b68477d 23174->23101 23177 7ff79b682e43 allocator 23175->23177 23176 7ff79b682e4a shared_ptr 23176->23174 23177->23176 23179 7ff79b684410 39 API calls _invalid_parameter_noinfo_noreturn 23177->23179 23179->23176 23181 7ff79b696259 std::ios_base::failure::failure 23180->23181 23186 7ff79b68a180 23181->23186 23183 7ff79b696273 Concurrency::details::WorkQueue::IsStructuredEmpty 23184 7ff79b685b70 _Mpunct 41 API calls 23183->23184 23185 7ff79b6962c1 23184->23185 23185->22576 23187 7ff79b68a1a3 23186->23187 23188 7ff79b68a19e 23186->23188 23187->23183 23190 7ff79b68bf70 41 API calls 23188->23190 23190->23187 23194 7ff79b696f70 23191->23194 23193 7ff79b697042 Concurrency::details::ThreadProxyFactoryManager::~ThreadProxyFactoryManager 23193->22875 23195 7ff79b696f97 Concurrency::event::~event 23194->23195 23196 7ff79b696fb8 ~_Mpunct 23195->23196 23198 7ff79b699e90 23195->23198 23196->23193 23199 7ff79b699ee7 23198->23199 23200 7ff79b699ea8 Concurrency::event::~event 23198->23200 23201 7ff79b698c40 Concurrency::event::~event 39 API calls 23199->23201 23206 7ff79b698350 23200->23206 23202 7ff79b699f11 23201->23202 23202->23196 23204 7ff79b699ec6 23205 7ff79b6aa1bc Concurrency::event::~event 68 API calls 23204->23205 23205->23199 23207 7ff79b69838d ctype 23206->23207 23208 7ff79b69837d _aligned_msize Concurrency::event::~event 23206->23208 23207->23204 23208->23207 23210 7ff79b6aaf00 70 API calls 2 library calls 23208->23210 23210->23207 23213 7ff79b684bfd Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::cancellation_token_source::~cancellation_token_source 23211->23213 23212 7ff79b684c59 Concurrency::cancellation_token_source::~cancellation_token_source 23212->22588 23213->23212 23214 7ff79b684750 Concurrency::cancellation_token_source::~cancellation_token_source 39 API calls 23213->23214 23214->23212 23216 7ff79b696eb1 23215->23216 23231 7ff79b693e70 23216->23231 23218 7ff79b696ec0 23218->22595 23220 7ff79b683656 Concurrency::details::WorkQueue::IsStructuredEmpty 23219->23220 23220->22598 23222 7ff79b696a3c Concurrency::details::WorkQueue::IsStructuredEmpty 23221->23222 23239 7ff79b695e60 23222->23239 23226 7ff79b696afc 23226->22606 23227->22610 23228->22619 23229->22614 23230->22616 23232 7ff79b693e97 Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct 23231->23232 23235 7ff79b693f1a Concurrency::details::WorkQueue::IsStructuredEmpty ctype 23232->23235 23237 7ff79b698270 41 API calls type_info::_name_internal_method 23232->23237 23234 7ff79b693edd 23238 7ff79b696f40 39 API calls Concurrency::cancellation_token_source::~cancellation_token_source 23234->23238 23235->23218 23237->23234 23238->23235 23240 7ff79b695e82 23239->23240 23246 7ff79b695f40 23240->23246 23244 7ff79b695ef4 23245 7ff79b6969c0 49 API calls Concurrency::details::WorkQueue::IsStructuredEmpty 23244->23245 23245->23226 23247 7ff79b695f67 23246->23247 23251 7ff79b69c490 23247->23251 23250 7ff79b696020 7 API calls 23250->23244 23252 7ff79b68b100 std::ios_base::_Init 49 API calls 23251->23252 23253 7ff79b69c4ad 23252->23253 23260 7ff79b69e7b0 23253->23260 23255 7ff79b69c4d4 23256 7ff79b69c4fa 23255->23256 23264 7ff79b68f500 41 API calls 2 library calls 23255->23264 23258 7ff79b695ed3 23256->23258 23265 7ff79b69fa2c 7 API calls 2 library calls 23256->23265 23258->23250 23261 7ff79b69e7cc 23260->23261 23266 7ff79b695820 23261->23266 23263 7ff79b69e7e5 strtoxl 23263->23255 23264->23256 23265->23258 23267 7ff79b69eef8 std::_Lockit::_Lockit 6 API calls 23266->23267 23268 7ff79b695844 23267->23268 23269 7ff79b6896e0 7 API calls 23268->23269 23270 7ff79b69585d std::locale::_Getfacet 23269->23270 23271 7ff79b69588a 23270->23271 23280 7ff79b698810 23270->23280 23272 7ff79b69ef70 std::_Lockit::~_Lockit LeaveCriticalSection 23271->23272 23274 7ff79b695938 ctype 23272->23274 23274->23263 23276 7ff79b6958ae 23290 7ff79b68bd60 RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc Concurrency::cancel_current_task 23276->23290 23278 7ff79b6958b6 std::ios_base::_Init 23291 7ff79b69f130 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection std::_Facet_Register 23278->23291 23281 7ff79b6958a8 23280->23281 23282 7ff79b698838 23280->23282 23281->23276 23281->23278 23282->23281 23283 7ff79b6a0268 std::_Facet_Register 4 API calls 23282->23283 23285 7ff79b698854 23283->23285 23284 7ff79b6988b1 23284->23281 23301 7ff79b689000 78 API calls 2 library calls 23284->23301 23285->23284 23292 7ff79b6883b0 23285->23292 23290->23271 23291->23271 23293 7ff79b69eef8 std::_Lockit::_Lockit 6 API calls 23292->23293 23294 7ff79b6883d4 _Yarn 23293->23294 23295 7ff79b688449 23294->23295 23296 7ff79b68845a 23294->23296 23298 7ff79b69f2e0 std::_Locinfo::_Locinfo_ctor 77 API calls 23295->23298 23297 7ff79b69ee90 41 API calls 23296->23297 23299 7ff79b688458 23297->23299 23298->23299 23300 7ff79b696b60 39 API calls 2 library calls 23299->23300 23300->23284 23301->23281 23303 7ff79b6967c3 Concurrency::details::WorkQueue::IsStructuredEmpty std::ios_base::failure::failure _Mpunct 23302->23303 23304 7ff79b685aa0 _Mpunct 41 API calls 23303->23304 23305 7ff79b696898 Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct ctype Concurrency::cancellation_token_source::~cancellation_token_source UnDecorator::getVbTableType 23303->23305 23304->23305 23305->22626 23306->22624 23308 7ff79b68bff8 Concurrency::details::WorkQueue::IsStructuredEmpty char_traits 23307->23308 23311 7ff79b68c020 23308->23311 23310 7ff79b68c012 23310->22629 23312 7ff79b68c0de 23311->23312 23314 7ff79b68c05d Concurrency::details::WorkQueue::IsStructuredEmpty std::ios_base::failure::failure Concurrency::cancellation_token_source::~cancellation_token_source 23311->23314 23315 7ff79b686e10 41 API calls 5 library calls 23312->23315 23314->23310 23315->23314 23317 7ff79b696379 Concurrency::details::WorkQueue::IsStructuredEmpty std::ios_base::failure::failure _Mpunct 23316->23317 23319 7ff79b69663e Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct 23317->23319 23321 7ff79b696476 Concurrency::details::WorkQueue::IsStructuredEmpty std::ios_base::failure::failure _Mpunct ctype UnDecorator::getVbTableType 23317->23321 23322 7ff79b684dd0 41 API calls _Mpunct 23317->23322 23320 7ff79b685aa0 _Mpunct 41 API calls 23319->23320 23320->23321 23321->22632 23322->23319 23324 7ff79b685d66 _Mpunct 23323->23324 23326 7ff79b685d75 Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct 23324->23326 23329 7ff79b684dd0 41 API calls _Mpunct 23324->23329 23327 7ff79b685aa0 _Mpunct 41 API calls 23326->23327 23328 7ff79b685daf Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct ctype UnDecorator::getVbTableType 23326->23328 23327->23328 23328->22636 23329->23326 23331 7ff79b685116 Concurrency::details::WorkQueue::IsStructuredEmpty 23330->23331 23331->22641 23334 7ff79b6841c8 Concurrency::details::WorkQueue::IsStructuredEmpty 23332->23334 23333 7ff79b6841cf ctype UnDecorator::getVbTableType 23333->22720 23334->23333 23339 7ff79b684ca0 23334->23339 23337 7ff79b682775 _Mtx_guard::~_Mtx_guard 23336->23337 23337->22734 23338->22709 23341 7ff79b684cbd Concurrency::details::WorkQueue::IsStructuredEmpty UnDecorator::getVbTableType 23339->23341 23340 7ff79b684d19 type_info::_name_internal_method 23340->23333 23341->23340 23343 7ff79b684790 23341->23343 23346 7ff79b685210 23343->23346 23347 7ff79b682e30 allocator 39 API calls 23346->23347 23348 7ff79b6847bd 23347->23348 23348->23340 23350 7ff79b691af0 _Mtx_guard::~_Mtx_guard 23349->23350 23351 7ff79b691aff LoadLibraryA GetProcAddress 23350->23351 23352 7ff79b691b2f Concurrency::details::WorkQueue::IsStructuredEmpty 23351->23352 23353 7ff79b691b7e ctype 23352->23353 23354 7ff79b691ba3 Concurrency::details::WorkQueue::IsStructuredEmpty std::ios_base::_Init 23352->23354 23353->22750 23355 7ff79b696e80 41 API calls 23354->23355 23356 7ff79b691bed _Mtx_guard::~_Mtx_guard 23355->23356 23357 7ff79b691c0a LoadLibraryA GetProcAddress 23356->23357 23358 7ff79b691c46 Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock 23357->23358 23359 7ff79b691ce7 23358->23359 23360 7ff79b691cb8 23358->23360 23361 7ff79b684110 Concurrency::agent::wait_for_all 39 API calls 23359->23361 23362 7ff79b684110 Concurrency::agent::wait_for_all 39 API calls 23360->23362 23363 7ff79b691cdd 23361->23363 23362->23363 23363->23353 23366 7ff79b691df9 std::ios_base::_Init std::error_category::equivalent type_info::_name_internal_method 23364->23366 23365 7ff79b691e94 ctype 23365->22752 23366->23365 23368 7ff79b69d2f0 41 API calls type_info::_name_internal_method 23366->23368 23368->23366 23370 7ff79b691f8d 23369->23370 23370->22771 23371->22792 23374 7ff79b684b23 Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::cancellation_token_source::~cancellation_token_source 23372->23374 23373 7ff79b684123 23373->22797 23374->23373 23375 7ff79b6851e0 allocator 39 API calls 23374->23375 23375->23373 23376 7ff79b6ad6ed 23388 7ff79b6af954 23376->23388 23378 7ff79b6ad6f2 23379 7ff79b6ad763 23378->23379 23380 7ff79b6ad719 GetModuleHandleW 23378->23380 23381 7ff79b6ad5f0 11 API calls 23379->23381 23380->23379 23386 7ff79b6ad726 23380->23386 23382 7ff79b6ad79f 23381->23382 23383 7ff79b6ad7a6 23382->23383 23384 7ff79b6ad7bc 11 API calls 23382->23384 23385 7ff79b6ad7b8 23384->23385 23386->23379 23387 7ff79b6ad820 GetModuleHandleExW GetProcAddress FreeLibrary 23386->23387 23387->23379 23393 7ff79b6b0654 GetLastError 23388->23393 23394 7ff79b6b0695 FlsSetValue 23393->23394 23395 7ff79b6b0678 FlsGetValue 23393->23395 23397 7ff79b6b06a7 23394->23397 23413 7ff79b6b0685 23394->23413 23396 7ff79b6b068f 23395->23396 23395->23413 23396->23394 23416 7ff79b6b1490 23397->23416 23398 7ff79b6b0701 SetLastError 23400 7ff79b6b0721 23398->23400 23401 7ff79b6af95d 23398->23401 23432 7ff79b6ac814 39 API calls BuildCatchObjectHelperInternal 23400->23432 23415 7ff79b6ac814 39 API calls BuildCatchObjectHelperInternal 23401->23415 23404 7ff79b6b06d4 FlsSetValue 23408 7ff79b6b06f2 23404->23408 23409 7ff79b6b06e0 FlsSetValue 23404->23409 23405 7ff79b6b06c4 FlsSetValue 23407 7ff79b6b06cd 23405->23407 23425 7ff79b6b1508 23407->23425 23431 7ff79b6b0404 11 API calls memcpy_s 23408->23431 23409->23407 23412 7ff79b6b06fa 23414 7ff79b6b1508 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 23412->23414 23413->23398 23414->23398 23417 7ff79b6b14a1 23416->23417 23422 7ff79b6b14af memcpy_s 23416->23422 23419 7ff79b6b14f2 23417->23419 23417->23422 23418 7ff79b6b14d6 HeapAlloc 23420 7ff79b6b14f0 23418->23420 23418->23422 23433 7ff79b6ac168 11 API calls memcpy_s 23419->23433 23423 7ff79b6b06b6 23420->23423 23422->23418 23422->23419 23424 7ff79b6acbb4 std::_Facet_Register 2 API calls 23422->23424 23423->23404 23423->23405 23424->23422 23426 7ff79b6b153c 23425->23426 23427 7ff79b6b150d RtlDeleteBoundaryDescriptor 23425->23427 23426->23413 23427->23426 23428 7ff79b6b1528 GetLastError 23427->23428 23429 7ff79b6b1535 Concurrency::details::SchedulerProxy::DeleteThis 23428->23429 23434 7ff79b6ac168 11 API calls memcpy_s 23429->23434 23431->23412 23433->23423 23434->23426

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 7ff79b681530-7ff79b681624 call 7ff79b6a0670 call 7ff79b683da0 call 7ff79b682320 call 7ff79b682360 call 7ff79b682340 LoadLibraryA GetProcAddress call 7ff79b685100 InternetOpenW 13 7ff79b681626-7ff79b68168a call 7ff79b682380 call 7ff79b683d40 call 7ff79b6840e0 * 2 call 7ff79b6840b0 call 7ff79b6840e0 0->13 14 7ff79b68168f-7ff79b68178a call 7ff79b6823c0 call 7ff79b6823a0 LoadLibraryA GetProcAddress call 7ff79b685100 0->14 44 7ff79b682176-7ff79b68218e call 7ff79b6a06d0 13->44 30 7ff79b681850-7ff79b6818ea call 7ff79b682460 call 7ff79b682440 LoadLibraryA GetProcAddress InternetConnectW 14->30 31 7ff79b681790-7ff79b68184b call 7ff79b682400 call 7ff79b6823e0 LoadLibraryA GetProcAddress call 7ff79b682420 call 7ff79b683d40 call 7ff79b6840e0 * 2 call 7ff79b6840b0 call 7ff79b6840e0 14->31 46 7ff79b6818ec-7ff79b68195b InternetCloseHandle call 7ff79b682480 call 7ff79b683d40 call 7ff79b6840e0 * 2 call 7ff79b6840b0 call 7ff79b6840e0 30->46 47 7ff79b681960-7ff79b681a16 call 7ff79b6824c0 call 7ff79b6824a0 LoadLibraryA GetProcAddress call 7ff79b6824e0 30->47 31->44 46->44 73 7ff79b681a1c-7ff79b681b31 call 7ff79b682520 call 7ff79b682500 LoadLibraryA GetProcAddress call 7ff79b682560 call 7ff79b682540 LoadLibraryA GetProcAddress call 7ff79b682580 call 7ff79b683d40 call 7ff79b6840e0 * 2 call 7ff79b6840b0 call 7ff79b6840e0 47->73 74 7ff79b681b36-7ff79b681bba call 7ff79b6825c0 call 7ff79b6825a0 LoadLibraryA GetProcAddress call 7ff79b685470 call 7ff79b6850e0 47->74 73->44 98 7ff79b681bc6-7ff79b681be2 74->98 98->98 100 7ff79b681be4-7ff79b681c1b HttpSendRequestA 98->100 102 7ff79b681d95-7ff79b681db4 call 7ff79b684e10 call 7ff79b683e00 100->102 103 7ff79b681c21-7ff79b681d90 call 7ff79b682600 call 7ff79b6825e0 LoadLibraryA GetProcAddress call 7ff79b682640 call 7ff79b682620 LoadLibraryA GetProcAddress call 7ff79b682680 call 7ff79b682660 LoadLibraryA GetProcAddress call 7ff79b6826a0 call 7ff79b683d40 call 7ff79b6840e0 * 2 call 7ff79b6840b0 call 7ff79b6840e0 100->103 117 7ff79b681db5-7ff79b681e27 call 7ff79b6826e0 call 7ff79b6826c0 LoadLibraryA GetProcAddress InternetReadFile 102->117 103->44 130 7ff79b681e2d-7ff79b681e35 117->130 131 7ff79b681eb5-7ff79b681fd2 call 7ff79b683640 MultiByteToWideChar call 7ff79b6a02b4 call 7ff79b683640 MultiByteToWideChar call 7ff79b683d40 call 7ff79b6841b0 call 7ff79b6840e0 call 7ff79b6a02ac 117->131 130->131 134 7ff79b681e37-7ff79b681eb0 call 7ff79b6853c0 call 7ff79b6839f0 130->134 169 7ff79b681fd4-7ff79b681fe0 131->169 170 7ff79b681fe2-7ff79b681ff6 131->170 134->117 172 7ff79b681ffe-7ff79b68205d call 7ff79b682720 call 7ff79b682700 LoadLibraryA GetProcAddress InternetCloseHandle call 7ff79b682760 169->172 170->172 182 7ff79b682062-7ff79b68216e call 7ff79b682740 LoadLibraryA GetProcAddress call 7ff79b6827a0 call 7ff79b682780 LoadLibraryA GetProcAddress call 7ff79b683cc0 call 7ff79b684110 call 7ff79b6840e0 * 2 call 7ff79b6840b0 call 7ff79b6840e0 172->182 182->44
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Mtx_guardMtx_guard::~_$Concurrency::details::EmptyQueue::StructuredWork$AddressLibraryLoadProc$Char_traitsInternetOpen
                • String ID: h
                • API String ID: 917305780-2439710439
                • Opcode ID: c726dc98f6fc2f671fb5c89e5c32a5e42bd345b486c22517abf9d27252e8d014
                • Instruction ID: a06fc2d53585a741f973cb1e98d82d989c0b72d0e26666a3d9a8a4875d780433
                • Opcode Fuzzy Hash: c726dc98f6fc2f671fb5c89e5c32a5e42bd345b486c22517abf9d27252e8d014
                • Instruction Fuzzy Hash: 4B52B632609AC585D670EB25F8953EBB3A1FBC4780F904136DA9D83A69DF3CE6448B50
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 203 7ff79b692160-7ff79b6924c8 call 7ff79b692c40 call 7ff79b697a40 call 7ff79b692c10 call 7ff79b697a00 GetModuleHandleA call 7ff79b691f40 call 7ff79b692ca0 call 7ff79b697a20 call 7ff79b692c70 call 7ff79b697a00 GetModuleHandleA call 7ff79b691f40 call 7ff79b692d00 call 7ff79b697a60 call 7ff79b692cd0 call 7ff79b697a00 GetModuleHandleA call 7ff79b691f40 call 7ff79b692d60 call 7ff79b697a40 call 7ff79b692d30 call 7ff79b697a00 GetModuleHandleA call 7ff79b691f40 call 7ff79b692dc0 call 7ff79b697a40 call 7ff79b692d90 call 7ff79b697a00 GetModuleHandleA call 7ff79b691f40 call 7ff79b692e20 call 7ff79b697aa0 call 7ff79b692df0 call 7ff79b697a00 GetModuleHandleA call 7ff79b691f40 call 7ff79b692e80 call 7ff79b697a80 call 7ff79b692e50 call 7ff79b697a00 GetModuleHandleA call 7ff79b691f40 CreatePipe 274 7ff79b6924d1-7ff79b6924e9 SetHandleInformation 203->274 275 7ff79b6924ca-7ff79b6924cc 203->275 276 7ff79b6924f2-7ff79b6925ca CreateProcessA 274->276 277 7ff79b6924eb-7ff79b6924ed 274->277 278 7ff79b692bf0-7ff79b692c08 call 7ff79b6a06d0 275->278 279 7ff79b6925ef-7ff79b69266e NtCreateSection 276->279 280 7ff79b6925cc-7ff79b6925ea CloseHandle * 2 276->280 277->278 282 7ff79b6926af-7ff79b69275b GetCurrentProcess 279->282 283 7ff79b692670-7ff79b6926aa CloseHandle * 4 279->283 280->278 286 7ff79b69279c-7ff79b69283b call 7ff79b690940 282->286 287 7ff79b69275d-7ff79b692797 CloseHandle * 4 282->287 283->278 291 7ff79b69287c-7ff79b69290f 286->291 292 7ff79b69283d-7ff79b692877 CloseHandle * 4 286->292 287->278 296 7ff79b692950-7ff79b692959 291->296 297 7ff79b692911-7ff79b69294b CloseHandle * 4 291->297 292->278 298 7ff79b69295f-7ff79b6929d7 CloseHandle GetStdHandle call 7ff79b6a9554 296->298 299 7ff79b692b6a-7ff79b692beb GetCurrentProcess CloseHandle * 4 296->299 297->278 304 7ff79b6929e0-7ff79b6929ee 298->304 305 7ff79b6929d9-7ff79b6929db 298->305 299->278 306 7ff79b6929f2-7ff79b692a28 ReadFile 304->306 305->278 307 7ff79b692a34-7ff79b692b25 306->307 308 7ff79b692a2a-7ff79b692a32 306->308 311 7ff79b692b31-7ff79b692b4d 307->311 308->307 309 7ff79b692a39-7ff79b692a54 308->309 312 7ff79b692a56 309->312 313 7ff79b692a58 call 7ff79b6a03c4 309->313 311->311 314 7ff79b692b4f-7ff79b692b65 call 7ff79b6a7138 311->314 315 7ff79b692a5d-7ff79b692a7a 312->315 313->315 314->299 318 7ff79b692a83-7ff79b692a99 315->318 318->318 319 7ff79b692a9b-7ff79b692ad7 call 7ff79b6a955c 318->319 322 7ff79b692ad9-7ff79b692ae5 call 7ff79b6a7138 319->322 323 7ff79b692aea-7ff79b692b13 call 7ff79b6a9580 319->323 322->278 323->306
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: shared_ptr$Handle$Module$CreateInformationPipe
                • String ID: 0$@$@$h
                • API String ID: 4142502706-478861344
                • Opcode ID: 04db1fddc990362c5dbd6fc746f3bffbac1673f35e64e49e6fe2dfc67f0de86a
                • Instruction ID: 942c6209f907628bd451b417ec58d9227c8a11efe5188b6a907a6109943b4ac7
                • Opcode Fuzzy Hash: 04db1fddc990362c5dbd6fc746f3bffbac1673f35e64e49e6fe2dfc67f0de86a
                • Instruction Fuzzy Hash: 9D42F936609BC585D670EB29E4983AFB3A1FBC8790F400135DA9D43BA9DF7CE5488B50
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Mtx_guardMtx_guard::~_$AddressLibraryLoadProc$CheckMembershipToken
                • String ID:
                • API String ID: 1533160778-0
                • Opcode ID: 81b46c7f5b173283711966082a52bd869ca660c96307ed917c74f5a80707ba2a
                • Instruction ID: 641e45e686e01d5d0b77a481bf36b34bead143dbbfe74004e68d468ce28595fc
                • Opcode Fuzzy Hash: 81b46c7f5b173283711966082a52bd869ca660c96307ed917c74f5a80707ba2a
                • Instruction Fuzzy Hash: D551E43260EBC485E770AB24F4543ABB7A1FB85B44F804129D68D87BA9DF3CE148CB50
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 624 7ff79b6bdf20-7ff79b6bdf41 625 7ff79b6bdf43-7ff79b6bdf56 call 7ff79b6ac148 call 7ff79b6ac168 624->625 626 7ff79b6bdf5b-7ff79b6bdf5d 624->626 644 7ff79b6be357 625->644 628 7ff79b6be33f-7ff79b6be34c call 7ff79b6ac148 call 7ff79b6ac168 626->628 629 7ff79b6bdf63-7ff79b6bdf6a 626->629 646 7ff79b6be352 call 7ff79b6a6fa0 628->646 629->628 631 7ff79b6bdf70-7ff79b6bdfa4 629->631 631->628 634 7ff79b6bdfaa-7ff79b6bdfb1 631->634 638 7ff79b6bdfb3-7ff79b6bdfc6 call 7ff79b6ac148 call 7ff79b6ac168 634->638 639 7ff79b6bdfcb-7ff79b6bdfce 634->639 638->646 642 7ff79b6bdfd4-7ff79b6bdfd6 639->642 643 7ff79b6be33b-7ff79b6be33d 639->643 642->643 648 7ff79b6bdfdc-7ff79b6bdfdf 642->648 647 7ff79b6be35a-7ff79b6be369 643->647 644->647 646->644 648->638 651 7ff79b6bdfe1-7ff79b6be005 648->651 653 7ff79b6be03a-7ff79b6be042 651->653 654 7ff79b6be007-7ff79b6be00a 651->654 655 7ff79b6be016-7ff79b6be02d call 7ff79b6ac148 call 7ff79b6ac168 call 7ff79b6a6fa0 653->655 656 7ff79b6be044-7ff79b6be06e call 7ff79b6b1544 call 7ff79b6b1508 * 2 653->656 657 7ff79b6be032-7ff79b6be038 654->657 658 7ff79b6be00c-7ff79b6be014 654->658 685 7ff79b6be1c9 655->685 687 7ff79b6be070-7ff79b6be086 call 7ff79b6ac168 call 7ff79b6ac148 656->687 688 7ff79b6be08b-7ff79b6be0b5 call 7ff79b6b5a88 656->688 659 7ff79b6be0b9-7ff79b6be0ca 657->659 658->655 658->657 662 7ff79b6be151-7ff79b6be15b call 7ff79b6bd600 659->662 663 7ff79b6be0d0-7ff79b6be0d8 659->663 676 7ff79b6be161-7ff79b6be177 662->676 677 7ff79b6be1e7 662->677 663->662 666 7ff79b6be0da-7ff79b6be0dc 663->666 666->662 670 7ff79b6be0de-7ff79b6be0fc 666->670 670->662 674 7ff79b6be0fe-7ff79b6be10a 670->674 674->662 681 7ff79b6be10c-7ff79b6be10e 674->681 676->677 679 7ff79b6be179-7ff79b6be18b GetConsoleMode 676->679 683 7ff79b6be1ec-7ff79b6be20d ReadFile 677->683 679->677 684 7ff79b6be18d-7ff79b6be195 679->684 681->662 686 7ff79b6be110-7ff79b6be128 681->686 689 7ff79b6be305-7ff79b6be30e GetLastError 683->689 690 7ff79b6be213-7ff79b6be21b 683->690 684->683 692 7ff79b6be197-7ff79b6be1ba ReadConsoleW 684->692 695 7ff79b6be1cc-7ff79b6be1d6 call 7ff79b6b1508 685->695 686->662 696 7ff79b6be12a-7ff79b6be136 686->696 687->685 688->659 693 7ff79b6be310-7ff79b6be326 call 7ff79b6ac168 call 7ff79b6ac148 689->693 694 7ff79b6be32b-7ff79b6be32e 689->694 690->689 698 7ff79b6be221 690->698 700 7ff79b6be1bc GetLastError 692->700 701 7ff79b6be1db-7ff79b6be1e5 692->701 693->685 705 7ff79b6be1c2-7ff79b6be1c4 call 7ff79b6ac0dc 694->705 706 7ff79b6be334-7ff79b6be336 694->706 695->647 696->662 704 7ff79b6be138-7ff79b6be13a 696->704 708 7ff79b6be228-7ff79b6be23f 698->708 700->705 701->708 704->662 713 7ff79b6be13c-7ff79b6be14c 704->713 705->685 706->695 708->695 709 7ff79b6be241-7ff79b6be24c 708->709 715 7ff79b6be273-7ff79b6be27b 709->715 716 7ff79b6be24e-7ff79b6be267 call 7ff79b6bdb30 709->716 713->662 720 7ff79b6be2f3-7ff79b6be300 call 7ff79b6bd958 715->720 721 7ff79b6be27d-7ff79b6be28f 715->721 724 7ff79b6be26c-7ff79b6be26e 716->724 720->724 725 7ff79b6be291 721->725 726 7ff79b6be2e6-7ff79b6be2ee 721->726 724->695 728 7ff79b6be297-7ff79b6be29e 725->728 726->695 729 7ff79b6be2a0-7ff79b6be2a4 728->729 730 7ff79b6be2db-7ff79b6be2e0 728->730 731 7ff79b6be2c1 729->731 732 7ff79b6be2a6-7ff79b6be2ad 729->732 730->726 734 7ff79b6be2c7-7ff79b6be2d7 731->734 732->731 733 7ff79b6be2af-7ff79b6be2b3 732->733 733->731 735 7ff79b6be2b5-7ff79b6be2bf 733->735 734->728 736 7ff79b6be2d9 734->736 735->734 736->726
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: 9f271580427a8db3f75cbd2bb9b0fe936c792dd2b360d3abbb68736ec05fed0c
                • Instruction ID: bbf495e7f091b96fcfcd1c82e17a7c8926f6b11caf317a451ceba2c9d634ee94
                • Opcode Fuzzy Hash: 9f271580427a8db3f75cbd2bb9b0fe936c792dd2b360d3abbb68736ec05fed0c
                • Instruction Fuzzy Hash: FFC1C322A0C65A95E7B16B3984043BDBBB2FB41B84FD50535DAAE077A1CF7CF6548320
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: ace2ec016e69fe205037fac33d386dec39f06c912014ccb122dad95daff1e51d
                • Instruction ID: 6cd2bae4d5c67eab5c2914b8e77a907bdbbf4636b671ef2d84654701a4de1e7f
                • Opcode Fuzzy Hash: ace2ec016e69fe205037fac33d386dec39f06c912014ccb122dad95daff1e51d
                • Instruction Fuzzy Hash: 4A81A172A14A1985EF70AE39D4913BD7362FB84B98F944636DF2E477A5CF38E2418310
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Mtx_guardMtx_guard::~_$Token$AddressInformationLibraryLoadProc$CloseConcurrency::details::_CriticalHandleLock::_OpenProcessReentrantScoped_lockScoped_lock::~_
                • String ID:
                • API String ID: 2078037076-0
                • Opcode ID: 130ff3acc1720edd0cc1e8b9c84bb8854697590baa150c0d744b4c8b022ef38d
                • Instruction ID: 83fc3969d409a0c2a3f312f6c61ca298e56f36570e191d0707c4dcbd4eb6642b
                • Opcode Fuzzy Hash: 130ff3acc1720edd0cc1e8b9c84bb8854697590baa150c0d744b4c8b022ef38d
                • Instruction Fuzzy Hash: DDB1C73261DA8585D6B0EB25F4913EAB3A1FBC4740F904136EADE83B69DF3CE5448B50
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Mtx_guardMtx_guard::~_$FullImageNameProcessQuery
                • String ID:
                • API String ID: 4084525217-0
                • Opcode ID: 701dd65d4abf504f67a507c631a00a66171a7fe275edc2bc17d2fcbb4fc2582c
                • Instruction ID: 9de3f0e615fe1f26e1fe1880c88e7761733637c3d6f49402c70c7e9fc2eb483a
                • Opcode Fuzzy Hash: 701dd65d4abf504f67a507c631a00a66171a7fe275edc2bc17d2fcbb4fc2582c
                • Instruction Fuzzy Hash: ADD1D63251DAC591D6B0AB25E4913EFB3A5EBC4740F804136E6DD82BA9EF2CE644CB50
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Yarn$std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                • String ID: bad locale name
                • API String ID: 3904239083-1405518554
                • Opcode ID: ae69e64bb531647ca2b4c5f72a87dc1cf5341c50293419aee94ce7dd1a5b7b19
                • Instruction ID: 4404e91f1cd784e8d5909e8c59fbcd4c137b0a106ffa6742fd421bdb9ecb07b1
                • Opcode Fuzzy Hash: ae69e64bb531647ca2b4c5f72a87dc1cf5341c50293419aee94ce7dd1a5b7b19
                • Instruction Fuzzy Hash: 5611FB52A0AA4A82D910F77EF44126E9361FFC2784FA00535EAAD13776CE3DE5118614
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 550 7ff79b6bef6c-7ff79b6befdf call 7ff79b6bec9c 553 7ff79b6befe1-7ff79b6befea call 7ff79b6ac148 550->553 554 7ff79b6beff9-7ff79b6bf003 call 7ff79b6b9290 550->554 559 7ff79b6befed-7ff79b6beff4 call 7ff79b6ac168 553->559 560 7ff79b6bf005-7ff79b6bf01c call 7ff79b6ac148 call 7ff79b6ac168 554->560 561 7ff79b6bf01e-7ff79b6bf087 CreateFileW 554->561 577 7ff79b6bf33b-7ff79b6bf35b 559->577 560->559 563 7ff79b6bf104-7ff79b6bf10f GetFileType 561->563 564 7ff79b6bf089-7ff79b6bf08f 561->564 570 7ff79b6bf162-7ff79b6bf169 563->570 571 7ff79b6bf111-7ff79b6bf14c GetLastError call 7ff79b6ac0dc CloseHandle 563->571 567 7ff79b6bf0d1-7ff79b6bf0ff GetLastError call 7ff79b6ac0dc 564->567 568 7ff79b6bf091-7ff79b6bf095 564->568 567->559 568->567 575 7ff79b6bf097-7ff79b6bf0cf CreateFileW 568->575 573 7ff79b6bf171-7ff79b6bf174 570->573 574 7ff79b6bf16b-7ff79b6bf16f 570->574 571->559 585 7ff79b6bf152-7ff79b6bf15d call 7ff79b6ac168 571->585 580 7ff79b6bf17a-7ff79b6bf1cf call 7ff79b6b91a8 573->580 581 7ff79b6bf176 573->581 574->580 575->563 575->567 589 7ff79b6bf1d1-7ff79b6bf1dd call 7ff79b6beea8 580->589 590 7ff79b6bf1ee-7ff79b6bf21f call 7ff79b6bea24 580->590 581->580 585->559 589->590 597 7ff79b6bf1df 589->597 595 7ff79b6bf221-7ff79b6bf223 590->595 596 7ff79b6bf225-7ff79b6bf268 590->596 598 7ff79b6bf1e1-7ff79b6bf1e9 call 7ff79b6b41ac 595->598 599 7ff79b6bf28a-7ff79b6bf295 596->599 600 7ff79b6bf26a-7ff79b6bf26e 596->600 597->598 598->577 602 7ff79b6bf339 599->602 603 7ff79b6bf29b-7ff79b6bf29f 599->603 600->599 601 7ff79b6bf270-7ff79b6bf285 600->601 601->599 602->577 603->602 605 7ff79b6bf2a5-7ff79b6bf2ea CloseHandle CreateFileW 603->605 607 7ff79b6bf31f-7ff79b6bf334 605->607 608 7ff79b6bf2ec-7ff79b6bf31a GetLastError call 7ff79b6ac0dc call 7ff79b6b93d0 605->608 607->602 608->607
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type_get_daylight
                • String ID:
                • API String ID: 1330151763-0
                • Opcode ID: 790408a4190ff526dad24de9abb57f449c3e0de4ec72fef1147c7e59b7566dd0
                • Instruction ID: 45ca7cb20e0fe0f2c7ce29987fbb5e17a0f705fa30e5e3917784dc34ba30f1c7
                • Opcode Fuzzy Hash: 790408a4190ff526dad24de9abb57f449c3e0de4ec72fef1147c7e59b7566dd0
                • Instruction Fuzzy Hash: 0AC1D237B28A5A85EB20DF7CC4905AC7772FB49B98B811225DA2E577E4CF38E251C310
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Mtx_guardMtx_guard::~_$AddressLibraryLoadProc
                • String ID: $O$X
                • API String ID: 1138954263-3341619949
                • Opcode ID: db227c295b068dcf4488e81726beb466b8cefc96657e12b5734f7b1ca8688feb
                • Instruction ID: 3589070122a8fd25b19236ff29123d4bf52657f725ec6f3d1c25d47a908b7641
                • Opcode Fuzzy Hash: db227c295b068dcf4488e81726beb466b8cefc96657e12b5734f7b1ca8688feb
                • Instruction Fuzzy Hash: 1D41F23210CBC18AE7309B28F45839BBAA1F785754F50422AE6D947BA9DFBDC1488F10
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 737 7ff79b69e140-7ff79b69e16e call 7ff79b68e060 740 7ff79b69e170-7ff79b69e197 call 7ff79b68e060 call 7ff79b68dc20 737->740 741 7ff79b69e1b3-7ff79b69e1c3 737->741 740->741 756 7ff79b69e199-7ff79b69e1ae call 7ff79b68abe0 call 7ff79b68f740 740->756 742 7ff79b69e1cf-7ff79b69e1e9 call 7ff79b699ad0 741->742 743 7ff79b69e1c5-7ff79b69e1ca call 7ff79b68dc80 741->743 753 7ff79b69e236-7ff79b69e243 call 7ff79b687f00 742->753 754 7ff79b69e1eb-7ff79b69e20c call 7ff79b6942e0 742->754 752 7ff79b69e4b0-7ff79b69e4c7 call 7ff79b6a06d0 743->752 766 7ff79b69e244-7ff79b69e253 call 7ff79b6aa68c 753->766 763 7ff79b69e222-7ff79b69e227 call 7ff79b68dc80 754->763 764 7ff79b69e20e-7ff79b69e220 call 7ff79b68f740 754->764 756->752 775 7ff79b69e22c-7ff79b69e231 763->775 764->775 774 7ff79b69e258-7ff79b69e261 766->774 776 7ff79b69e284-7ff79b69e34e call 7ff79b69d240 call 7ff79b6850e0 call 7ff79b685470 call 7ff79b6850e0 call 7ff79b69c410 774->776 777 7ff79b69e263-7ff79b69e27f call 7ff79b68dc80 call 7ff79b6840b0 774->777 775->752 792 7ff79b69e350-7ff79b69e355 776->792 793 7ff79b69e367-7ff79b69e377 776->793 777->752 792->793 796 7ff79b69e357-7ff79b69e35c 792->796 794 7ff79b69e426-7ff79b69e49d call 7ff79b6850e0 call 7ff79b69c170 793->794 795 7ff79b69e37d-7ff79b69e3b5 call 7ff79b6850e0 call 7ff79b685470 793->795 794->752 794->766 814 7ff79b69e3ba-7ff79b69e3c0 795->814 797 7ff79b69e362-7ff79b69e49b call 7ff79b68dc80 call 7ff79b6840b0 796->797 798 7ff79b69e455-7ff79b69e47d call 7ff79b69c330 call 7ff79b6840b0 796->798 797->752 798->752 817 7ff79b69e3c2-7ff79b69e3fb call 7ff79b6ab324 814->817 818 7ff79b69e3fd-7ff79b69e421 call 7ff79b68f740 call 7ff79b6840b0 814->818 817->814 818->752
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Fgetc
                • String ID:
                • API String ID: 1720979605-0
                • Opcode ID: 92c9d7d3e2c62946ae797d64bf5fb83644d989058beea552c994d1011653e09f
                • Instruction ID: 52ab535b3776d69eabbe71f30644c3b0cccc70e0efe819406b523bc19811c4c0
                • Opcode Fuzzy Hash: 92c9d7d3e2c62946ae797d64bf5fb83644d989058beea552c994d1011653e09f
                • Instruction Fuzzy Hash: 8D911F22A0DAC9C5DA70AB39E4503BEF361FBC5740FA04036E6DD427A9DE2CE548CB51
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_taskGetfacetstd::locale::_
                • String ID:
                • API String ID: 1842055293-0
                • Opcode ID: e9a79613abac1eb9049571a8d358c6cb3fc309f894ef0b3605c3646525b603df
                • Instruction ID: 57d5cd8129bb81ba86436234ab0d616c11f74777c280903e8c7ae384f000b7da
                • Opcode Fuzzy Hash: e9a79613abac1eb9049571a8d358c6cb3fc309f894ef0b3605c3646525b603df
                • Instruction Fuzzy Hash: D531E12251DA8981EA30EB39E44126AF3A1FBC57A4F901531E6DD43BB9DE3CE651CB10
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                APIs
                  • Part of subcall function 00007FF79B695C40: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF79B695C5D
                • _Mtx_guard::~_Mtx_guard.LIBCPMTD ref: 00007FF79B6910F6
                  • Part of subcall function 00007FF79B687E50: char_traits.LIBCPMTD ref: 00007FF79B687E7D
                  • Part of subcall function 00007FF79B697D40: std::bad_exception::~bad_exception.LIBCMTD ref: 00007FF79B697D6A
                  • Part of subcall function 00007FF79B6840E0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF79B6840FB
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Concurrency::details::EmptyQueue::StructuredWork$Mtx_guardMtx_guard::~_char_traitsstd::bad_exception::~bad_exception
                • String ID: ":"
                • API String ID: 1492957392-876729345
                • Opcode ID: 9e8e0daaccefff85c2bd3551127beca3aa6f0c005cdde35cf6f39ad0d292be65
                • Instruction ID: f8970d59531d2a45d44c6167d8c0a6c82299d03aed2c8ea30d0f42f5e88a8f31
                • Opcode Fuzzy Hash: 9e8e0daaccefff85c2bd3551127beca3aa6f0c005cdde35cf6f39ad0d292be65
                • Instruction Fuzzy Hash: 80B11F3261DACA95DA70EB25E4913EBA361F7C4784F800136E69D43BA9DF3CE605CB50
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                APIs
                • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF79B693BB2
                • type_info::_name_internal_method.LIBCMTD ref: 00007FF79B693C22
                • Concurrency::cancellation_token_source::~cancellation_token_source.LIBCPMTD ref: 00007FF79B693DE3
                  • Part of subcall function 00007FF79B68E380: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF79B68E39D
                  • Part of subcall function 00007FF79B68E380: _Max_value.LIBCPMTD ref: 00007FF79B68E3C2
                  • Part of subcall function 00007FF79B68E380: _Min_value.LIBCPMTD ref: 00007FF79B68E3F0
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Concurrency::details::EmptyQueue::StructuredWork$Concurrency::cancellation_token_source::~cancellation_token_sourceMax_valueMin_valuetype_info::_name_internal_method
                • String ID:
                • API String ID: 3983101109-0
                • Opcode ID: d9772f20c955eddfc384bb7d319feabd260abab649967bfe530082734dfd144d
                • Instruction ID: 6c9e0b8ac9809a7d54030fdd7b59f5edb15aa283cc6f334bbcdb2a57eea48a76
                • Opcode Fuzzy Hash: d9772f20c955eddfc384bb7d319feabd260abab649967bfe530082734dfd144d
                • Instruction Fuzzy Hash: B761DF36609B8981DA30EB29F49036AB7A1F7C8B84F500526EADD47B69DF3CD614CB50
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: _invalid_parameter_noinfo$_local_unwind
                • String ID:
                • API String ID: 1677304287-0
                • Opcode ID: 7a7f3122999a791825d40466389b8631a1ba631687b9555377302046f3b5cb2f
                • Instruction ID: be27f90ece3d5aff1e32e028ebee9b549d6fc0cf957e3174b75dde1735f78247
                • Opcode Fuzzy Hash: 7a7f3122999a791825d40466389b8631a1ba631687b9555377302046f3b5cb2f
                • Instruction Fuzzy Hash: AB21B435A1860E41EE60FF38D8501BAA762EB94B84FD41132E62E472F2DE3DF215C720
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Process$CurrentExitTerminate
                • String ID:
                • API String ID: 1703294689-0
                • Opcode ID: 9938b8f7f5c4283938169b2530868151d01514bb7584ca7b7cd9bfac04d9220f
                • Instruction ID: 2c25ef99a2a1f0125266e721903efc85dbdc2c47e0b3a7a34f62bf11889a2fcd
                • Opcode Fuzzy Hash: 9938b8f7f5c4283938169b2530868151d01514bb7584ca7b7cd9bfac04d9220f
                • Instruction Fuzzy Hash: F4D09E15F0860A42EE787F78685517992535F58741F81243CC97F163B3DD3CFA4D8260
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: d16f69336d39a686184200443b9cb86af4a51ac612b2546c7b4c76b9904235af
                • Instruction ID: a24e0f150569f660981c95e20dca5ac3a0f0c975b185dea17f9e3e11a69cddb8
                • Opcode Fuzzy Hash: d16f69336d39a686184200443b9cb86af4a51ac612b2546c7b4c76b9904235af
                • Instruction Fuzzy Hash: 4951C532A1C61986EE34AB3DA440179B7B2EF41B44F900536D6AE477A1CF2DF602C721
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                • String ID:
                • API String ID: 1236291503-0
                • Opcode ID: 2fdbdaa76bcfb360e18271e0502b9d0c0cab47a9ce12b6219b1a2cd2a469f82f
                • Instruction ID: a6a9a1f888468376660baff1f32b35d6176342c47337136ed0a766fc01f21612
                • Opcode Fuzzy Hash: 2fdbdaa76bcfb360e18271e0502b9d0c0cab47a9ce12b6219b1a2cd2a469f82f
                • Instruction Fuzzy Hash: 3031E921E0824A81FE74BF3D94553B9E393AF85B84FC45035EA6D072F7CE2DBA048260
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • shared_ptr.LIBCMTD ref: 00007FF79B693C0D
                • type_info::_name_internal_method.LIBCMTD ref: 00007FF79B693C22
                • Concurrency::cancellation_token_source::~cancellation_token_source.LIBCPMTD ref: 00007FF79B693DE3
                  • Part of subcall function 00007FF79B68E380: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF79B68E39D
                  • Part of subcall function 00007FF79B68E380: _Max_value.LIBCPMTD ref: 00007FF79B68E3C2
                  • Part of subcall function 00007FF79B68E380: _Min_value.LIBCPMTD ref: 00007FF79B68E3F0
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Concurrency::cancellation_token_source::~cancellation_token_sourceConcurrency::details::EmptyMax_valueMin_valueQueue::StructuredWorkshared_ptrtype_info::_name_internal_method
                • String ID:
                • API String ID: 3860581721-0
                • Opcode ID: a8208d58dcf4a9da05fa619c0053392cb919b34ac383dddb62f0355774aed7fc
                • Instruction ID: b79ca79c2e76c43eff8fc7ed4cb073c84be13dd9e548a408a953d2944a7e9e62
                • Opcode Fuzzy Hash: a8208d58dcf4a9da05fa619c0053392cb919b34ac383dddb62f0355774aed7fc
                • Instruction Fuzzy Hash: 9841C126609B89C1DA70EB2AE49016EF761F7C8B84F500576EEDD47B69DF2CE600CB50
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: ChangeCloseErrorFindLastNotification
                • String ID:
                • API String ID: 1687624791-0
                • Opcode ID: 6a9e9d8b8c827fdd9920b9fe665b9db08ffe228f8fee5d6895292f41af10a69b
                • Instruction ID: 67d0c4cc28d2e2662c44529ca9d324d414056c523a49452a2d5a5cbdf4367584
                • Opcode Fuzzy Hash: 6a9e9d8b8c827fdd9920b9fe665b9db08ffe228f8fee5d6895292f41af10a69b
                • Instruction Fuzzy Hash: A3219512B0C66A01EE74B77D9494279A2A36F857A0F884239DA3E477E2CF7CB6449310
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnstdext::threads::lock_error::lock_error
                • String ID:
                • API String ID: 4267930906-0
                • Opcode ID: 1d95908a73f1153ca62153ff4aa3ddd68dce7b4f05720e1950c8bac404c53bb8
                • Instruction ID: 1243347f2f027d4c85d6e263af3e3dbcb97426e80cbea3c491a1c0034edc9eba
                • Opcode Fuzzy Hash: 1d95908a73f1153ca62153ff4aa3ddd68dce7b4f05720e1950c8bac404c53bb8
                • Instruction Fuzzy Hash: 31011262618F89C1DA70AB6DE44131BE395FF84798F400235FAED46BA9DF2CE2508714
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                • String ID:
                • API String ID: 1173176844-0
                • Opcode ID: c558260fd17db247e4818a43d5491fb0a9fcd8db05ab54b1a44771620dbf4526
                • Instruction ID: f4fbb2f3ff45b3302bf4d78745dd720b1d7fe3da22670ed8eebee234bd23b0f7
                • Opcode Fuzzy Hash: c558260fd17db247e4818a43d5491fb0a9fcd8db05ab54b1a44771620dbf4526
                • Instruction Fuzzy Hash: AFE0EC51E0920F15FD7A3DBD14260B881422F15B70EA81B30DD7D042E3ED1CB6994530
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • RtlDeleteBoundaryDescriptor.NTDLL(?,?,00007FF79B6AF4FF,00007FF79B6B9ECE,?,?,?,00007FF79B6BA24B,?,?,00000000,00007FF79B6BA794,?,?,?,00007FF79B6BA6C7), ref: 00007FF79B6B151E
                • GetLastError.KERNEL32(?,?,00007FF79B6AF4FF,00007FF79B6B9ECE,?,?,?,00007FF79B6BA24B,?,?,00000000,00007FF79B6BA794,?,?,?,00007FF79B6BA6C7), ref: 00007FF79B6B1528
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: BoundaryDeleteDescriptorErrorLast
                • String ID:
                • API String ID: 2050971199-0
                • Opcode ID: 22113e7b3759c7fa4075077600b4cf2217addec54d95a7cb994b6730f1bcd310
                • Instruction ID: 8a8de81db933257f80ae34f3c9277760985b7d77f139257f4ac7a12a3fe0e394
                • Opcode Fuzzy Hash: 22113e7b3759c7fa4075077600b4cf2217addec54d95a7cb994b6730f1bcd310
                • Instruction Fuzzy Hash: F5E04FA1F0860E42FE34BBB96C4507595A69F94B40BC44034CA2A82271EE2C7B518360
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: type_info::_name_internal_method
                • String ID:
                • API String ID: 3713626258-0
                • Opcode ID: a2f3746152e4937fa409d3966db439cd974329057aa90736033f0d8ae7d607bd
                • Instruction ID: fa7bb3593734ffb32d3e1f815178e00feb068f4dbef530b82c16b10d1bfc2957
                • Opcode Fuzzy Hash: a2f3746152e4937fa409d3966db439cd974329057aa90736033f0d8ae7d607bd
                • Instruction Fuzzy Hash: 0D31166261CBC991DA60E725F4503ABB366FBD4780F804435EA9D43BA9DF7CD605CB10
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: 29e391afbdc0f1f91cfa9b92c29087711ceb96ca40d864eb0757064fc87e8483
                • Instruction ID: 7b2d307a6cdd67b0718f250d4457fa82b5a679d56b6fe9678c7fc59d7c886425
                • Opcode Fuzzy Hash: 29e391afbdc0f1f91cfa9b92c29087711ceb96ca40d864eb0757064fc87e8483
                • Instruction Fuzzy Hash: 77317222A1C61A46F6617F7C884127DAAA6AB91BA4FD50135D93D073F2CF7CB641C730
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: HandleModule$AddressFreeLibraryProc
                • String ID:
                • API String ID: 3947729631-0
                • Opcode ID: 9ce65edd821bc15608ec19ecbfe96b8b46af083e725ae73df7bd82673076dda6
                • Instruction ID: 578e8243f5ddd8e9baca92ff47d0d116c47ba21bfdb784fc34133607b6fd7139
                • Opcode Fuzzy Hash: 9ce65edd821bc15608ec19ecbfe96b8b46af083e725ae73df7bd82673076dda6
                • Instruction Fuzzy Hash: 84216D32E047498AEB28AF78C4802AC77A1EB44718F944639D63D07AE5EF78F645C790
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: 35c2c245ebb3c0cd08d8e19512ca528815d4438547f597df9bc99ef3f2b16adf
                • Instruction ID: e1be04070cec25b6d03ccd5f5b06dc87a89579de04cf98bd7b39ff931fa102ef
                • Opcode Fuzzy Hash: 35c2c245ebb3c0cd08d8e19512ca528815d4438547f597df9bc99ef3f2b16adf
                • Instruction Fuzzy Hash: 4821B332A0C65686DBB1AF2CD440379B6B2FB84B94F944234E7AD476E9DF3CE5048B10
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: bb4b135b2f54680a24dd5023d51312e87c4a2fa8e9b3d72bf53aa6be929a5547
                • Instruction ID: e5a268213b8e1b9b3c2f0e0b8c4801dca2c414b9083199bb77db46e8c94d9f86
                • Opcode Fuzzy Hash: bb4b135b2f54680a24dd5023d51312e87c4a2fa8e9b3d72bf53aa6be929a5547
                • Instruction Fuzzy Hash: F8114821A0C54941FE707F699800579E6BABF85B44F844031EA6C576A5CF3CFA409760
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • std::_Locinfo::~_Locinfo.LIBCPMTD ref: 00007FF79B6988F0
                  • Part of subcall function 00007FF79B6883B0: std::_Lockit::_Lockit.LIBCPMT ref: 00007FF79B6883CF
                  • Part of subcall function 00007FF79B6883B0: _Yarn.LIBCPMTD ref: 00007FF79B6883E1
                  • Part of subcall function 00007FF79B6883B0: _Yarn.LIBCPMTD ref: 00007FF79B6883F3
                  • Part of subcall function 00007FF79B6883B0: _Yarn.LIBCPMTD ref: 00007FF79B688405
                  • Part of subcall function 00007FF79B6883B0: _Yarn.LIBCPMTD ref: 00007FF79B688417
                  • Part of subcall function 00007FF79B6883B0: _Yarn.LIBCPMTD ref: 00007FF79B688429
                  • Part of subcall function 00007FF79B6883B0: _Yarn.LIBCPMTD ref: 00007FF79B68843B
                  • Part of subcall function 00007FF79B6883B0: std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00007FF79B688453
                  • Part of subcall function 00007FF79B696B60: std::bad_exception::bad_exception.LIBCMTD ref: 00007FF79B696B7D
                  • Part of subcall function 00007FF79B696B60: ctype.LIBCPMTD ref: 00007FF79B696B9C
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Yarn$std::_$LocinfoLocinfo::_Locinfo::~_Locinfo_ctorLockitLockit::_ctypestd::bad_exception::bad_exception
                • String ID:
                • API String ID: 4070494121-0
                • Opcode ID: 821f09261e1bfd7cc78498abb685fa2134bb6a4cd612f7c8b82f1733f9ad8071
                • Instruction ID: 5348fa3e72a9d55d01a766eab54df9483452f7bffcc5587739ff3595e2c71312
                • Opcode Fuzzy Hash: 821f09261e1bfd7cc78498abb685fa2134bb6a4cd612f7c8b82f1733f9ad8071
                • Instruction Fuzzy Hash: 6D21E632519B8482E770AB68F45036AF7A1F784794F900235EADD87BA8DF3CE5448B20
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF79B684CE0
                  • Part of subcall function 00007FF79B684790: allocator.LIBCPMTD ref: 00007FF79B6847B8
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Concurrency::details::EmptyQueue::StructuredWorkallocator
                • String ID:
                • API String ID: 1755220593-0
                • Opcode ID: a52ad78a4516db5ed59f22b60281ebce6ef51f0b18740e7aa35e1e63eb3a401b
                • Instruction ID: 7c91c6788da103a769c864f50e3b375c61fa9af93c08edc5a7a892f466c3120d
                • Opcode Fuzzy Hash: a52ad78a4516db5ed59f22b60281ebce6ef51f0b18740e7aa35e1e63eb3a401b
                • Instruction Fuzzy Hash: D0112126618B45C0DA30EB6AF44031AA7A1FBC8BE8F441136FA8D47779DF3CD2408B40
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: 57b8fb347c7eafb6cd2effb2717adacb8a9adab592f5ba38707d874671771b94
                • Instruction ID: 4834a7b53383db33de437ddcdbefb2ddde9a36df6c32da46c598dc04289e3ae5
                • Opcode Fuzzy Hash: 57b8fb347c7eafb6cd2effb2717adacb8a9adab592f5ba38707d874671771b94
                • Instruction Fuzzy Hash: F111D672A04B5A9DEB10EFB4D4812EC37B8EB0475CF900536EA5D12B69EF34E295C760
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF79B695C5D
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Concurrency::details::EmptyQueue::StructuredWork
                • String ID:
                • API String ID: 1865873047-0
                • Opcode ID: cb331025dea85621842c4b5f5511e16ae23755347a8174af5e91fe7f1376b07f
                • Instruction ID: 08cbfbd1a9992ad603827a57ee0015957efabeefd5b413f2df6c108fab3f17ee
                • Opcode Fuzzy Hash: cb331025dea85621842c4b5f5511e16ae23755347a8174af5e91fe7f1376b07f
                • Instruction Fuzzy Hash: EF014276608B84C6CB10DF1AE49121ABB71F7C9B85FA08116EB8D43B28CF39D511CB40
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Init_mbssetstd::ios_base::_
                • String ID:
                • API String ID: 1810626246-0
                • Opcode ID: 92298164b0cbf2dbb7c4e6ff9d45205ec42c64d849dcea8abbaa7a3cbf9175b7
                • Instruction ID: b0fe382d2f30fc4bcb1c45ff7a5a7eff3896339e2af49d24bcbb6ec5ad3e3296
                • Opcode Fuzzy Hash: 92298164b0cbf2dbb7c4e6ff9d45205ec42c64d849dcea8abbaa7a3cbf9175b7
                • Instruction Fuzzy Hash: 60012C22638AC5C1DB50EB2AE49076EA761FBD4B80F502061FA9E87B65CE3DD550CB50
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • RtlAllocateHeap.NTDLL(?,?,?,00007FF79B6B2D95,?,?,00000000,00007FF79B6BBE13,?,?,?,00007FF79B6AF4FF,?,?,?,00007FF79B6AF3F5), ref: 00007FF79B6B1582
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: AllocateHeap
                • String ID:
                • API String ID: 1279760036-0
                • Opcode ID: ad5d9f4e22bee555ceef19e5116ab5d4b76d91c2edb1191f1b6b70fe05957c9e
                • Instruction ID: 8889310fe6869d13150ccb485c7cc48b6cad6d3bc59935cd0eb397cd21c83d20
                • Opcode Fuzzy Hash: ad5d9f4e22bee555ceef19e5116ab5d4b76d91c2edb1191f1b6b70fe05957c9e
                • Instruction Fuzzy Hash: 3BF03A92A2C21E51FE347B795C5167991A34F887A0F884631993E852E2DE1CF6808670
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: allocator
                • String ID:
                • API String ID: 3447690668-0
                • Opcode ID: 4309186eb9c10c64a58072181ca1d4838dc7d968084dadab5a3902f98e2e9c18
                • Instruction ID: 8e109a3c3ff3a38a7a5a622b0e95ff7b54948b59d2c599736eaa7c558a0d9307
                • Opcode Fuzzy Hash: 4309186eb9c10c64a58072181ca1d4838dc7d968084dadab5a3902f98e2e9c18
                • Instruction Fuzzy Hash: 2ED06762569B8481C644EB16F88100AA774F7997C0FA09825EA8D43B29CE28D1618B40
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: allocator
                • String ID:
                • API String ID: 3447690668-0
                • Opcode ID: bc753421ed17c6d6a6b217564accc5e262335ae184d06accad72eb12d5a968bd
                • Instruction ID: c2cd6510a388bfce7d0d48ce5b52735f139d844b89dc458189481f966f42dcad
                • Opcode Fuzzy Hash: bc753421ed17c6d6a6b217564accc5e262335ae184d06accad72eb12d5a968bd
                • Instruction Fuzzy Hash: 61D06762529B8481C644EB26F88100AA774F799BC0FA09825EACD42B29CE28C2618B40
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: std::bad_exception::~bad_exception
                • String ID:
                • API String ID: 2813134625-0
                • Opcode ID: dddcb6239b0a16dcbb0c8fd97c7be55cb0a60e7d65be76d47e7a11083d8acce1
                • Instruction ID: ddcc8bb4d9fa2d62f213c836310acb20acc4cb3c9c20855b01ca0ee9d2ddaa52
                • Opcode Fuzzy Hash: dddcb6239b0a16dcbb0c8fd97c7be55cb0a60e7d65be76d47e7a11083d8acce1
                • Instruction Fuzzy Hash: E7D0C752F2574981DE04B76AF05631B6351EF917C4F801035B64D07756DE2CD1514B41
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                  • Part of subcall function 00007FF79B684CA0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF79B684CE0
                • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF79B6840FB
                  • Part of subcall function 00007FF79B684040: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF79B684051
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Concurrency::details::EmptyQueue::StructuredWork
                • String ID:
                • API String ID: 1865873047-0
                • Opcode ID: f37774654281c8bdc645617a37f63d8536dce6f5272bc5208fbc636b8a9692dd
                • Instruction ID: 347083ab06c9a05aab107a9c46b835e8c8cb296710c43931be2d5794d1a42820
                • Opcode Fuzzy Hash: f37774654281c8bdc645617a37f63d8536dce6f5272bc5208fbc636b8a9692dd
                • Instruction Fuzzy Hash: CBC01256E39645C1C954FB36F48101A9310AFD4780FD01034F94D13726DD2CD1504B00
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: allocator
                • String ID:
                • API String ID: 3447690668-0
                • Opcode ID: 2ddf837b2fd4f043fc677f1d91f4a863a929c26b1333d62811c8d6653f8f455e
                • Instruction ID: f119481f89afaa0aae1204da4ce68fb9a18750a89b538b226f28bf4cc649628e
                • Opcode Fuzzy Hash: 2ddf837b2fd4f043fc677f1d91f4a863a929c26b1333d62811c8d6653f8f455e
                • Instruction Fuzzy Hash: 2AC0C976A29B84C1CA04EB16F48100AB361F7C8BC0F809425EA8E03739DF28C1508B00
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                • API String ID: 808467561-2761157908
                • Opcode ID: 82f755afd101f3cb2dfab53015a034f3a0eed4cdc714f8c99bac1156be766b50
                • Instruction ID: 78ae57f6d0bab39fd3ecbd7f118b31b1b66f9abe6ee89dcaa563917bc2bac584
                • Opcode Fuzzy Hash: 82f755afd101f3cb2dfab53015a034f3a0eed4cdc714f8c99bac1156be766b50
                • Instruction Fuzzy Hash: A7B2B272A1C2A68BE7749E7CD440BFDB6B2FB44388F905135DA2957A94DB38B700CB50
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLastNameTranslate$CodePageValidValue
                • String ID: utf8
                • API String ID: 1791977518-905460609
                • Opcode ID: eb131596f1b14b4b836f3cc0225fc4747dc27e3e7f0beab0fd9d1ed5136da44f
                • Instruction ID: e16035bd62571b528ddcf890c4b7d924bac07df174717b4b9d97abbec91f1156
                • Opcode Fuzzy Hash: eb131596f1b14b4b836f3cc0225fc4747dc27e3e7f0beab0fd9d1ed5136da44f
                • Instruction Fuzzy Hash: C7916032A0C66A85E734BF39D4512B9B2B6FB84B80F884135DA6C476A5DF3CF655C320
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Value$Locale$CodeErrorInfoLastPageValid$DefaultEnumLocalesProcessSystemUser
                • String ID:
                • API String ID: 2591520935-0
                • Opcode ID: a92b9269274337801e98e946c205c01cb86a39927e0f7c7a83839a76ed5dde83
                • Instruction ID: 493fc85474a7c5354865c66a42e97c7ab4d46275603d2eaf01133babaeca52aa
                • Opcode Fuzzy Hash: a92b9269274337801e98e946c205c01cb86a39927e0f7c7a83839a76ed5dde83
                • Instruction Fuzzy Hash: 3B715D22B0862A89EB70EF79D4506BCB3B2FB84744F884035CA6D576A5DF3CB645C360
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                • String ID:
                • API String ID: 3140674995-0
                • Opcode ID: b5358bd913f69ae360bea432955710991b3a601bc6a2205d1f073bcf6e5ab646
                • Instruction ID: 2b97cd717e8d9d9e7ec23ea816b7a64fc1b56c15bc83f60821baa1cb870e761a
                • Opcode Fuzzy Hash: b5358bd913f69ae360bea432955710991b3a601bc6a2205d1f073bcf6e5ab646
                • Instruction Fuzzy Hash: DF313B72609B8586EB70EF64E8407E9B365FB84744F84403ADB5E47BA5DF38E648C720
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                • String ID:
                • API String ID: 1239891234-0
                • Opcode ID: 1a79fc079419d36b56b0bbd24e92281bbf232112b9e0b2d4c09d7ad671141b75
                • Instruction ID: 249c3faa444fe809d92f801b37974f1ac642674538fce8847ed0333d743ec8a8
                • Opcode Fuzzy Hash: 1a79fc079419d36b56b0bbd24e92281bbf232112b9e0b2d4c09d7ad671141b75
                • Instruction Fuzzy Hash: 51318232608B8585DB60DF39E8402ADB3A1FB88794F940135EAAD43BA5DF3CD655C750
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: FileFindFirst_invalid_parameter_noinfo
                • String ID:
                • API String ID: 2227656907-0
                • Opcode ID: 5c38ea9a5509fcdc4663ae3cb8802957dc7f718bf6fcff31919188c50b4add4d
                • Instruction ID: e915b5b1f6657b3773c4344368ed519c08f24a8e9eb4c7629793af04de2838bd
                • Opcode Fuzzy Hash: 5c38ea9a5509fcdc4663ae3cb8802957dc7f718bf6fcff31919188c50b4add4d
                • Instruction Fuzzy Hash: 32B1E322B1D6AA41EA70AB39D4006B9E372EB44BD4F945135EE6E07BA4DF3CF641C710
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: memcpy_s
                • String ID:
                • API String ID: 1502251526-3916222277
                • Opcode ID: d5921c5f5581713e7daa7186113356940e2354a9cdd6fd7f83da389ac929e130
                • Instruction ID: 7abafbaf7cafcd164a3d5556b89c7ee2ba3870d0942369f34123fe3a307eb1f0
                • Opcode Fuzzy Hash: d5921c5f5581713e7daa7186113356940e2354a9cdd6fd7f83da389ac929e130
                • Instruction Fuzzy Hash: 17C1F672B1868A87DB30DF29E444A6AF7AAF784B84F849135DB5A43754DB3CF901CB00
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                • String ID:
                • API String ID: 2933794660-0
                • Opcode ID: 084e4a76732f2657f1d36940c8afc242671387ad565effdeab054a2058e10f25
                • Instruction ID: fccbd3ba1fae96126200e021a1ef24e59831d7f9ff2c8c73aca7c9c7e811186c
                • Opcode Fuzzy Hash: 084e4a76732f2657f1d36940c8afc242671387ad565effdeab054a2058e10f25
                • Instruction Fuzzy Hash: 77115122B14F0589EB10DF74EC452B873A4FB59758F841E35DA6D82BA4DF38E2648350
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: InfoLocale$ErrorLastValue_invalid_parameter_noinfo
                • String ID:
                • API String ID: 1791019856-0
                • Opcode ID: 7ed6189d84d36b03f38b1f3d7035ac075f5fd44fa3265930c944fae75877c025
                • Instruction ID: 04fa15b3967a4b339c373b2b61d0d35fd4df7876a7f554a159ef2794e452ecc2
                • Opcode Fuzzy Hash: 7ed6189d84d36b03f38b1f3d7035ac075f5fd44fa3265930c944fae75877c025
                • Instruction Fuzzy Hash: 47619232A0C51A86EB34AF39D541279B3B2FB84B40F884139C7AD976A1DF3CF6518710
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: InfoLocale
                • String ID: GetLocaleInfoEx
                • API String ID: 2299586839-2904428671
                • Opcode ID: d7d37d6bcd24057aa8dc10f066f1a56d3106d93bb8a3f24b8ed1cbc75a9aeca6
                • Instruction ID: 1170a8964c3df8288d5c0ca89df562503cf71c15bfea69faba0ce49dc6c6b952
                • Opcode Fuzzy Hash: d7d37d6bcd24057aa8dc10f066f1a56d3106d93bb8a3f24b8ed1cbc75a9aeca6
                • Instruction Fuzzy Hash: 3F018421B0C65985E710AB6AB4000AAE272FF84BC0F98403ADF6D13B79CF3CF6418350
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: ExceptionRaise_clrfp
                • String ID:
                • API String ID: 15204871-0
                • Opcode ID: 99b704cce6049a0f559a0459c413f9dff37fcbde885caa417b9d6db511e68e2b
                • Instruction ID: 2b27ed5696472a061ee5ec68ab83d143189cb3019ce1a076d81442a3d75b555f
                • Opcode Fuzzy Hash: 99b704cce6049a0f559a0459c413f9dff37fcbde885caa417b9d6db511e68e2b
                • Instruction Fuzzy Hash: 88B14873614B988BEB25CF2EC482268BBB1F744F88F548821DA6D837B4CB39E451C710
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: e+000$gfff
                • API String ID: 0-3030954782
                • Opcode ID: f9d4a63f94475f789fce0c45e82bede8aca286cfe6509681c0ac5d3681ba1bdc
                • Instruction ID: 15d0b150aafedb2f1eeae1499504c1065725e3bc6d5cc7e50cbc6f09d86ebd15
                • Opcode Fuzzy Hash: f9d4a63f94475f789fce0c45e82bede8aca286cfe6509681c0ac5d3681ba1bdc
                • Instruction Fuzzy Hash: 6F517C62B2C2D956E7349F3A9800769F7A2E744B94F888231CB7847AE1DF3DE5458710
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Info
                • String ID:
                • API String ID: 1807457897-0
                • Opcode ID: dfd0a50875c4cef85abadcab840226feeeca6a9675c62a9fb7451038eed7a590
                • Instruction ID: 94188e45ff97f15e9dba124736701e92df824a0d5825e9a8bdfc8c2a5cd03356
                • Opcode Fuzzy Hash: dfd0a50875c4cef85abadcab840226feeeca6a9675c62a9fb7451038eed7a590
                • Instruction Fuzzy Hash: C512B022A18BC986E761DF3894446FDB7A5FB58748F859235EF9C43662DF38E280C710
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f9e43a50d3bdd8e7ebb95dc88d3ec97aa90cf3c25901acf41521008789465e22
                • Instruction ID: 4d8a4cb3470ad57cbc01ca3645ec2f3c1de9bbcd4c3d2851e69f6cfa4526ffee
                • Opcode Fuzzy Hash: f9e43a50d3bdd8e7ebb95dc88d3ec97aa90cf3c25901acf41521008789465e22
                • Instruction Fuzzy Hash: B6E1D132A08B9585E720EB65E4406FEB7B5F789788F814A35DE6D53792EF38E244C300
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: _get_daylight_invalid_parameter_noinfo
                • String ID:
                • API String ID: 474895018-0
                • Opcode ID: 8eb6e550cc7e0cd4b48f2ee55b2ef418c1ffd5a88efca818c2aed75d578382d4
                • Instruction ID: 2c4b35e5a651aa2bbbadd15f0f9cf84454ddd60bcd777551333d85ef591dd175
                • Opcode Fuzzy Hash: 8eb6e550cc7e0cd4b48f2ee55b2ef418c1ffd5a88efca818c2aed75d578382d4
                • Instruction Fuzzy Hash: B261FC21F1C57A45FBB0A97C4480379E5A3AF40760F950A35DABE876E1DF6CFA408720
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLastValue$InfoLocale
                • String ID:
                • API String ID: 673564084-0
                • Opcode ID: c5b4d3a84473f139566578233c90bdcdd0bf005133ad7741da6ed9b054105161
                • Instruction ID: 20f28d39a6d2aa3daf4f646fe7ff335dba5cb22950e8145fc23470530adec4d1
                • Opcode Fuzzy Hash: c5b4d3a84473f139566578233c90bdcdd0bf005133ad7741da6ed9b054105161
                • Instruction Fuzzy Hash: CC317531B0C69A46EB34AF39E4413B9B3A2FB88744F848139D66D832A5DF3CF6148750
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                  • Part of subcall function 00007FF79B6B0654: GetLastError.KERNEL32 ref: 00007FF79B6B0663
                  • Part of subcall function 00007FF79B6B0654: FlsGetValue.KERNEL32 ref: 00007FF79B6B0678
                  • Part of subcall function 00007FF79B6B0654: SetLastError.KERNEL32 ref: 00007FF79B6B0703
                • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF79B6BBC37,?,00000000,00000092,?,?,00000000,?,00007FF79B6AE321), ref: 00007FF79B6BB4EA
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLast$EnumLocalesSystemValue
                • String ID:
                • API String ID: 3029459697-0
                • Opcode ID: f7f39d67ffa33f48f58bcddfa027a397d18515c395a8a67a25ebda673ee2f182
                • Instruction ID: c852655fc1cab1955920980856da74fe0b9584a847b08285fa38dcea51668017
                • Opcode Fuzzy Hash: f7f39d67ffa33f48f58bcddfa027a397d18515c395a8a67a25ebda673ee2f182
                • Instruction Fuzzy Hash: 3711D867A0C6598AEB249F29D0405A8B7B1F790B90F884135C739433E4CB78E6D5C750
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                  • Part of subcall function 00007FF79B6B0654: GetLastError.KERNEL32 ref: 00007FF79B6B0663
                  • Part of subcall function 00007FF79B6B0654: FlsGetValue.KERNEL32 ref: 00007FF79B6B0678
                  • Part of subcall function 00007FF79B6B0654: SetLastError.KERNEL32 ref: 00007FF79B6B0703
                • GetLocaleInfoW.KERNEL32(?,?,?,00007FF79B6BB7B1), ref: 00007FF79B6BBA3F
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLast$InfoLocaleValue
                • String ID:
                • API String ID: 3796814847-0
                • Opcode ID: f49588eac29c2b779b9fe3fc66ccb2fa3b50b42980eb994b0aec1c477b0d4140
                • Instruction ID: 6d9de83cb1777dc79c9080316e4287b3bcfe85b0235a74a250ed6e621207704c
                • Opcode Fuzzy Hash: f49588eac29c2b779b9fe3fc66ccb2fa3b50b42980eb994b0aec1c477b0d4140
                • Instruction Fuzzy Hash: 2E110D22E1C1AA82E774673AD040679B2B2EB80764F984135DB7D076D5DF3DF681C750
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                  • Part of subcall function 00007FF79B6B0654: GetLastError.KERNEL32 ref: 00007FF79B6B0663
                  • Part of subcall function 00007FF79B6B0654: FlsGetValue.KERNEL32 ref: 00007FF79B6B0678
                  • Part of subcall function 00007FF79B6B0654: SetLastError.KERNEL32 ref: 00007FF79B6B0703
                • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF79B6BBBF3,?,00000000,00000092,?,?,00000000,?,00007FF79B6AE321), ref: 00007FF79B6BB59A
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLast$EnumLocalesSystemValue
                • String ID:
                • API String ID: 3029459697-0
                • Opcode ID: 339778d15c56457262cfab9b40913040583a1c135f972954ba309a67b04b9213
                • Instruction ID: 2edcfafc0a0ba89b3d48f965c63137abc67a2e602fb52c0b74a6a72d386c2a9e
                • Opcode Fuzzy Hash: 339778d15c56457262cfab9b40913040583a1c135f972954ba309a67b04b9213
                • Instruction Fuzzy Hash: EC01D663E1C29986E7206F29E440B79B6B2EB90B94F888231C739072E4CF78B580C711
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • EnumSystemLocalesW.KERNEL32(?,?,00000000,00007FF79B6B39B7,?,?,?,?,?,?,?,?,00000000,00007FF79B6BAA98), ref: 00007FF79B6B35F7
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: EnumLocalesSystem
                • String ID:
                • API String ID: 2099609381-0
                • Opcode ID: 757b4fe6c80cfde59382ba5f57a2e347169999488fd4108fe9045af6cf282805
                • Instruction ID: de89ef275dea73c190f255302327901bc18ec54a76b0abc13980e8bc0c96fd75
                • Opcode Fuzzy Hash: 757b4fe6c80cfde59382ba5f57a2e347169999488fd4108fe9045af6cf282805
                • Instruction Fuzzy Hash: 4EF01D72B08A4982E614EF29F8915A9B366FBD97C0FC49135DA6D83375DF3CE6608310
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: gfffffff
                • API String ID: 0-1523873471
                • Opcode ID: 8f086c989d9e1966b7b2e0c729a9f93fbdca5a9cefb2a34ac5fb31796afbf973
                • Instruction ID: b3d7a82e621e554b903ab82631b9a809426984c7897c830ca4e9d783358838ad
                • Opcode Fuzzy Hash: 8f086c989d9e1966b7b2e0c729a9f93fbdca5a9cefb2a34ac5fb31796afbf973
                • Instruction Fuzzy Hash: 4CA14762B2C3D986EB31DB3990007A9B7A2AB51784F448132DEAD477A5DB3DF601C711
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID: 0-3916222277
                • Opcode ID: b581c06487adb6821fd3532307d77ad6fb1feb934d69f5113f2eec4f6e1a2692
                • Instruction ID: ba380f856b4c857463bfa5f7489f21d9ff0e8e049efc10f0f773e0fc89423061
                • Opcode Fuzzy Hash: b581c06487adb6821fd3532307d77ad6fb1feb934d69f5113f2eec4f6e1a2692
                • Instruction Fuzzy Hash: 8DB18D72A1864985EB749F3D805423CBBA2F745F48FA81139CA6E073A5CF39FA41C724
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • GetLastError.KERNEL32 ref: 00007FF79B6B673D
                  • Part of subcall function 00007FF79B6B1490: HeapAlloc.KERNEL32(?,?,00000000,00007FF79B6B082E,?,?,?,00007FF79B6AC171,?,?,?,?,00007FF79B6B2DAE,?,?,00000000), ref: 00007FF79B6B14E5
                  • Part of subcall function 00007FF79B6B1508: RtlDeleteBoundaryDescriptor.NTDLL(?,?,00007FF79B6AF4FF,00007FF79B6B9ECE,?,?,?,00007FF79B6BA24B,?,?,00000000,00007FF79B6BA794,?,?,?,00007FF79B6BA6C7), ref: 00007FF79B6B151E
                  • Part of subcall function 00007FF79B6B1508: GetLastError.KERNEL32(?,?,00007FF79B6AF4FF,00007FF79B6B9ECE,?,?,?,00007FF79B6BA24B,?,?,00000000,00007FF79B6BA794,?,?,?,00007FF79B6BA6C7), ref: 00007FF79B6B1528
                  • Part of subcall function 00007FF79B6BE68C: _invalid_parameter_noinfo.LIBCMT ref: 00007FF79B6BE6BF
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLast$AllocBoundaryDeleteDescriptorHeap_invalid_parameter_noinfo
                • String ID:
                • API String ID: 4268216413-0
                • Opcode ID: 357807e072eff4bccbb5c79fd8ed6dad45483dd19cabbac22a43c86e06ba69f3
                • Instruction ID: 553380f320c47ab9d3291c74922b912d293d2f3f7ba75274aa02df0865928ecc
                • Opcode Fuzzy Hash: 357807e072eff4bccbb5c79fd8ed6dad45483dd19cabbac22a43c86e06ba69f3
                • Instruction Fuzzy Hash: 1B411D21B1D26B02FA30BE3A6511B7AEAA27F807C0F845535DE6D47795EF3CF6004620
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: HeapProcess
                • String ID:
                • API String ID: 54951025-0
                • Opcode ID: a3873e32751b7d92acfe498668a45f4b1cf06de3b0dc9d17ca8cf8c0d94d64c9
                • Instruction ID: 1e9c3f4f7b05b1c8bf7ff1c04a369788304ab970e506814e23880d0220e0bc9c
                • Opcode Fuzzy Hash: a3873e32751b7d92acfe498668a45f4b1cf06de3b0dc9d17ca8cf8c0d94d64c9
                • Instruction Fuzzy Hash: D5B09220E0BA0EC2FA187B696C82218A2AA7F88700FD84038C21C81330DE2C32B58720
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cafda4cc4359e46fe14edbdb732ee82d05df7ae96953a756e265bf7dd5589166
                • Instruction ID: 2867ca34f2f07169818fa21a8e5616d56e2799367547d2081ebaa0ca19cbec41
                • Opcode Fuzzy Hash: cafda4cc4359e46fe14edbdb732ee82d05df7ae96953a756e265bf7dd5589166
                • Instruction Fuzzy Hash: D6D1C662A0964A85EF78AF3D800027DB7A2EB45B48FD44135CE6D076E5CF39FA42C764
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLastNameTranslate$CodePageValidValue_invalid_parameter_noinfo
                • String ID:
                • API String ID: 4023145424-0
                • Opcode ID: 01e95bae6ae51a619dfb2a7e3763382180f4b37722150dcaaad517bf25d6cd09
                • Instruction ID: 1a1f8eea0b31f42d8eb476aa5e56027bfc25b17d02ef2dfab56dc06cbe19d922
                • Opcode Fuzzy Hash: 01e95bae6ae51a619dfb2a7e3763382180f4b37722150dcaaad517bf25d6cd09
                • Instruction Fuzzy Hash: 45C1EC26A0865945EF70AF7994103BAA7A6FF94788F904035DE9D476A9EF3CF600C310
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLastValue$CurrentFeatureInfoLocalePresentProcessProcessor
                • String ID:
                • API String ID: 2071376764-0
                • Opcode ID: 6c3a38ab69e0bb5b736044c92537bcbd4ff9549fa2a02ed8fa3822648b77318f
                • Instruction ID: 2c1f3af0b4b374a11827c4db0c33d2d552552d25b1c6fb410d281753a65e9942
                • Opcode Fuzzy Hash: 6c3a38ab69e0bb5b736044c92537bcbd4ff9549fa2a02ed8fa3822648b77318f
                • Instruction Fuzzy Hash: 38B1D332A1C66E42EB74AF39D4116B9B3B2EB80B48F804135DA6D436E5DF3CF6418360
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7c56c409db95e40e7d7ecbacec78d5be4ba7e0d68151b92e416d935a3d83daf2
                • Instruction ID: ee30c89329a1a83070fe57db454663822d1ab7b3cc26c9722295ad18843f249f
                • Opcode Fuzzy Hash: 7c56c409db95e40e7d7ecbacec78d5be4ba7e0d68151b92e416d935a3d83daf2
                • Instruction Fuzzy Hash: 8781F472A0C79545E774DB6DA48036AFAE2FB45794F804235DAAD43BA9CF3CF2008B10
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d6ef73793ea1788ae08d57b95515db7d43b127d7364744ae73512ded182e4f5a
                • Instruction ID: abd9a62a183c9069f1b98d62c4efa49cd0a029f7e28c7c3b3943672654c33be9
                • Opcode Fuzzy Hash: d6ef73793ea1788ae08d57b95515db7d43b127d7364744ae73512ded182e4f5a
                • Instruction Fuzzy Hash: 5F41A46280964E04FD759D3C051C6B4A682DF53BA0DF862B4DEB9173F2D90DB786C130
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3a595148431bbcdcf83b607cc77e310f39f673ee297fcdb257f36cc52ab65d25
                • Instruction ID: d894eb1870157e2be8c5339cc36c30b11222594f24a66ef359db4a7d406bae80
                • Opcode Fuzzy Hash: 3a595148431bbcdcf83b607cc77e310f39f673ee297fcdb257f36cc52ab65d25
                • Instruction Fuzzy Hash: A951A572A0A55982EB39AF3CC05423CA7A2EB55B58F540135CF1E177A9CF28FD41C7A0
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 91b964efca1e2eb7698e73cc685d1e97963d36816d76c92d765d6ef83a4a4a60
                • Instruction ID: 1c9ce36ec4a0cdf88425b4d4690aabfd64e4c582cc3642dd5aad80931b5d6237
                • Opcode Fuzzy Hash: 91b964efca1e2eb7698e73cc685d1e97963d36816d76c92d765d6ef83a4a4a60
                • Instruction Fuzzy Hash: BF51B6B2A0851986EB385F3CC05433CA7A2EB55B58F941135CE1A177E4CB28FE41C7A0
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d0b2235312e67dbb0726dbc44dee1bd6196b8167b62b30abdfcd639f482643e9
                • Instruction ID: a60f1ec341a358c93accfbd5db87de664395da8ca0f37cb56f4eb3f940f15154
                • Opcode Fuzzy Hash: d0b2235312e67dbb0726dbc44dee1bd6196b8167b62b30abdfcd639f482643e9
                • Instruction Fuzzy Hash: 8B51A172A0865982EB389F3CC15423DA7A2EB51B58F940139DE1D177A8CF29FE41C7A0
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: BoundaryDeleteDescriptorErrorLast
                • String ID:
                • API String ID: 2050971199-0
                • Opcode ID: fff7a92f82c839e3d42ed29d8db71ba1496b4b20baea46e428b784251f7925ed
                • Instruction ID: 7ccbbf34a1244bcab28800847e1d44a429e5bf4866fa59a3a7dabf55a7dc43b6
                • Opcode Fuzzy Hash: fff7a92f82c839e3d42ed29d8db71ba1496b4b20baea46e428b784251f7925ed
                • Instruction Fuzzy Hash: 0E41E562714A5842EF54DF3ED9141A9B3A2FB48FD4B899036DE1D87B68DF3CE1028300
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6ccdffceeb283e4b1ebdd980531a597dab5eda47f7a3a833c49eca6639b98681
                • Instruction ID: 8b1778481a1a98f280079d32d7ed3d4bb77a42b8c38036c82ef429a052e29595
                • Opcode Fuzzy Hash: 6ccdffceeb283e4b1ebdd980531a597dab5eda47f7a3a833c49eca6639b98681
                • Instruction Fuzzy Hash: C9F06271B192AD9ADBA49F3CAC42629B7D5E7483C0FD08039D69D83B14DA3CA1609F14
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 88bbc80252497e79cdb19b232a93369e66e5e234d45eaea7d0804f360d1bcbb1
                • Instruction ID: 2d13e33b1a3b221a1bcf2d038b1ecc6d12134262943b0685babe021c43701aa0
                • Opcode Fuzzy Hash: 88bbc80252497e79cdb19b232a93369e66e5e234d45eaea7d0804f360d1bcbb1
                • Instruction Fuzzy Hash: E7A00126A49C4AD0EAA4AB28B851270A232BB52340B900136D12D510B4AE2CB601C264
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Mtx_guardMtx_guard::~_$AddressConcurrency::details::EmptyLibraryLoadProcQueue::StructuredWork$Char_traits
                • String ID: Error$Error
                • API String ID: 1088619557-1414458090
                • Opcode ID: ec8d6302f261d309f4299ac9456d186aa4b39d272b74722f0c1964e525828d94
                • Instruction ID: 03840f241d3f015f0573b59344ed4dd85904374ebd3be332053c9937edb91168
                • Opcode Fuzzy Hash: ec8d6302f261d309f4299ac9456d186aa4b39d272b74722f0c1964e525828d94
                • Instruction Fuzzy Hash: B7B1D632619A85C1D670EB64F4953ABF3A1FBD4780F905035EA9E83A69DF3CE644CB10
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Mtx_guardMtx_guard::~_$AddressConcurrency::details::EmptyLibraryLoadProcQueue::StructuredWork$Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_
                • String ID:
                • API String ID: 4196786241-0
                • Opcode ID: 05994b014fa11f594c48e7b7aa61f874af9dd460ce5b30cba544352165943464
                • Instruction ID: b6dd3c75eceef90ccf4e22ad01bea8c8520e88ce7ad9acdd7939e217d244cf1e
                • Opcode Fuzzy Hash: 05994b014fa11f594c48e7b7aa61f874af9dd460ce5b30cba544352165943464
                • Instruction Fuzzy Hash: 9951E632609A8586D670EB24F4513ABB3B1FBC5780F904035E6DD87A69DF3CE548CB50
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID: 0$f$p$p
                • API String ID: 3215553584-1202675169
                • Opcode ID: 773a535c55f366cc41a427c813aca59811636e06a27f0e29cd4666540f9e990d
                • Instruction ID: b2c4c94f7153e900efe99470e95af9cd009e5d1d19c42b5c5d1e0448dadcc407
                • Opcode Fuzzy Hash: 773a535c55f366cc41a427c813aca59811636e06a27f0e29cd4666540f9e990d
                • Instruction Fuzzy Hash: 44129E21E0D19B86FF347E2DD054679A6A3FB40B54FD44031E6A986AE4DF3CF6809B21
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                • String ID: csm$csm$csm
                • API String ID: 849930591-393685449
                • Opcode ID: 728d75dc0088fe37cf8d49e7d9c4ad9bc01d2b4a579a015a9931ee36bdc83676
                • Instruction ID: cc6767d48ec1d6fd437b8c0d885c8ee601c03156a530a1b5ed57771731cac752
                • Opcode Fuzzy Hash: 728d75dc0088fe37cf8d49e7d9c4ad9bc01d2b4a579a015a9931ee36bdc83676
                • Instruction Fuzzy Hash: B2D17072A087498AEF20AF7994402ADB7A2FB45788F900139DE5D57BA5DF38F690C710
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • FreeLibrary.KERNEL32(?,?,?,00007FF79B6B3DD8,?,?,?,?,00007FF79B6AB43D,?,?,?,?,00007FF79B69EF0C), ref: 00007FF79B6B37A3
                • GetProcAddress.KERNEL32(?,?,?,00007FF79B6B3DD8,?,?,?,?,00007FF79B6AB43D,?,?,?,?,00007FF79B69EF0C), ref: 00007FF79B6B37AF
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: AddressFreeLibraryProc
                • String ID: api-ms-$ext-ms-
                • API String ID: 3013587201-537541572
                • Opcode ID: 047464f5df616776ffe5628bc01d6b0ef5be83e89634b9ca503654e3c52ebe30
                • Instruction ID: f45ff4f3f16665f9c99f4912605c54b6cc2604bf4a8425dde1db29e061f31b1c
                • Opcode Fuzzy Hash: 047464f5df616776ffe5628bc01d6b0ef5be83e89634b9ca503654e3c52ebe30
                • Instruction Fuzzy Hash: DF41C66171D61A81EA22EB2EA804175A3B3BF45BD0F88453ADD2D877A4EF3CF5058320
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF79B6A59C3,?,?,?,00007FF79B6A2412,?,?,?,00007FF79B6A23CD), ref: 00007FF79B6A5841
                • GetLastError.KERNEL32(?,?,00000000,00007FF79B6A59C3,?,?,?,00007FF79B6A2412,?,?,?,00007FF79B6A23CD), ref: 00007FF79B6A584F
                • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF79B6A59C3,?,?,?,00007FF79B6A2412,?,?,?,00007FF79B6A23CD), ref: 00007FF79B6A5879
                • FreeLibrary.KERNEL32(?,?,00000000,00007FF79B6A59C3,?,?,?,00007FF79B6A2412,?,?,?,00007FF79B6A23CD), ref: 00007FF79B6A58E7
                • GetProcAddress.KERNEL32(?,?,00000000,00007FF79B6A59C3,?,?,?,00007FF79B6A2412,?,?,?,00007FF79B6A23CD), ref: 00007FF79B6A58F3
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Library$Load$AddressErrorFreeLastProc
                • String ID: api-ms-
                • API String ID: 2559590344-2084034818
                • Opcode ID: 8e312c8d43453ea2021264b2ae40323e594c045a5e8a41a3551f8d99fa89a512
                • Instruction ID: 440fa04502882fd0a40faa55eb0d06b5c6aa34f544a28aab8f110136d0abb088
                • Opcode Fuzzy Hash: 8e312c8d43453ea2021264b2ae40323e594c045a5e8a41a3551f8d99fa89a512
                • Instruction Fuzzy Hash: 2631F421A1AA5685EE31FF2AA400575F3A5BF44BA0F990534DE3D073A0EF3CF6448320
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Value$ErrorLast
                • String ID:
                • API String ID: 2506987500-0
                • Opcode ID: b2bfb5fcd3a5c36c06c9de2036b9949761cc20d48c3b6da3598d7e5d60aa94df
                • Instruction ID: df1e089409589de5452085c9d411f36ae9933de2a47ad55ccc195a8280719fd5
                • Opcode Fuzzy Hash: b2bfb5fcd3a5c36c06c9de2036b9949761cc20d48c3b6da3598d7e5d60aa94df
                • Instruction Fuzzy Hash: E4218E20B1C26E42F638733A5545039D663AF84BE0FE00639E97E466F6EF2CB6014620
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                • String ID: CONOUT$
                • API String ID: 3230265001-3130406586
                • Opcode ID: 8587a55708eea3177b14af9c31c8e1564f1319dcca659dd1128ad41843dc4252
                • Instruction ID: 0ac20c71447dcf2a34198200508f5056d1220e07f68b064f1ef0cd9d63ca4583
                • Opcode Fuzzy Hash: 8587a55708eea3177b14af9c31c8e1564f1319dcca659dd1128ad41843dc4252
                • Instruction Fuzzy Hash: 3211BB22718A4586E3609B26F844725A261FB88FE4FC00234DA6D837B4DF3CE5548710
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: ByteCharMultiStringWide
                • String ID:
                • API String ID: 2829165498-0
                • Opcode ID: 4e00136b579caa0542b5a09c324aa03d6566cf650b1ddfed76135ff8a1c8475f
                • Instruction ID: 0421eb9e09de6dba51bb58a651afabf6c83d1bf5b92920aa8b8ff3ea32b01682
                • Opcode Fuzzy Hash: 4e00136b579caa0542b5a09c324aa03d6566cf650b1ddfed76135ff8a1c8475f
                • Instruction Fuzzy Hash: 14818272A0874586FF709F7994403A9A6A2FB44BA8F940235EA6D17BE4DF3CE9058710
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                • String ID: csm$csm$csm
                • API String ID: 3523768491-393685449
                • Opcode ID: a8f057a3a1ca200dc4cc962c07192f9be866b965a20a1c6cbd6fb66a1c815b02
                • Instruction ID: 34e27e9fcba2b6d04614393fd7f150d6dae858469bb53c3a6dac652356d41665
                • Opcode Fuzzy Hash: a8f057a3a1ca200dc4cc962c07192f9be866b965a20a1c6cbd6fb66a1c815b02
                • Instruction Fuzzy Hash: 4EE1A4729087968AEB20EF7CD4402ADB7A1FB45B48F500139DE6D476A5DF38F685C710
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • GetLastError.KERNEL32(?,?,?,00007FF79B6AC171,?,?,?,?,00007FF79B6B2DAE,?,?,00000000,00007FF79B6BBE13,?,?,?), ref: 00007FF79B6B07DB
                • FlsSetValue.KERNEL32(?,?,?,00007FF79B6AC171,?,?,?,?,00007FF79B6B2DAE,?,?,00000000,00007FF79B6BBE13,?,?,?), ref: 00007FF79B6B0811
                • FlsSetValue.KERNEL32(?,?,?,00007FF79B6AC171,?,?,?,?,00007FF79B6B2DAE,?,?,00000000,00007FF79B6BBE13,?,?,?), ref: 00007FF79B6B083E
                • FlsSetValue.KERNEL32(?,?,?,00007FF79B6AC171,?,?,?,?,00007FF79B6B2DAE,?,?,00000000,00007FF79B6BBE13,?,?,?), ref: 00007FF79B6B084F
                • FlsSetValue.KERNEL32(?,?,?,00007FF79B6AC171,?,?,?,?,00007FF79B6B2DAE,?,?,00000000,00007FF79B6BBE13,?,?,?), ref: 00007FF79B6B0860
                • SetLastError.KERNEL32(?,?,?,00007FF79B6AC171,?,?,?,?,00007FF79B6B2DAE,?,?,00000000,00007FF79B6BBE13,?,?,?), ref: 00007FF79B6B087B
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Value$ErrorLast
                • String ID:
                • API String ID: 2506987500-0
                • Opcode ID: 7e8c30e9354542cbe79d0bc9e0d0a4c2fd70cb469dbca5be83861bfbd77bfdea
                • Instruction ID: 01d3be95e3d4bc328be7e44bae656c8c3c588f71caa9491f602633e5ca9a4edc
                • Opcode Fuzzy Hash: 7e8c30e9354542cbe79d0bc9e0d0a4c2fd70cb469dbca5be83861bfbd77bfdea
                • Instruction Fuzzy Hash: E0115E21F0C26E41FA74B33A55560799663AF84BE0FD04635E93E467F6EF2CB6414260
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: AddressFreeHandleLibraryModuleProc
                • String ID: CorExitProcess$mscoree.dll
                • API String ID: 4061214504-1276376045
                • Opcode ID: ae0e948c3ef3a91284f157399034a7257a7a1cdffda203b2172c5dc8da6111e0
                • Instruction ID: de539bd257947ad60b202189fdd0a8b0e82a8790fb08566d795e076dc4c45fbf
                • Opcode Fuzzy Hash: ae0e948c3ef3a91284f157399034a7257a7a1cdffda203b2172c5dc8da6111e0
                • Instruction Fuzzy Hash: 8DF04462B1960A81EF34AB3CA845379D331AF95761F940639CA7D455F4CF2DF244C720
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: AdjustPointer
                • String ID:
                • API String ID: 1740715915-0
                • Opcode ID: ab877758123a7b65edb3f3fe19a4eb1901f71257e9a8453bdff0859d2c825876
                • Instruction ID: 0a9464fb14a47348b8326ab1da4a253d0e5f2e5818e1040f465e1f183a17e149
                • Opcode Fuzzy Hash: ab877758123a7b65edb3f3fe19a4eb1901f71257e9a8453bdff0859d2c825876
                • Instruction Fuzzy Hash: 52B1F721E4A64E81EE75BFBA8280238E292AF54F84F854435DF6D077B5DE2CF641C320
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: fpos
                • String ID:
                • API String ID: 1083263101-0
                • Opcode ID: 210a41bb767c91f51d27e2dc9ffdf7c97377ca66bc1c9f973ee7a7c34e252309
                • Instruction ID: 41d6e70b63b65308794b22114ab392ce0bce0071ba0fc14467135fee3590c0ec
                • Opcode Fuzzy Hash: 210a41bb767c91f51d27e2dc9ffdf7c97377ca66bc1c9f973ee7a7c34e252309
                • Instruction Fuzzy Hash: 54A10C2260CA89C6DB70EA29E45136AB7A1F7C4794F540135EAED87BA9CF2CE544CB10
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: fpos
                • String ID:
                • API String ID: 1083263101-0
                • Opcode ID: 67e421a88a8a972b26aad812bceaf7979716209af9ff9d5486616146d9a81552
                • Instruction ID: f7ff77ab67779b5c5ae8713a5a5d808a78eeea94b4e62ea6933b9997c3dd1d19
                • Opcode Fuzzy Hash: 67e421a88a8a972b26aad812bceaf7979716209af9ff9d5486616146d9a81552
                • Instruction Fuzzy Hash: 46A13C3260CB8985DA70AB39E44036AA7A1F785794F540275EAED87BA9CF2CF544CB10
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: _set_statfp
                • String ID:
                • API String ID: 1156100317-0
                • Opcode ID: 196c45f451b4277e2a9120a46c7a31ea9095affa2afe910ec30386b6fd3bd0b8
                • Instruction ID: c4a21dacbb13cdb33a7a83f4a154bb4cdbeff0bf8c1bdf28c679d062fb61e352
                • Opcode Fuzzy Hash: 196c45f451b4277e2a9120a46c7a31ea9095affa2afe910ec30386b6fd3bd0b8
                • Instruction Fuzzy Hash: 54812A2290CA5E45F332AB3EA45037AEA72BF45B54F444235EA6E525F1DF3CF7818610
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_taskGetfacetstd::locale::_
                • String ID:
                • API String ID: 1842055293-0
                • Opcode ID: c3c991d3da80d3aa3d5f7835c4a835a239d4e11fd58dc674cfce145c7f1caa37
                • Instruction ID: 8f8b4f35f529d9301fcd39bceea9c7a79c486e84c1ab54fa0583c23fecf654f4
                • Opcode Fuzzy Hash: c3c991d3da80d3aa3d5f7835c4a835a239d4e11fd58dc674cfce145c7f1caa37
                • Instruction Fuzzy Hash: 72310F2251DA49C1DA20EB39E49126AF361FBC57A4F901132E79D43BB9DF3CE640CB50
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_taskGetfacetstd::locale::_
                • String ID:
                • API String ID: 1842055293-0
                • Opcode ID: addde69454c00c21a563ee40dcac23e195bb809af36f0c40717e887cfbdd24ee
                • Instruction ID: 784be508d95b943e6a1860131e7fe1d343534d41b6b09d2395218367b406708e
                • Opcode Fuzzy Hash: addde69454c00c21a563ee40dcac23e195bb809af36f0c40717e887cfbdd24ee
                • Instruction Fuzzy Hash: 4F31102251DA4981EA20EB39E48126EF361FBC5794F901132E7ED43BB9DE3CE645CB10
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_taskGetfacetstd::locale::_
                • String ID:
                • API String ID: 1842055293-0
                • Opcode ID: 2022660945104bbb6d78c2eb5fab3c978111d1aa5400eed9739bb0b0e1ea20de
                • Instruction ID: f26add3e4950d0db07840e19a0e5298358feb4cce3a3e4c0c2b9fb2bb325fdf2
                • Opcode Fuzzy Hash: 2022660945104bbb6d78c2eb5fab3c978111d1aa5400eed9739bb0b0e1ea20de
                • Instruction Fuzzy Hash: FA31102251CA49C1DA20EB29E48116AF3B1FBC5794F900531E6ED43BB9DE3CE640CB10
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_taskGetfacetstd::locale::_
                • String ID:
                • API String ID: 1842055293-0
                • Opcode ID: b8f9bc9075e69c34024d9e7ab59a74e6b9f719de6351ea86380f56c64e04a2cb
                • Instruction ID: fe4f81f959cc8bac0471f3a4a400defc57d15bc51ba77856f6b37b4d62fe7351
                • Opcode Fuzzy Hash: b8f9bc9075e69c34024d9e7ab59a74e6b9f719de6351ea86380f56c64e04a2cb
                • Instruction Fuzzy Hash: 9031DF2261DA49C1DA20EB29F48126AF3B1FBC5794F901131E6AD43BB9DE3CE655CB10
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_taskGetfacetstd::locale::_
                • String ID:
                • API String ID: 1842055293-0
                • Opcode ID: 5a50714b4285a8421bded6926ccd8cf4195c43596d2b92f53aba14b89ac133c8
                • Instruction ID: 315bb9ba2ef787557acaa972f1c2c30a279efaf0a6d43d589c45b83ceb66e952
                • Opcode Fuzzy Hash: 5a50714b4285a8421bded6926ccd8cf4195c43596d2b92f53aba14b89ac133c8
                • Instruction Fuzzy Hash: 1831102251DA49C1DA30FB29E48116AF3B1FBC5794F901131E69D43BB9DE3CE640CB10
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_taskGetfacetstd::locale::_
                • String ID:
                • API String ID: 1842055293-0
                • Opcode ID: 1b42cf0c53a4edc4f89de812021f69aafdc7d3d90c1ee0e52e3000078786eec3
                • Instruction ID: 51105fd2a49b6c9e9eb0fca7598c19f60422cf7e3d4a92e6faf51b1f4283624e
                • Opcode Fuzzy Hash: 1b42cf0c53a4edc4f89de812021f69aafdc7d3d90c1ee0e52e3000078786eec3
                • Instruction Fuzzy Hash: E731F02651DA89C1DA20EB39E48116AF361FBC5794F900131E6DD47BB9DE3CE650CB10
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: _set_statfp
                • String ID:
                • API String ID: 1156100317-0
                • Opcode ID: b5f862fb55466f104c7638c26c27eae1ccad5020b215a080a91550ad010d465e
                • Instruction ID: ec067800d9f6a0dd4c7c58eaa5007477a2d8b8d2620e06a3e5c1b49da987407c
                • Opcode Fuzzy Hash: b5f862fb55466f104c7638c26c27eae1ccad5020b215a080a91550ad010d465e
                • Instruction Fuzzy Hash: E7113037E9CA1E11F778313CE44537A98536F5CB60E980635E77E462F68F2C7A808220
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • FlsGetValue.KERNEL32(?,?,?,00007FF79B6A6C5F,?,?,00000000,00007FF79B6A6EFA,?,?,?,?,?,00007FF79B6A6E86), ref: 00007FF79B6B08B3
                • FlsSetValue.KERNEL32(?,?,?,00007FF79B6A6C5F,?,?,00000000,00007FF79B6A6EFA,?,?,?,?,?,00007FF79B6A6E86), ref: 00007FF79B6B08D2
                • FlsSetValue.KERNEL32(?,?,?,00007FF79B6A6C5F,?,?,00000000,00007FF79B6A6EFA,?,?,?,?,?,00007FF79B6A6E86), ref: 00007FF79B6B08FA
                • FlsSetValue.KERNEL32(?,?,?,00007FF79B6A6C5F,?,?,00000000,00007FF79B6A6EFA,?,?,?,?,?,00007FF79B6A6E86), ref: 00007FF79B6B090B
                • FlsSetValue.KERNEL32(?,?,?,00007FF79B6A6C5F,?,?,00000000,00007FF79B6A6EFA,?,?,?,?,?,00007FF79B6A6E86), ref: 00007FF79B6B091C
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Value
                • String ID:
                • API String ID: 3702945584-0
                • Opcode ID: 5deca5eac94f812c7b2f5d81fbdd84cb3d17e6f2d2d10069c0c86e7aaa87cf2f
                • Instruction ID: a1a357a06f4355f43c0d637b493bdba75d29e38ff6efa5536909b7089f8bc97d
                • Opcode Fuzzy Hash: 5deca5eac94f812c7b2f5d81fbdd84cb3d17e6f2d2d10069c0c86e7aaa87cf2f
                • Instruction Fuzzy Hash: D1118E20B0C26E41FA78733A59520799263AF847E0ED41335EA7D467F6EF2CB6028220
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Value
                • String ID:
                • API String ID: 3702945584-0
                • Opcode ID: 7efd8653ae19a9cf38fb5d4159e63999d378fed53380335064c43358476839a1
                • Instruction ID: b141d6dc9c1954d36ab433a11f53fdb5f45065c1f98d2469b44e939f5010e944
                • Opcode Fuzzy Hash: 7efd8653ae19a9cf38fb5d4159e63999d378fed53380335064c43358476839a1
                • Instruction Fuzzy Hash: C3111F14A1D22F41F978B23E4852579D6639F80BB4FE40735D93E462F2EF2CB6414631
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Mpunct$std::ios_base::width
                • String ID: @
                • API String ID: 1355946870-2766056989
                • Opcode ID: ca4c29e8be680b08b5851c169f227b136de850686db6cafb472977872d27b432
                • Instruction ID: 5990622ab665fbd6bee33ece60b165e58237f28a506a395bf1842684b35e9a02
                • Opcode Fuzzy Hash: ca4c29e8be680b08b5851c169f227b136de850686db6cafb472977872d27b432
                • Instruction Fuzzy Hash: DE121B32609AC985DAB09B29E4943EBB7A2F7C8780F844136DADD43B69DF7CD545CB00
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Mpunct$std::ios_base::width
                • String ID: @
                • API String ID: 1355946870-2766056989
                • Opcode ID: 136dc350252e857673773019ee067f414da1e52d33a7f581e72bf4049b58502f
                • Instruction ID: b6997714279f43dab89d2b7aba7ad273481d78f16a0ab07466e1d1a1c7403e01
                • Opcode Fuzzy Hash: 136dc350252e857673773019ee067f414da1e52d33a7f581e72bf4049b58502f
                • Instruction Fuzzy Hash: 43122A3260DAC985DA709B29E4943EBA7A2F7C9780F804136DADD43BA9DF3CD545CB10
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID: UTF-16LEUNICODE$UTF-8$ccs
                • API String ID: 3215553584-1196891531
                • Opcode ID: f8a60f621e9d62918c1b0c9ff66e95f198e9d7883b0b10407145d6e42a3038be
                • Instruction ID: 3b09b090010e965b01d83ac3a77345e81be9ec9a4c8cbddb15e8c787177c5758
                • Opcode Fuzzy Hash: f8a60f621e9d62918c1b0c9ff66e95f198e9d7883b0b10407145d6e42a3038be
                • Instruction Fuzzy Hash: 6D81B272E0C22A85FB756E3D8150238EEB7EB10B48FD58035DA2D572B5DB2DFA019721
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: CallEncodePointerTranslator
                • String ID: MOC$RCC
                • API String ID: 3544855599-2084237596
                • Opcode ID: 71532a6ca70a8dff707580f1b2782121478fe4033101b9e0ef0ef60e58905a98
                • Instruction ID: 5807e0f8384affb80ea6c2c0b848b0b5459b2294a6e2936e998aba81822ae4c4
                • Opcode Fuzzy Hash: 71532a6ca70a8dff707580f1b2782121478fe4033101b9e0ef0ef60e58905a98
                • Instruction Fuzzy Hash: BE91D373A087858AEB20EF78E8402ACBBA1FB45788F504139EE5D17765DF38E255C700
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                • String ID: csm
                • API String ID: 2395640692-1018135373
                • Opcode ID: 00a95274109d02e15a1a6456a7f8533ea68b7d96a90b55eb8b02915df4fd7474
                • Instruction ID: af584d0b99ad91de01e2f0f1160e5ab34a52270ce952ad25bdf326f5af7b3aff
                • Opcode Fuzzy Hash: 00a95274109d02e15a1a6456a7f8533ea68b7d96a90b55eb8b02915df4fd7474
                • Instruction Fuzzy Hash: 4151C332B196068ADF24EF69D154A78B792FB40B84F908131DA6A47768DF7CFA41C720
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: CallEncodePointerTranslator
                • String ID: MOC$RCC
                • API String ID: 3544855599-2084237596
                • Opcode ID: 580b4202a3303209c3066a7ab7e3f64a3b30df3f0ea80339735e11259e7d8dc8
                • Instruction ID: 836f82b1ba0e8df2b9fee3bba4be1848437d99f79ee2f1be16f323460cb2ee02
                • Opcode Fuzzy Hash: 580b4202a3303209c3066a7ab7e3f64a3b30df3f0ea80339735e11259e7d8dc8
                • Instruction Fuzzy Hash: 3C619732908BC981DB70AF29E4403A9F7A1FB85784F444229EBAD17765DF3CE294CB10
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                • String ID: csm$csm
                • API String ID: 3896166516-3733052814
                • Opcode ID: fcf4632694802ac27db0e388c1c55295dc68fcd7e5bdb980f347f531c5112853
                • Instruction ID: 375ac9e7a326ac39a1234445984993c67675bcf46a5b0b405cc6a0c78b41ee51
                • Opcode Fuzzy Hash: fcf4632694802ac27db0e388c1c55295dc68fcd7e5bdb980f347f531c5112853
                • Instruction Fuzzy Hash: CA51A03390824A86EE74AF399940378B6A2FB55B84F844139DA6C47BA5CF3CF691C711
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: FileWrite$ConsoleErrorLastOutput
                • String ID:
                • API String ID: 2718003287-0
                • Opcode ID: a2b6278da23c88ae1fc66658aa32e245b4b19657e0fd36f498274d66f45ad1c4
                • Instruction ID: 74fc06d79d95615919fd622a8eceacd1790592b068d49e5312e81d34b271c72a
                • Opcode Fuzzy Hash: a2b6278da23c88ae1fc66658aa32e245b4b19657e0fd36f498274d66f45ad1c4
                • Instruction Fuzzy Hash: 8FD10523B08A9589E720EF79D4801ACB772F744798B50423ADF6D57BA9DF38E506C310
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • GetConsoleMode.KERNEL32(?,?,?,00000000,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00007FF79B6C0875,?,?,?), ref: 00007FF79B6B5093
                • GetLastError.KERNEL32(?,?,?,00000000,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00007FF79B6C0875,?,?,?), ref: 00007FF79B6B511D
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: ConsoleErrorLastMode
                • String ID:
                • API String ID: 953036326-0
                • Opcode ID: a37693c3b12b9747fb7d67c5c0fd7e9a6a7df0157cc6ba7106be3c1421e0e978
                • Instruction ID: 64f0f0d47205409232b670dc2b36053dfce20c4c1885c86cfdb15d5755fd2792
                • Opcode Fuzzy Hash: a37693c3b12b9747fb7d67c5c0fd7e9a6a7df0157cc6ba7106be3c1421e0e978
                • Instruction Fuzzy Hash: D891D732A1C66A45FB70EB7994606FCA7B2BB44788F840135DE1E57AA4DF38F641C720
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF79B696374
                • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF79B696535
                • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF79B69654A
                  • Part of subcall function 00007FF79B68E380: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF79B68E39D
                  • Part of subcall function 00007FF79B68E380: _Max_value.LIBCPMTD ref: 00007FF79B68E3C2
                  • Part of subcall function 00007FF79B68E380: _Min_value.LIBCPMTD ref: 00007FF79B68E3F0
                • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF79B69668B
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Concurrency::details::EmptyQueue::StructuredWork$Max_valueMin_value
                • String ID:
                • API String ID: 348937374-0
                • Opcode ID: f2eb271ba1ca906c49f3459ada87329d83f5c2bba748eaeb7354eb8d1df20d60
                • Instruction ID: a33af2a67954d23076db3579c4542ab6f9b9dc497910012b33f69627e85d046f
                • Opcode Fuzzy Hash: f2eb271ba1ca906c49f3459ada87329d83f5c2bba748eaeb7354eb8d1df20d60
                • Instruction Fuzzy Hash: 0BB10D3661DBC981DA70EB69F4503AAE7A1F7C9B80F404036EADD83B69DF2CD1408B50
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Concurrency::details::Decorator::getEmptyQueue::StructuredTableTypeWorkstd::ios_base::width
                • String ID:
                • API String ID: 2020207099-0
                • Opcode ID: fc66b0e3c582bd78af8f6285315b401cdef84e6de88315bdeb258068e90d44d4
                • Instruction ID: 75a1f56f77f9bb47ba364ca366b3da84db3cb3e0d5a81b946e33bbd294322b08
                • Opcode Fuzzy Hash: fc66b0e3c582bd78af8f6285315b401cdef84e6de88315bdeb258068e90d44d4
                • Instruction Fuzzy Hash: 4291CB32619AC985EA71EB25E4503EBB761F7C8780F800036DADD43BA9DF6CE644CB50
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Concurrency::details::Decorator::getEmptyQueue::StructuredTableTypeWorkstd::ios_base::width
                • String ID:
                • API String ID: 2020207099-0
                • Opcode ID: 71cfc4fea9f4bdb9fc84dc46e810e22f6b7388e63e7c52e0431f18ea6e65f398
                • Instruction ID: 773158d85a2e38cd13261d4c9fe787dfb763c3c969741037e79f783d1037dca4
                • Opcode Fuzzy Hash: 71cfc4fea9f4bdb9fc84dc46e810e22f6b7388e63e7c52e0431f18ea6e65f398
                • Instruction Fuzzy Hash: 4C91A932619AC985EA71AB25E4507EBA361F7C8780F800036DA9D43BA9DF7CE544CB50
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: _invalid_parameter_noinfo$_get_daylight
                • String ID:
                • API String ID: 72036449-0
                • Opcode ID: d3de0e5fbb29882e1444303b053487e6c4167490a49d197d347690e3b449aa76
                • Instruction ID: a78af89be1abfc242d325a7166fa05832cbcf432c68076eb6c1c68070f34b806
                • Opcode Fuzzy Hash: d3de0e5fbb29882e1444303b053487e6c4167490a49d197d347690e3b449aa76
                • Instruction Fuzzy Hash: 0D510532D0D62A46F7F43A3C8400379E9A3DB40714F988934D6BD462F5CB7CFA418662
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: fpos
                • String ID:
                • API String ID: 1083263101-0
                • Opcode ID: 1cbe0da8245263ccabd5fc0fdbc0dc30dbf6039e44a5f579b2030ebeff9d7260
                • Instruction ID: 9cdc998ae081ea9f3a947448248cc47d0e6fbd5b4abfd1a296a5c25008b5cb0a
                • Opcode Fuzzy Hash: 1cbe0da8245263ccabd5fc0fdbc0dc30dbf6039e44a5f579b2030ebeff9d7260
                • Instruction Fuzzy Hash: 6E612D2291CA85C6E670AB3DE44136AB7A1F7C4794F540271EAAD87BB9CF2CE540CF10
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: fpos
                • String ID:
                • API String ID: 1083263101-0
                • Opcode ID: d3754b898ce883205f96549c0b64ff41e4bd3cdbf9d0336dc77dfd6284e7eb03
                • Instruction ID: 97ee0c3056e1f894ea13cb1a61f09ee44e805524086bfab37368e046c6d81093
                • Opcode Fuzzy Hash: d3754b898ce883205f96549c0b64ff41e4bd3cdbf9d0336dc77dfd6284e7eb03
                • Instruction Fuzzy Hash: FC613C2291CA85C2E670EA6DE45036AA7A1F7C4794F540631EBED87BB9CF2CE540CB50
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Mpunctstd::ios_base::width
                • String ID: @
                • API String ID: 1954291571-2766056989
                • Opcode ID: 6f3ce2de7b4513bc64287ebbab72432cc3862cb84223f76adcc5d1ab8fa7e2c6
                • Instruction ID: 0ea1ade0166b1cf35ab62a871360246fa9c001559f8ba10b77131c06eb15b9f1
                • Opcode Fuzzy Hash: 6f3ce2de7b4513bc64287ebbab72432cc3862cb84223f76adcc5d1ab8fa7e2c6
                • Instruction Fuzzy Hash: BF021D3260DAC985DA709B25E4983EFA7A2F7C9780F844132DACD43BA9DE7CD545CB00
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: Mpunctstd::ios_base::width
                • String ID: @
                • API String ID: 1954291571-2766056989
                • Opcode ID: e27a045f761b14d2fffe84da88c31ce7ac0da8294f5654189181789f2ea32c6d
                • Instruction ID: 9c7553699d68ae997565bf5f8e4cb6ba2e109b89f812d6a4c29a9439a99eaf09
                • Opcode Fuzzy Hash: e27a045f761b14d2fffe84da88c31ce7ac0da8294f5654189181789f2ea32c6d
                • Instruction Fuzzy Hash: 4402EB3260DAC985DAB09B29E4943EFB7A1F7C8780F844132DA9D43B69DE7DD645CB00
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: __except_validate_context_record
                • String ID: csm$csm
                • API String ID: 1467352782-3733052814
                • Opcode ID: 65159f3e0ecf65f9194eef1dcfc72047fa4037cc4ac05a74557e03057721bf4f
                • Instruction ID: f0c33a269393997d0a4a780639840b678f74a65ea73a06cc5c2a3f965c042469
                • Opcode Fuzzy Hash: 65159f3e0ecf65f9194eef1dcfc72047fa4037cc4ac05a74557e03057721bf4f
                • Instruction Fuzzy Hash: D871E27390969586DB30AF39D85067DBBA6FB00F84F848139DA6C47AA5CF3CE651C720
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: $
                • API String ID: 0-227171996
                • Opcode ID: 3d20fbee949438aef30e9577c5bfd39b57f63d78807df1ee03379ab125a77a1e
                • Instruction ID: df4341d2d8b076364e3f05b7926ccaf76331384a8128037fce79e3b08bf11c07
                • Opcode Fuzzy Hash: 3d20fbee949438aef30e9577c5bfd39b57f63d78807df1ee03379ab125a77a1e
                • Instruction Fuzzy Hash: EC81423251DA8986DA70EB39E45036AB7A1FBC4B94F500175EA9E43B7ACF3CE500CB50
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: $
                • API String ID: 0-227171996
                • Opcode ID: 929a6268477b735f30d56d44f9bcc4b78dc5db40358690c0666abaa0a2bc4dc9
                • Instruction ID: cf7841e504d9df797b6013b7f1bffcb43cbc2403b93a9922ad767d56c6258371
                • Opcode Fuzzy Hash: 929a6268477b735f30d56d44f9bcc4b78dc5db40358690c0666abaa0a2bc4dc9
                • Instruction Fuzzy Hash: 35810E2651CA89C5DA70AB29E08136EB3A1FBC4784F500136EBDD47BBADE7CE541CB50
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID: 0-3916222277
                • Opcode ID: 0fd1d69f908260f5500e97a6e39c2c210b0b3063fb8c5b4773e69d4a4940688b
                • Instruction ID: 96a22615dc4dcca7251b62dc587eb7e65860e5ad4ace723388a6c9c1083edee0
                • Opcode Fuzzy Hash: 0fd1d69f908260f5500e97a6e39c2c210b0b3063fb8c5b4773e69d4a4940688b
                • Instruction Fuzzy Hash: A0710B2250C6C9C1E670AB79E0503BEF7B2FB84740F904076E6ED46AA9DF6CE544DB60
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: CreateFrameInfo__except_validate_context_record
                • String ID: csm
                • API String ID: 2558813199-1018135373
                • Opcode ID: 1b6ae00afff9c9eb06dbe5494aedbe7aaac179eaf03e7a81586e5a0413f83ecd
                • Instruction ID: d8e76d88eadb857a46a74a11355ad52a167f5ec7f913edff6f55047d4105a065
                • Opcode Fuzzy Hash: 1b6ae00afff9c9eb06dbe5494aedbe7aaac179eaf03e7a81586e5a0413f83ecd
                • Instruction Fuzzy Hash: ED515B3361969586DA30FF2AE54026EB7A5FB89B90F501134DB9D07BA5CF38F550CB20
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • _invalid_parameter_noinfo.LIBCMT ref: 00007FF79B6AD076
                  • Part of subcall function 00007FF79B6B1508: RtlDeleteBoundaryDescriptor.NTDLL(?,?,00007FF79B6AF4FF,00007FF79B6B9ECE,?,?,?,00007FF79B6BA24B,?,?,00000000,00007FF79B6BA794,?,?,?,00007FF79B6BA6C7), ref: 00007FF79B6B151E
                  • Part of subcall function 00007FF79B6B1508: GetLastError.KERNEL32(?,?,00007FF79B6AF4FF,00007FF79B6B9ECE,?,?,?,00007FF79B6BA24B,?,?,00000000,00007FF79B6BA794,?,?,?,00007FF79B6BA6C7), ref: 00007FF79B6B1528
                • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF79B6A0771), ref: 00007FF79B6AD094
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: BoundaryDeleteDescriptorErrorFileLastModuleName_invalid_parameter_noinfo
                • String ID: C:\Users\user\Desktop\73zGJqwgDy.exe
                • API String ID: 3976345311-3697488787
                • Opcode ID: 9a9872e3b6dee21310036683a70c721f7dc69dd1fcfc1168c6b4b040fe13d991
                • Instruction ID: ad07da0cbc6ee13adade46ddcc12cec5fc5515002766da4e1d6fedf2fb6e1b9c
                • Opcode Fuzzy Hash: 9a9872e3b6dee21310036683a70c721f7dc69dd1fcfc1168c6b4b040fe13d991
                • Instruction Fuzzy Hash: 9C417172A08A1A85EB24FF3998404BDA7A6FB457C4BD44035E95E43BA5DF3CFA518320
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: ErrorFileLastWrite
                • String ID: U
                • API String ID: 442123175-4171548499
                • Opcode ID: f60115cd34dfab5a1c44c7330e37a464bd58a844af732acc2f66cd54d4fef3f0
                • Instruction ID: 4e2f54bca201331a4cb566069685df7988a367288178f9ffb472a0f90db8a5ce
                • Opcode Fuzzy Hash: f60115cd34dfab5a1c44c7330e37a464bd58a844af732acc2f66cd54d4fef3f0
                • Instruction Fuzzy Hash: BA41C42361DA5586EB20DF29E4443B9A761FB94B84F804035DE5D877A4DF3CE501C720
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: _set_errno_from_matherr
                • String ID: exp
                • API String ID: 1187470696-113136155
                • Opcode ID: 3d373e3f802fff8d0bca639b7adbe98dc6228a31361ac0cec9673e713764ba7e
                • Instruction ID: bf056c4664a11e410f5694849ce6a47398abddee6c4a383c2b70823f140e7991
                • Opcode Fuzzy Hash: 3d373e3f802fff8d0bca639b7adbe98dc6228a31361ac0cec9673e713764ba7e
                • Instruction Fuzzy Hash: 27215E36F296299EE750EF78C8402AD77B1FB49348B400535EA1D93B59DF38E6408B50
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF79B684AFF), ref: 00007FF79B6A1258
                • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF79B684AFF), ref: 00007FF79B6A1299
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2061150828.00007FF79B681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B680000, based on PE: true
                • Associated: 00000000.00000002.2061135602.00007FF79B680000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061175639.00007FF79B6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061190770.00007FF79B6D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B6F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B704000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2061202582.00007FF79B728000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff79b680000_73zGJqwgDy.jbxd
                Yara matches
                Similarity
                • API ID: ExceptionFileHeaderRaise
                • String ID: csm
                • API String ID: 2573137834-1018135373
                • Opcode ID: d9fe29fdfaf4a4a160ab5bffe4816a56943a0fb87fb3406f17458bd64873a10c
                • Instruction ID: c43b85c08da0547537b9b6b556de4adc2e094af101e96b2f7f7e8bcf426993f3
                • Opcode Fuzzy Hash: d9fe29fdfaf4a4a160ab5bffe4816a56943a0fb87fb3406f17458bd64873a10c
                • Instruction Fuzzy Hash: 7E114C32608B8482EB209F29E400269B7E5FB88B84F984235DFDD47B68DF3CD651C700
                Uniqueness

                Uniqueness Score: -1.00%