Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
64drop.exe

Overview

General Information

Sample name:64drop.exe
Analysis ID:1378064
MD5:8919a3ebfb67cc3d12f475baa82ca476
SHA1:0e6aa733c49dc293f2936b32600390cedb0767ae
SHA256:07b03eeff0d15ffa67346df3c0d0aceaa18be760811579e274066f3f2c5ec9e9
Tags:64exe
Infos:

Detection

44Caliber Stealer, Rags Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected 44Caliber Stealer
Yara detected Rags Stealer
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file has nameless sections
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Generic Downloader
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Entry point lies outside standard sections
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 64drop.exe (PID: 5984 cmdline: C:\Users\user\Desktop\64drop.exe MD5: 8919A3EBFB67CC3D12F475BAA82CA476)
    • CromulentLauncher.exe (PID: 6444 cmdline: "C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe" MD5: 23D86A9388B2473D0B8C8D8C75DE793C)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000001.00000002.1716566592.0000000000F32000.00000040.00000001.01000000.00000009.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000001.00000002.1716566592.0000000000F32000.00000040.00000001.01000000.00000009.sdmpJoeSecurity_RagsStealerYara detected Rags StealerJoe Security
      00000001.00000002.1716566592.0000000000F32000.00000040.00000001.01000000.00000009.sdmpJoeSecurity_44CaliberStealerYara detected 44Caliber StealerJoe Security
        00000001.00000002.1716566592.0000000000F32000.00000040.00000001.01000000.00000009.sdmpINDICATOR_SUSPICIOUS_EXE_Discord_RegexDetects executables referencing Discord tokens regular expressionsditekSHen
        • 0x377ce:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
        00000001.00000002.1718689420.0000000005B58000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RagsStealerYara detected Rags StealerJoe Security
          Click to see the 5 entries
          SourceRuleDescriptionAuthorStrings
          1.2.CromulentLauncher.exe.f30000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            1.2.CromulentLauncher.exe.f30000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              1.2.CromulentLauncher.exe.f30000.0.unpackJoeSecurity_RagsStealerYara detected Rags StealerJoe Security
                1.2.CromulentLauncher.exe.f30000.0.unpackJoeSecurity_44CaliberStealerYara detected 44Caliber StealerJoe Security
                  1.2.CromulentLauncher.exe.f30000.0.unpackINDICATOR_SUSPICIOUS_EXE_Discord_RegexDetects executables referencing Discord tokens regular expressionsditekSHen
                  • 0x397ce:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
                  Click to see the 1 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeAvira: detection malicious, Label: TR/Crypt.XPACK.Gen
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeReversingLabs: Detection: 78%
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeVirustotal: Detection: 49%Perma Link
                  Source: 64drop.exeVirustotal: Detection: 57%Perma Link
                  Source: 64drop.exeReversingLabs: Detection: 75%
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeJoe Sandbox ML: detected
                  Source: 64drop.exeJoe Sandbox ML: detected

                  Location Tracking

                  barindex
                  Source: unknownDNS query: name: freegeoip.app

                  Compliance

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeUnpacked PE file: 1.2.CromulentLauncher.exe.f30000.0.unpack
                  Source: 64drop.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 104.21.73.97:443 -> 192.168.2.4:49729 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.21.85.189:443 -> 192.168.2.4:49730 version: TLS 1.2
                  Source: 64drop.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                  Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: CromulentLauncher.exe, 00000001.00000002.1718689420.0000000005C22000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxzip32\Release\sfxzip.pdb source: 64drop.exe
                  Source: Binary string: wminet_utils.dll.pdb source: CromulentLauncher.exe, 00000001.00000002.1715767818.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: CromulentLauncher.exe, 00000001.00000002.1715767818.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: *c:\windows\system.pdb source: CromulentLauncher.exe, 00000001.00000002.1715767818.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: `uyoasymreader.dllib.pdbpdb source: CromulentLauncher.exe, 00000001.00000002.1715767818.0000000000C8B000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: BC:\Windows\symbols\dll\System.pdbGAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdbtem.drawing.dlll source: CromulentLauncher.exe, 00000001.00000002.1715767818.0000000000C8B000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: System.pdb source: CromulentLauncher.exe, 00000001.00000002.1718689420.0000000005C22000.00000004.00000800.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009E2C15 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_009E2C15
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009F2D90 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_009F2D90

                  Networking

                  barindex
                  Source: Yara matchFile source: 1.2.CromulentLauncher.exe.f30000.0.unpack, type: UNPACKEDPE
                  Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1Host: freegeoip.appConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1Host: ipbase.comConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 104.21.85.189 104.21.85.189
                  Source: Joe Sandbox ViewIP Address: 104.21.73.97 104.21.73.97
                  Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1Host: freegeoip.appConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1Host: ipbase.comConnection: Keep-Alive
                  Source: unknownDNS traffic detected: queries for: freegeoip.app
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 20 Jan 2024 19:35:55 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeAge: 49123Cache-Control: public,max-age=0,must-revalidateCache-Status: "Netlify Edge"; hitVary: Accept-EncodingX-Nf-Request-Id: 01HMM5YR1DAQMYCA70A6AA4ATMCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=3wp7UdVjfhykbLXgoIlI8oIM1dBON1pwjBVPUumt92WKQBMqsGwRABVDKGzSsQTUra6UlPTwUT1CdazoBSdA97z56uNNokOWx8pXjeL5dhM9QUOqMTy0BLz4vF2m"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8489c36cd931673c-ATLalt-svc: h3=":443"; ma=86400
                  Source: CromulentLauncher.exe, 00000001.00000002.1718689420.0000000005B58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://freegeoip.app
                  Source: CromulentLauncher.exe, 00000001.00000002.1718689420.0000000005B58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://freegeoip.appd
                  Source: CromulentLauncher.exe, 00000001.00000002.1718689420.0000000005B97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ipbase.com
                  Source: CromulentLauncher.exe, 00000001.00000002.1718689420.0000000005B97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ipbase.comd
                  Source: CromulentLauncher.exeString found in binary or memory: http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
                  Source: CromulentLauncher.exeString found in binary or memory: http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
                  Source: CromulentLauncher.exeString found in binary or memory: http://pki-ocsp.symauth.com0
                  Source: CromulentLauncher.exe, 00000001.00000002.1718689420.0000000005B4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.enigmaprotector.com/
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.enigmaprotector.com/openU
                  Source: CromulentLauncher.exe, 00000001.00000002.1724017060.0000000006BB1000.00000004.00000800.00020000.00000000.sdmp, tmpCEE3.tmp.dat.1.dr, tmpCE92.tmp.dat.1.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                  Source: CromulentLauncher.exe, 00000001.00000002.1718689420.0000000005B7C000.00000004.00000800.00020000.00000000.sdmp, CromulentLauncher.exe, 00000001.00000002.1718689420.0000000005C22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://answers.netlify.com/t/support-guide-i-ve-deployed-my-site-but-i-still-see-page-not-found/125
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1718689420.0000000005B31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.vimeworld.ru/user/name/
                  Source: CromulentLauncher.exe, 00000001.00000002.1716566592.0000000000F32000.00000040.00000001.01000000.00000009.sdmpString found in binary or memory: https://api.vimeworld.ru/user/name/5https://freegeoip.app/xml/
                  Source: CromulentLauncher.exe, 00000001.00000002.1724017060.0000000006BB1000.00000004.00000800.00020000.00000000.sdmp, tmpCEE3.tmp.dat.1.dr, tmpCE92.tmp.dat.1.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: CromulentLauncher.exe, 00000001.00000002.1724017060.0000000006BB1000.00000004.00000800.00020000.00000000.sdmp, tmpCEE3.tmp.dat.1.dr, tmpCE92.tmp.dat.1.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: CromulentLauncher.exe, 00000001.00000002.1724017060.0000000006BB1000.00000004.00000800.00020000.00000000.sdmp, tmpCEE3.tmp.dat.1.dr, tmpCE92.tmp.dat.1.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: CromulentLauncher.exe, 00000001.00000002.1724017060.0000000006BB1000.00000004.00000800.00020000.00000000.sdmp, tmpCEE3.tmp.dat.1.dr, tmpCE92.tmp.dat.1.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: CromulentLauncher.exe, 00000001.00000002.1724017060.0000000006BB1000.00000004.00000800.00020000.00000000.sdmp, tmpCEE3.tmp.dat.1.dr, tmpCE92.tmp.dat.1.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                  Source: CromulentLauncher.exe, 00000001.00000002.1724017060.0000000006BB1000.00000004.00000800.00020000.00000000.sdmp, tmpCEE3.tmp.dat.1.dr, tmpCE92.tmp.dat.1.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: CromulentLauncher.exeString found in binary or memory: https://enigmaprotector.com/
                  Source: CromulentLauncher.exe, 00000001.00000002.1718689420.0000000005C22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Roboto:400
                  Source: CromulentLauncher.exe, 00000001.00000002.1718689420.0000000005B4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.app
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1718689420.0000000005B31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.app/xml/
                  Source: CromulentLauncher.exe, 00000001.00000002.1718689420.0000000005B84000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipbase.com
                  Source: CromulentLauncher.exe, 00000001.00000002.1718689420.0000000005B80000.00000004.00000800.00020000.00000000.sdmp, CromulentLauncher.exe, 00000001.00000002.1718689420.0000000005B58000.00000004.00000800.00020000.00000000.sdmp, CromulentLauncher.exe, 00000001.00000002.1718689420.0000000005B84000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipbase.com/xml/
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716566592.0000000000F32000.00000040.00000001.01000000.00000009.sdmpString found in binary or memory: https://ptb.discord.com/api/webhooks/1191727961125158913/AO3r_s05R0U-6xEmnSGeaNuYUkFwxvk1U1oYOinVZKj
                  Source: CromulentLauncher.exeString found in binary or memory: https://steamcommunity.com/profiles/
                  Source: CromulentLauncher.exe, 00000001.00000002.1716566592.0000000000F32000.00000040.00000001.01000000.00000009.sdmpString found in binary or memory: https://steamcommunity.com/profiles/ASOFTWARE
                  Source: tmpCEA2.tmp.tmpdb.1.drString found in binary or memory: https://support.mozilla.org
                  Source: tmpCEA2.tmp.tmpdb.1.drString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                  Source: tmpCEA2.tmp.tmpdb.1.drString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
                  Source: CromulentLauncher.exe, 00000001.00000002.1724017060.0000000006BB1000.00000004.00000800.00020000.00000000.sdmp, tmpCEE3.tmp.dat.1.dr, tmpCE92.tmp.dat.1.drString found in binary or memory: https://www.ecosia.org/newtab/
                  Source: CromulentLauncher.exe, 00000001.00000002.1724017060.0000000006BB1000.00000004.00000800.00020000.00000000.sdmp, tmpCEE3.tmp.dat.1.dr, tmpCE92.tmp.dat.1.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                  Source: tmpCEA2.tmp.tmpdb.1.drString found in binary or memory: https://www.mozilla.org
                  Source: tmpCEA2.tmp.tmpdb.1.drString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
                  Source: tmpCEA2.tmp.tmpdb.1.drString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
                  Source: tmpCEA2.tmp.tmpdb.1.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                  Source: tmpCEA2.tmp.tmpdb.1.drString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                  Source: tmpCEA2.tmp.tmpdb.1.drString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
                  Source: unknownHTTPS traffic detected: 104.21.73.97:443 -> 192.168.2.4:49729 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.21.85.189:443 -> 192.168.2.4:49730 version: TLS 1.2

                  System Summary

                  barindex
                  Source: 1.2.CromulentLauncher.exe.f30000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                  Source: 1.2.CromulentLauncher.exe.f30000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
                  Source: 00000001.00000002.1716566592.0000000000F32000.00000040.00000001.01000000.00000009.sdmp, type: MEMORYMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                  Source: 00000001.00000002.1718689420.0000000005BC3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                  Source: Process Memory Space: CromulentLauncher.exe PID: 6444, type: MEMORYSTRMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                  Source: CromulentLauncher.exe.0.drStatic PE information: section name:
                  Source: CromulentLauncher.exe.0.drStatic PE information: section name:
                  Source: CromulentLauncher.exe.0.drStatic PE information: section name:
                  Source: CromulentLauncher.exe.0.drStatic PE information: section name:
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_00A038500_2_00A03850
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009E5AFD0_2_009E5AFD
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009E54DD0_2_009E54DD
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_00A03CFE0_2_00A03CFE
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009FB4FD0_2_009FB4FD
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009EC42B0_2_009EC42B
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_00A07E040_2_00A07E04
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009EB79D0_2_009EB79D
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009E4F3C0_2_009E4F3C
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009FB72C0_2_009FB72C
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeCode function: 1_2_0340EBC01_2_0340EBC0
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeCode function: 1_2_0340EBAF1_2_0340EBAF
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeCode function: 1_2_09129F201_2_09129F20
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeCode function: 1_2_091296501_2_09129650
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeCode function: 1_2_091293081_2_09129308
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeCode function: 1_2_091257F81_2_091257F8
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeCode function: 1_2_091257E71_2_091257E7
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeCode function: String function: 00F7C2AC appears 46 times
                  Source: C:\Users\user\Desktop\64drop.exeCode function: String function: 009F5690 appears 44 times
                  Source: C:\Users\user\Desktop\64drop.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                  Source: C:\Users\user\Desktop\64drop.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                  Source: C:\Users\user\Desktop\64drop.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                  Source: C:\Users\user\Desktop\64drop.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                  Source: C:\Users\user\Desktop\64drop.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                  Source: C:\Users\user\Desktop\64drop.exeSection loaded: dxgidebug.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeSection loaded: sfc.dllJump to behavior
                  Source: 64drop.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 1.2.CromulentLauncher.exe.f30000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                  Source: 1.2.CromulentLauncher.exe.f30000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
                  Source: 00000001.00000002.1716566592.0000000000F32000.00000040.00000001.01000000.00000009.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                  Source: 00000001.00000002.1718689420.0000000005BC3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                  Source: Process Memory Space: CromulentLauncher.exe PID: 6444, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                  Source: CromulentLauncher.exe.0.drStatic PE information: Section: ZLIB complexity 0.9997350031407035
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/14@2/2
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009E1891 GetLastError,FormatMessageW,0_2_009E1891
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009F11D2 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_009F11D2
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeFile created: C:\Users\user\AppData\Local\44Jump to behavior
                  Source: C:\Users\user\Desktop\64drop.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0Jump to behavior
                  Source: C:\Users\user\Desktop\64drop.exeCommand line argument: sfxname0_2_009F4968
                  Source: C:\Users\user\Desktop\64drop.exeCommand line argument: sfxstime0_2_009F4968
                  Source: C:\Users\user\Desktop\64drop.exeCommand line argument: STARTDLG0_2_009F4968
                  Source: 64drop.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ProcessorId FROM Win32_Processor
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\64drop.exeFile read: C:\Windows\win.iniJump to behavior
                  Source: C:\Users\user\Desktop\64drop.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: tmpCED2.tmp.dat.1.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: 64drop.exeVirustotal: Detection: 57%
                  Source: 64drop.exeReversingLabs: Detection: 75%
                  Source: C:\Users\user\Desktop\64drop.exeFile read: C:\Users\user\Desktop\64drop.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\64drop.exe C:\Users\user\Desktop\64drop.exe
                  Source: C:\Users\user\Desktop\64drop.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe"
                  Source: C:\Users\user\Desktop\64drop.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe" Jump to behavior
                  Source: C:\Users\user\Desktop\64drop.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: 64drop.exeStatic file information: File size 1778157 > 1048576
                  Source: 64drop.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: 64drop.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: 64drop.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: 64drop.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: 64drop.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: 64drop.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: 64drop.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                  Source: 64drop.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: CromulentLauncher.exe, 00000001.00000002.1718689420.0000000005C22000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxzip32\Release\sfxzip.pdb source: 64drop.exe
                  Source: Binary string: wminet_utils.dll.pdb source: CromulentLauncher.exe, 00000001.00000002.1715767818.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: CromulentLauncher.exe, 00000001.00000002.1715767818.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: *c:\windows\system.pdb source: CromulentLauncher.exe, 00000001.00000002.1715767818.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: `uyoasymreader.dllib.pdbpdb source: CromulentLauncher.exe, 00000001.00000002.1715767818.0000000000C8B000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: BC:\Windows\symbols\dll\System.pdbGAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdbtem.drawing.dlll source: CromulentLauncher.exe, 00000001.00000002.1715767818.0000000000C8B000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: System.pdb source: CromulentLauncher.exe, 00000001.00000002.1718689420.0000000005C22000.00000004.00000800.00020000.00000000.sdmp
                  Source: 64drop.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: 64drop.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: 64drop.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: 64drop.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: 64drop.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                  Data Obfuscation

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeUnpacked PE file: 1.2.CromulentLauncher.exe.f30000.0.unpack Unknown_Section0:EW;Unknown_Section1:EW;Unknown_Section2:EW;.rsrc:R;Unknown_Section4:EW;.data:EW; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;.rsrc:R;Unknown_Section4:ER;.data:ER;
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeUnpacked PE file: 1.2.CromulentLauncher.exe.f30000.0.unpack
                  Source: CromulentLauncher.exe.0.drStatic PE information: 0xFA6AE732 [Mon Feb 19 06:33:22 2103 UTC]
                  Source: initial sampleStatic PE information: section where entry point is pointing to: .data
                  Source: C:\Users\user\Desktop\64drop.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\__tmp_rar_sfx_access_check_4043218Jump to behavior
                  Source: 64drop.exeStatic PE information: section name: .didat
                  Source: CromulentLauncher.exe.0.drStatic PE information: section name:
                  Source: CromulentLauncher.exe.0.drStatic PE information: section name:
                  Source: CromulentLauncher.exe.0.drStatic PE information: section name:
                  Source: CromulentLauncher.exe.0.drStatic PE information: section name:
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_3_02B170E5 pushad ; retf 0_3_02B170ED
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_3_02B170E5 pushad ; retf 0_3_02B170ED
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_3_02B18596 push cs; retf 0025h0_3_02B185AA
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_3_02B18596 push cs; retf 0025h0_3_02B185AA
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_3_02B0F9E9 push esi; retf 0_3_02B0F9F2
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_3_02B0F9E9 push esi; retf 0_3_02B0F9F2
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_3_02B147CF push cs; retf 0_3_02B147D2
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_3_02B147CF push cs; retf 0_3_02B147D2
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_3_02B170E5 pushad ; retf 0_3_02B170ED
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_3_02B170E5 pushad ; retf 0_3_02B170ED
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_3_02B18596 push cs; retf 0025h0_3_02B185AA
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_3_02B18596 push cs; retf 0025h0_3_02B185AA
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_3_02B0F9E9 push esi; retf 0_3_02B0F9F2
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_3_02B0F9E9 push esi; retf 0_3_02B0F9F2
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_3_02B147CF push cs; retf 0_3_02B147D2
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_3_02B147CF push cs; retf 0_3_02B147D2
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009F6260 push ecx; ret 0_2_009F6273
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009F5668 push eax; ret 0_2_009F5686
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeCode function: 1_2_00F88348 push 00F88794h; ret 1_2_00F8878C
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeCode function: 1_2_00F804F4 push 00F80520h; ret 1_2_00F80518
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeCode function: 1_2_00F804BA push 00F804E8h; ret 1_2_00F804E0
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeCode function: 1_2_00F805C8 push 00F805FCh; ret 1_2_00F805F4
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeCode function: 1_2_00F80564 push 00F80590h; ret 1_2_00F80588
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeCode function: 1_2_00F8052C push 00F80558h; ret 1_2_00F80550
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeCode function: 1_2_00F7E658 push 00F7E6A9h; ret 1_2_00F7E6A1
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeCode function: 1_2_00F88796 push 00F88807h; ret 1_2_00F887FF
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeCode function: 1_2_00F91860 push 00F918C0h; ret 1_2_00F918B8
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeCode function: 1_2_00F7E9D0 push 00F7E9FCh; ret 1_2_00F7E9F4
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeCode function: 1_2_00F909DE push 00F90A5Dh; ret 1_2_00F90A55
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeCode function: 1_2_00F8894C push 00F88978h; ret 1_2_00F88970
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeCode function: 1_2_00F7E912 push 00F7E940h; ret 1_2_00F7E938
                  Source: CromulentLauncher.exe.0.drStatic PE information: section name: entropy: 7.998108637306767
                  Source: CromulentLauncher.exe.0.drStatic PE information: section name: .data entropy: 7.962214038818199
                  Source: C:\Users\user\Desktop\64drop.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeJump to dropped file
                  Source: C:\Users\user\Desktop\64drop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 599890Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 599781Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 599672Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 599562Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 599453Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 599338Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 599219Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 599094Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 598984Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 598875Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 598765Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 598656Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 598544Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 598422Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeWindow / User API: threadDelayed 456Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeWindow / User API: threadDelayed 2142Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeWindow / User API: threadDelayed 584Jump to behavior
                  Source: C:\Users\user\Desktop\64drop.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-21568
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe TID: 4500Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe TID: 4500Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe TID: 4500Thread sleep time: -599890s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe TID: 4500Thread sleep time: -599781s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe TID: 4500Thread sleep time: -599672s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe TID: 4500Thread sleep time: -599562s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe TID: 4500Thread sleep time: -599453s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe TID: 4500Thread sleep time: -599338s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe TID: 4500Thread sleep time: -599219s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe TID: 4500Thread sleep time: -599094s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe TID: 4500Thread sleep time: -598984s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe TID: 4500Thread sleep time: -598875s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe TID: 4500Thread sleep time: -598765s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe TID: 4500Thread sleep time: -598656s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe TID: 4500Thread sleep time: -598544s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe TID: 4500Thread sleep time: -598422s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe TID: 7152Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe TID: 2640Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * From Win32_ComputerSystem
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ProcessorId FROM Win32_Processor
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\64drop.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009E2C15 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_009E2C15
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009F2D90 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_009F2D90
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009F50C6 VirtualQuery,GetSystemInfo,0_2_009F50C6
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 599890Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 599781Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 599672Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 599562Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 599453Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 599338Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 599219Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 599094Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 598984Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 598875Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 598765Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 598656Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 598544Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 598422Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 3Windows 2012 Server Standard without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 11 Essential Server Solutions without Hyper-V
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: #Windows 10 Microsoft Hyper-V Server
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 8.1 Microsoft Hyper-V Server
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 2012 Server Standard without Hyper-V
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 8 Microsoft Hyper-V Server
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 3Windows 11 Server Enterprise without Hyper-V (full)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 5Windows 2012 Server Datacenter without Hyper-V (core)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 3Windows 2016 Server Standard without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 8.1 Server Standard without Hyper-V (core)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 3Windows 11 Server Enterprise without Hyper-V (core)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: (Windows 2012 R2 Microsoft Hyper-V Server
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 11 Microsoft Hyper-V Server
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 6Windows 2012 R2 Server Standard without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 2012 R2 Server Standard without Hyper-V
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 8 Server Datacenter without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 10 Server Datacenter without Hyper-V (core)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 0Windows 8 Server Standard without Hyper-V (core)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 6Windows 8.1 Essential Server Solutions without Hyper-V
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: vmware
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 8 Server Standard without Hyper-V
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 4Windows 8 Essential Server Solutions without Hyper-V
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 5Windows 2012 Server Datacenter without Hyper-V (full)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 2016 Essential Server Solutions without Hyper-V
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 8Windows 2012 R2 Server Enterprise without Hyper-V (full)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 5Windows 2016 Server Datacenter without Hyper-V (full)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 2Windows 8 Server Enterprise without Hyper-V (core)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: "Windows 8 Microsoft Hyper-V Server
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 4Windows 8.1 Server Datacenter without Hyper-V (full)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 3Windows 11 Server Datacenter without Hyper-V (full)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 10 Server Standard without Hyper-V
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 2012 R2 Microsoft Hyper-V Server
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 5Windows 2012 Server Enterprise without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 2012 R2 Server Enterprise without Hyper-V (full)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 2012 R2 Server Datacenter without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 11 Server Standard without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 8.1 Essential Server Solutions without Hyper-V
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Hyper-V (guest)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 2012 R2 Server Standard without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 2012 Essential Server Solutions without Hyper-V
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 10 Microsoft Hyper-V Server
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 2012 R2 Server Datacenter without Hyper-V (full)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.00000000010DD000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: ~VirtualMachineTypes
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.00000000010DD000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: ]DLL_Loader_VirtualMachine
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 2016 Microsoft Hyper-V Server
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.00000000010DD000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: DLL_Loader_Marker]DLL_Loader_VirtualMachineZDLL_Loader_Reloc_Unit
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: /Windows 2012 R2 Server Standard without Hyper-V
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 11 Server Standard without Hyper-V
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: )Windows 8 Server Standard without Hyper-V
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 11 Server Enterprise without Hyper-V (full)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 5Windows 2016 Server Datacenter without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 11 Server Datacenter without Hyper-V (full)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 5Windows 2016 Server Enterprise without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Hyper-V
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: %Windows 2012 Microsoft Hyper-V Server
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: $Windows 8.1 Microsoft Hyper-V Server
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: ,Windows 2012 Server Standard without Hyper-V
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 3Windows 10 Server Datacenter without Hyper-V (full)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 2012 Microsoft Hyper-V Server
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 2012 Server Enterprise without Hyper-V (core)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 8Windows 2012 R2 Server Datacenter without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 8 Essential Server Solutions without Hyper-V
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 10 Essential Server Solutions without Hyper-V
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 8Windows 2012 R2 Server Datacenter without Hyper-V (full)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 8.1 Server Enterprise without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 10 Server Standard without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 2012 R2 Server Enterprise without Hyper-V (core)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 7Windows 2012 Essential Server Solutions without Hyper-V
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 8 Server Enterprise without Hyper-V (full)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 2016 Server Enterprise without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 2016 Server Datacenter without Hyper-V (full)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 8.1 Server Datacenter without Hyper-V (full)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: %Windows 2016 Microsoft Hyper-V Server
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 5Windows 2012 Server Enterprise without Hyper-V (full)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 3Windows 10 Server Enterprise without Hyper-V (core)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 3Windows 11 Server Datacenter without Hyper-V (core)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 7Windows 2016 Essential Server Solutions without Hyper-V
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: +Windows 8.1 Server Standard without Hyper-V
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 2016 Server Standard without Hyper-V
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 3Windows 10 Server Datacenter without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 11 Server Enterprise without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 11 Server Datacenter without Hyper-V (core)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 4Windows 8.1 Server Enterprise without Hyper-V (full)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 5Windows 2016 Server Enterprise without Hyper-V (full)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 2Windows 8 Server Datacenter without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 10 Server Enterprise without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 10 Server Datacenter without Hyper-V (full)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: :Windows 2012 R2 Essential Server Solutions without Hyper-V
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 5Windows 11 Essential Server Solutions without Hyper-V
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 2016 Server Standard without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 8 Server Standard without Hyper-V (core)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 5Windows 10 Essential Server Solutions without Hyper-V
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 8Windows 2012 R2 Server Enterprise without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 2012 Server Datacenter without Hyper-V (core)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 3Windows 10 Server Enterprise without Hyper-V (full)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 8.1 Server Enterprise without Hyper-V (full)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 8 Server Enterprise without Hyper-V (core)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: *Windows 11 Server Standard without Hyper-V
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 2012 R2 Essential Server Solutions without Hyper-V
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: ,Windows 2016 Server Standard without Hyper-V
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: ]VBoxService.exe
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 2012 Server Standard without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 8.1 Server Datacenter without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 2016 Server Datacenter without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 2016 Server Enterprise without Hyper-V (full)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 8 Server Datacenter without Hyper-V (full)
                  Source: CromulentLauncher.exe, 00000001.00000002.1715767818.0000000000D20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: VBoxService.exe
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 8.1 Server Standard without Hyper-V
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: *Windows 10 Server Standard without Hyper-V
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 1Windows 11 Server Standard without Hyper-V (core)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 1Windows 10 Server Standard without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 2012 Server Enterprise without Hyper-V (full)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 2012 Server Datacenter without Hyper-V (full)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: VMWare
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 4Windows 8.1 Server Enterprise without Hyper-V (core)
                  Source: CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Windows 10 Server Enterprise without Hyper-V (full)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 2Windows 8.1 Server Standard without Hyper-V (core)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 2Windows 8 Server Datacenter without Hyper-V (full)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 4Windows 8.1 Server Datacenter without Hyper-V (core)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: 2Windows 8 Server Enterprise without Hyper-V (full)
                  Source: CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: #Windows 11 Microsoft Hyper-V Server
                  Source: C:\Users\user\Desktop\64drop.exeAPI call chain: ExitProcess graph end nodegraph_0-23092
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeThread information set: HideFromDebuggerJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeCode function: 1_2_034092A8 LdrInitializeThunk,1_2_034092A8
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009FA24F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_009FA24F
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009FE3C2 mov eax, dword ptr fs:[00000030h]0_2_009FE3C2
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_00A02440 GetProcessHeap,0_2_00A02440
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009F6195 SetUnhandledExceptionFilter,0_2_009F6195
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009FA24F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_009FA24F
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009F63EA SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_009F63EA
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009F5FF2 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_009F5FF2
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeMemory allocated: page read and write | page guardJump to behavior
                  Source: C:\Users\user\Desktop\64drop.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe" Jump to behavior
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009F1981 SetEntriesInAclW,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateDirectoryW,LocalFree,0_2_009F1981
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009E6B0D cpuid 0_2_009E6B0D
                  Source: C:\Users\user\Desktop\64drop.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_009F1B15
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009F4968 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,0_2_009F4968
                  Source: C:\Users\user\Desktop\64drop.exeCode function: 0_2_009E2D8E GetVersionExW,0_2_009E2D8E
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 1.2.CromulentLauncher.exe.f30000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.1716566592.0000000000F32000.00000040.00000001.01000000.00000009.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: CromulentLauncher.exe PID: 6444, type: MEMORYSTR
                  Source: Yara matchFile source: 1.2.CromulentLauncher.exe.f30000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.1716566592.0000000000F32000.00000040.00000001.01000000.00000009.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1718689420.0000000005B58000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: CromulentLauncher.exe PID: 6444, type: MEMORYSTR
                  Source: CromulentLauncher.exeString found in binary or memory: \Wallets\Electrum\
                  Source: CromulentLauncher.exeString found in binary or memory: \com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\
                  Source: CromulentLauncher.exeString found in binary or memory: \Wallets\Exodus\
                  Source: CromulentLauncher.exeString found in binary or memory: \Wallets\Ethereum\
                  Source: CromulentLauncher.exeString found in binary or memory: \Wallets\Exodus\
                  Source: CromulentLauncher.exeString found in binary or memory: \Wallets\Ethereum\
                  Source: CromulentLauncher.exeString found in binary or memory: \Exodus\exodus.wallet\
                  Source: CromulentLauncher.exeString found in binary or memory: \Ethereum\keystore
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\Jump to behavior
                  Source: Yara matchFile source: 1.2.CromulentLauncher.exe.f30000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.1716566592.0000000000F32000.00000040.00000001.01000000.00000009.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: CromulentLauncher.exe PID: 6444, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 1.2.CromulentLauncher.exe.f30000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.1716566592.0000000000F32000.00000040.00000001.01000000.00000009.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: CromulentLauncher.exe PID: 6444, type: MEMORYSTR
                  Source: Yara matchFile source: 1.2.CromulentLauncher.exe.f30000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.1716566592.0000000000F32000.00000040.00000001.01000000.00000009.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1718689420.0000000005B58000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: CromulentLauncher.exe PID: 6444, type: MEMORYSTR
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
                  Valid Accounts121
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  Exfiltration Over Other Network Medium3
                  Ingress Tool Transfer
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
                  Default Accounts1
                  Native API
                  Boot or Logon Initialization Scripts11
                  Process Injection
                  1
                  Deobfuscate/Decode Files or Information
                  LSASS Memory2
                  File and Directory Discovery
                  Remote Desktop Protocol3
                  Data from Local System
                  Exfiltration Over Bluetooth11
                  Encrypted Channel
                  SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
                  Domain Accounts2
                  Command and Scripting Interpreter
                  Logon Script (Windows)Logon Script (Windows)3
                  Obfuscated Files or Information
                  Security Account Manager57
                  System Information Discovery
                  SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
                  Non-Application Layer Protocol
                  Data Encrypted for ImpactDNS ServerEmail Addresses
                  Local AccountsCronLogin HookLogin Hook23
                  Software Packing
                  NTDS341
                  Security Software Discovery
                  Distributed Component Object ModelInput CaptureTraffic Duplication4
                  Application Layer Protocol
                  Data DestructionVirtual Private ServerEmployee Names
                  Cloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Timestomp
                  LSA Secrets1
                  Process Discovery
                  SSHKeyloggingScheduled TransferFallback ChannelsData Encrypted for ImpactServerGather Victim Network Information
                  Replication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials241
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureData Transfer Size LimitsMultiband CommunicationService StopBotnetDomain Properties
                  External Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Masquerading
                  DCSync1
                  Application Window Discovery
                  Windows Remote ManagementWeb Portal CaptureExfiltration Over C2 ChannelCommonly Used PortInhibit System RecoveryWeb ServicesDNS
                  Drive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job241
                  Virtualization/Sandbox Evasion
                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingExfiltration Over Alternative ProtocolApplication Layer ProtocolDefacementServerlessNetwork Trust Dependencies
                  Exploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
                  Process Injection
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedExfiltration Over Symmetric Encrypted Non-C2 ProtocolWeb ProtocolsInternal DefacementMalvertisingNetwork Topology
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  64drop.exe58%VirustotalBrowse
                  64drop.exe75%ReversingLabsWin32.Ransomware.Generic
                  64drop.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe100%AviraTR/Crypt.XPACK.Gen
                  C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe79%ReversingLabsWin32.Ransomware.Generic
                  C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe49%VirustotalBrowse
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  ipbase.com1%VirustotalBrowse
                  freegeoip.app0%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  http://pki-ocsp.symauth.com00%URL Reputationsafe
                  https://freegeoip.app/xml/1%VirustotalBrowse
                  https://freegeoip.app0%VirustotalBrowse
                  http://www.enigmaprotector.com/openU1%VirustotalBrowse
                  http://freegeoip.appd0%Avira URL Cloudsafe
                  http://ipbase.comd0%Avira URL Cloudsafe
                  http://www.enigmaprotector.com/openU0%Avira URL Cloudsafe
                  https://freegeoip.app0%Avira URL Cloudsafe
                  https://freegeoip.app/xml/0%Avira URL Cloudsafe
                  http://ipbase.com0%Avira URL Cloudsafe
                  https://enigmaprotector.com/0%Avira URL Cloudsafe
                  https://answers.netlify.com/t/support-guide-i-ve-deployed-my-site-but-i-still-see-page-not-found/1250%Avira URL Cloudsafe
                  https://ipbase.com/xml/0%Avira URL Cloudsafe
                  https://ptb.discord.com/api/webhooks/1191727961125158913/AO3r_s05R0U-6xEmnSGeaNuYUkFwxvk1U1oYOinVZKj0%Avira URL Cloudsafe
                  https://enigmaprotector.com/0%VirustotalBrowse
                  http://ipbase.com1%VirustotalBrowse
                  https://ipbase.com/xml/0%VirustotalBrowse
                  http://www.enigmaprotector.com/0%Avira URL Cloudsafe
                  https://answers.netlify.com/t/support-guide-i-ve-deployed-my-site-but-i-still-see-page-not-found/1250%VirustotalBrowse
                  https://ipbase.com0%Avira URL Cloudsafe
                  http://freegeoip.app0%Avira URL Cloudsafe
                  https://ipbase.com1%VirustotalBrowse
                  https://ptb.discord.com/api/webhooks/1191727961125158913/AO3r_s05R0U-6xEmnSGeaNuYUkFwxvk1U1oYOinVZKj0%VirustotalBrowse
                  http://www.enigmaprotector.com/0%VirustotalBrowse
                  http://freegeoip.app0%VirustotalBrowse
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  ipbase.com
                  104.21.85.189
                  truefalseunknown
                  freegeoip.app
                  104.21.73.97
                  truetrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  https://freegeoip.app/xml/false
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://ipbase.com/xml/false
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://duckduckgo.com/chrome_newtabCromulentLauncher.exe, 00000001.00000002.1724017060.0000000006BB1000.00000004.00000800.00020000.00000000.sdmp, tmpCEE3.tmp.dat.1.dr, tmpCE92.tmp.dat.1.drfalse
                    high
                    https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDFtmpCEA2.tmp.tmpdb.1.drfalse
                      high
                      https://duckduckgo.com/ac/?q=CromulentLauncher.exe, 00000001.00000002.1724017060.0000000006BB1000.00000004.00000800.00020000.00000000.sdmp, tmpCEE3.tmp.dat.1.dr, tmpCE92.tmp.dat.1.drfalse
                        high
                        https://www.google.com/images/branding/product/ico/googleg_lodp.icoCromulentLauncher.exe, 00000001.00000002.1724017060.0000000006BB1000.00000004.00000800.00020000.00000000.sdmp, tmpCEE3.tmp.dat.1.dr, tmpCE92.tmp.dat.1.drfalse
                          high
                          http://ipbase.comdCromulentLauncher.exe, 00000001.00000002.1718689420.0000000005B97000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://steamcommunity.com/profiles/ASOFTWARECromulentLauncher.exe, 00000001.00000002.1716566592.0000000000F32000.00000040.00000001.01000000.00000009.sdmpfalse
                            high
                            http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07CromulentLauncher.exefalse
                              high
                              http://www.enigmaprotector.com/openUCromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpfalse
                              • 1%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://freegeoip.appCromulentLauncher.exe, 00000001.00000002.1718689420.0000000005B4D000.00000004.00000800.00020000.00000000.sdmpfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              http://freegeoip.appdCromulentLauncher.exe, 00000001.00000002.1718689420.0000000005B58000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=CromulentLauncher.exe, 00000001.00000002.1724017060.0000000006BB1000.00000004.00000800.00020000.00000000.sdmp, tmpCEE3.tmp.dat.1.dr, tmpCE92.tmp.dat.1.drfalse
                                high
                                https://enigmaprotector.com/CromulentLauncher.exefalse
                                • 0%, Virustotal, Browse
                                • Avira URL Cloud: safe
                                unknown
                                http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.crCromulentLauncher.exefalse
                                  high
                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=CromulentLauncher.exe, 00000001.00000002.1724017060.0000000006BB1000.00000004.00000800.00020000.00000000.sdmp, tmpCEE3.tmp.dat.1.dr, tmpCE92.tmp.dat.1.drfalse
                                    high
                                    https://www.ecosia.org/newtab/CromulentLauncher.exe, 00000001.00000002.1724017060.0000000006BB1000.00000004.00000800.00020000.00000000.sdmp, tmpCEE3.tmp.dat.1.dr, tmpCE92.tmp.dat.1.drfalse
                                      high
                                      https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brtmpCEA2.tmp.tmpdb.1.drfalse
                                        high
                                        https://answers.netlify.com/t/support-guide-i-ve-deployed-my-site-but-i-still-see-page-not-found/125CromulentLauncher.exe, 00000001.00000002.1718689420.0000000005B7C000.00000004.00000800.00020000.00000000.sdmp, CromulentLauncher.exe, 00000001.00000002.1718689420.0000000005C22000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • 0%, Virustotal, Browse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://ac.ecosia.org/autocomplete?q=CromulentLauncher.exe, 00000001.00000002.1724017060.0000000006BB1000.00000004.00000800.00020000.00000000.sdmp, tmpCEE3.tmp.dat.1.dr, tmpCE92.tmp.dat.1.drfalse
                                          high
                                          http://ipbase.comCromulentLauncher.exe, 00000001.00000002.1718689420.0000000005B97000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • 1%, Virustotal, Browse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://pki-ocsp.symauth.com0CromulentLauncher.exefalse
                                          • URL Reputation: safe
                                          unknown
                                          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchCromulentLauncher.exe, 00000001.00000002.1724017060.0000000006BB1000.00000004.00000800.00020000.00000000.sdmp, tmpCEE3.tmp.dat.1.dr, tmpCE92.tmp.dat.1.drfalse
                                            high
                                            https://steamcommunity.com/profiles/CromulentLauncher.exefalse
                                              high
                                              https://api.vimeworld.ru/user/name/CromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1718689420.0000000005B31000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://api.vimeworld.ru/user/name/5https://freegeoip.app/xml/CromulentLauncher.exe, 00000001.00000002.1716566592.0000000000F32000.00000040.00000001.01000000.00000009.sdmpfalse
                                                  high
                                                  https://ptb.discord.com/api/webhooks/1191727961125158913/AO3r_s05R0U-6xEmnSGeaNuYUkFwxvk1U1oYOinVZKjCromulentLauncher.exe, CromulentLauncher.exe, 00000001.00000002.1716566592.0000000000F32000.00000040.00000001.01000000.00000009.sdmpfalse
                                                  • 0%, Virustotal, Browse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://support.mozilla.orgtmpCEA2.tmp.tmpdb.1.drfalse
                                                    high
                                                    http://www.enigmaprotector.com/CromulentLauncher.exe, 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpfalse
                                                    • 0%, Virustotal, Browse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameCromulentLauncher.exe, 00000001.00000002.1718689420.0000000005B4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=CromulentLauncher.exe, 00000001.00000002.1724017060.0000000006BB1000.00000004.00000800.00020000.00000000.sdmp, tmpCEE3.tmp.dat.1.dr, tmpCE92.tmp.dat.1.drfalse
                                                        high
                                                        https://ipbase.comCromulentLauncher.exe, 00000001.00000002.1718689420.0000000005B84000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • 1%, Virustotal, Browse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://freegeoip.appCromulentLauncher.exe, 00000001.00000002.1718689420.0000000005B58000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • 0%, Virustotal, Browse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        104.21.85.189
                                                        ipbase.comUnited States
                                                        13335CLOUDFLARENETUSfalse
                                                        104.21.73.97
                                                        freegeoip.appUnited States
                                                        13335CLOUDFLARENETUStrue
                                                        Joe Sandbox version:38.0.0 Ammolite
                                                        Analysis ID:1378064
                                                        Start date and time:2024-01-20 20:35:00 +01:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 4m 51s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Number of analysed new started processes analysed:2
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:64drop.exe
                                                        Detection:MAL
                                                        Classification:mal100.troj.spyw.evad.winEXE@3/14@2/2
                                                        EGA Information:
                                                        • Successful, ratio: 100%
                                                        HCA Information:
                                                        • Successful, ratio: 55%
                                                        • Number of executed functions: 125
                                                        • Number of non-executed functions: 68
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Stop behavior analysis, all processes terminated
                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                        • Report size getting too big, too many NtSetInformationFile calls found.
                                                        TimeTypeDescription
                                                        20:35:54API Interceptor16x Sleep call for process: CromulentLauncher.exe modified
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        104.21.85.189123.scr.exeGet hashmaliciousUnknownBrowse
                                                          RP.sfx.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                                                            i6R4NsEd8t.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              rvYr7FRwkG.dllGet hashmaliciousUnknownBrowse
                                                                case (426).xlsGet hashmaliciousUnknownBrowse
                                                                  case (61).xlsGet hashmaliciousUnknownBrowse
                                                                    104.21.73.97123.scr.exeGet hashmaliciousUnknownBrowse
                                                                      123.scr.exeGet hashmaliciousRags StealerBrowse
                                                                        i6R4NsEd8t.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          bcAE21roAv.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            VegaStealer_v1.bin.exeGet hashmaliciousAdes Stealer, NitroStealerBrowse
                                                                              SPYGAME.bin.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                                                                                gjqYWrWZfb.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  UNKnyg3t3D.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    ipbase.com123.scr.exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.21.85.189
                                                                                    123.scr.exeGet hashmaliciousRags StealerBrowse
                                                                                    • 172.67.209.71
                                                                                    123.scr.exeGet hashmaliciousRags StealerBrowse
                                                                                    • 172.67.209.71
                                                                                    RP.sfx.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                                                                                    • 104.21.85.189
                                                                                    i6R4NsEd8t.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 104.21.85.189
                                                                                    3vj5tYFb6a.exeGet hashmaliciousSnake Keylogger, zgRATBrowse
                                                                                    • 104.21.28.190
                                                                                    7nYkVlcnfx.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 172.67.147.81
                                                                                    bcAE21roAv.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 172.67.147.81
                                                                                    VegaStealer_v1.bin.exeGet hashmaliciousAdes Stealer, NitroStealerBrowse
                                                                                    • 75.2.60.5
                                                                                    Yandex.bin.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                                                                                    • 75.2.60.5
                                                                                    SPYGAME.bin.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                                                                                    • 75.2.60.5
                                                                                    A6KiC17VqI.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 75.2.60.5
                                                                                    TwB13kUEGN.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 75.2.60.5
                                                                                    w5gL8sZU6z.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 99.83.231.61
                                                                                    k2Bg5AlSk1.exeGet hashmaliciousMassLogger RAT, Matiex, Snake KeyloggerBrowse
                                                                                    • 75.2.60.5
                                                                                    vYT3XBi8du.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 99.83.231.61
                                                                                    CJCxcYxjhF.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 99.83.231.61
                                                                                    g95CmPy67V.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 75.2.60.5
                                                                                    nesbiPpHpN.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 99.83.231.61
                                                                                    M6VkStAYfV.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 99.83.231.61
                                                                                    freegeoip.app123.scr.exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.21.73.97
                                                                                    123.scr.exeGet hashmaliciousRags StealerBrowse
                                                                                    • 104.21.73.97
                                                                                    123.scr.exeGet hashmaliciousRags StealerBrowse
                                                                                    • 172.67.160.84
                                                                                    RP.sfx.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                                                                                    • 172.67.160.84
                                                                                    i6R4NsEd8t.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 104.21.73.97
                                                                                    3vj5tYFb6a.exeGet hashmaliciousSnake Keylogger, zgRATBrowse
                                                                                    • 172.67.160.84
                                                                                    7nYkVlcnfx.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 172.67.160.84
                                                                                    bcAE21roAv.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 104.21.73.97
                                                                                    VegaStealer_v1.bin.exeGet hashmaliciousAdes Stealer, NitroStealerBrowse
                                                                                    • 104.21.73.97
                                                                                    Yandex.bin.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                                                                                    • 172.67.160.84
                                                                                    SPYGAME.bin.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                                                                                    • 104.21.73.97
                                                                                    A6KiC17VqI.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 188.114.97.7
                                                                                    TwB13kUEGN.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 188.114.96.7
                                                                                    w5gL8sZU6z.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 188.114.97.7
                                                                                    k2Bg5AlSk1.exeGet hashmaliciousMassLogger RAT, Matiex, Snake KeyloggerBrowse
                                                                                    • 188.114.97.7
                                                                                    vYT3XBi8du.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 188.114.97.7
                                                                                    CJCxcYxjhF.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 188.114.96.7
                                                                                    g95CmPy67V.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 188.114.97.7
                                                                                    nesbiPpHpN.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 188.114.96.7
                                                                                    M6VkStAYfV.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 188.114.97.7
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    CLOUDFLARENETUSSecuriteInfo.com.Trojan.Win32.Redline.15061.23904.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.71.213
                                                                                    toolspub1.exeGet hashmaliciousLummaC, Babuk, Djvu, LummaC Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                                                                                    • 162.159.134.233
                                                                                    WINVER.EXE.exeGet hashmaliciousBlank GrabberBrowse
                                                                                    • 162.159.136.232
                                                                                    Fantasy.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.35.143
                                                                                    explorhe.exeGet hashmaliciousLummaC, Amadey, Fabookie, Glupteba, LummaC Stealer, RedLine, StealcBrowse
                                                                                    • 172.67.175.187
                                                                                    C5A6377F2AC72B0E24F3F44995EEEDD5591825C59EF70.exeGet hashmaliciousUnknownBrowse
                                                                                    • 172.67.210.35
                                                                                    4779988F265D9FCDC5CE077D8E9E409B9B53C12218F31.exeGet hashmaliciousRedLineBrowse
                                                                                    • 172.67.34.170
                                                                                    4779988F265D9FCDC5CE077D8E9E409B9B53C12218F31.exeGet hashmaliciousRedLineBrowse
                                                                                    • 104.20.67.143
                                                                                    2D5770EB59209D2238670233CB2BE6424F7974800B83F.exeGet hashmaliciousUnknownBrowse
                                                                                    • 172.67.210.35
                                                                                    6D3F3F26752DF1A041952CEAB949662805FFF34D6D06D.exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.21.38.59
                                                                                    SecuriteInfo.com.Win64.TrojanX-gen.10450.23478.exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.26.0.5
                                                                                    9bb9a1974de3b7ca8de3fd9afd7fb0f92d8f24c33b651584b2d7e2d0bd0da2fe.zipGet hashmaliciousLimeRATBrowse
                                                                                    • 172.67.34.170
                                                                                    bTcG.exeGet hashmaliciousLimeRATBrowse
                                                                                    • 172.67.34.170
                                                                                    SecuriteInfo.com.Win64.PWSX-gen.25941.20836.exeGet hashmaliciousUnknownBrowse
                                                                                    • 162.159.137.232
                                                                                    SecuriteInfo.com.Win64.PWSX-gen.25941.20836.exeGet hashmaliciousUnknownBrowse
                                                                                    • 162.159.135.232
                                                                                    file.exeGet hashmaliciousLummaC, zgRATBrowse
                                                                                    • 104.21.10.151
                                                                                    https://far-skateboard-ba2.notion.site/GAFFNEY-Electrical-Services-Pty-Ltd-4f330ac7f10f4d20a77520190e6fd06c?pvs=4%22)%20and%20ContentType:(%221%22)Get hashmaliciousHTMLPhisherBrowse
                                                                                    • 172.64.148.154
                                                                                    https://far-skateboard-ba2.notion.site/GAFFNEY-Electrical-Services-Pty-Ltd-4f330ac7f10f4d20a77520190e6fd06c?pvs=4%22)%20and%20ContentType:(%221%22)Get hashmaliciousHTMLPhisherBrowse
                                                                                    • 172.64.148.154
                                                                                    bTc8.exeGet hashmaliciousNjratBrowse
                                                                                    • 172.67.34.170
                                                                                    SecuriteInfo.com.Win64.Evo-gen.27818.14006.exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.26.0.5
                                                                                    CLOUDFLARENETUSSecuriteInfo.com.Trojan.Win32.Redline.15061.23904.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.71.213
                                                                                    toolspub1.exeGet hashmaliciousLummaC, Babuk, Djvu, LummaC Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                                                                                    • 162.159.134.233
                                                                                    WINVER.EXE.exeGet hashmaliciousBlank GrabberBrowse
                                                                                    • 162.159.136.232
                                                                                    Fantasy.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.35.143
                                                                                    explorhe.exeGet hashmaliciousLummaC, Amadey, Fabookie, Glupteba, LummaC Stealer, RedLine, StealcBrowse
                                                                                    • 172.67.175.187
                                                                                    C5A6377F2AC72B0E24F3F44995EEEDD5591825C59EF70.exeGet hashmaliciousUnknownBrowse
                                                                                    • 172.67.210.35
                                                                                    4779988F265D9FCDC5CE077D8E9E409B9B53C12218F31.exeGet hashmaliciousRedLineBrowse
                                                                                    • 172.67.34.170
                                                                                    4779988F265D9FCDC5CE077D8E9E409B9B53C12218F31.exeGet hashmaliciousRedLineBrowse
                                                                                    • 104.20.67.143
                                                                                    2D5770EB59209D2238670233CB2BE6424F7974800B83F.exeGet hashmaliciousUnknownBrowse
                                                                                    • 172.67.210.35
                                                                                    6D3F3F26752DF1A041952CEAB949662805FFF34D6D06D.exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.21.38.59
                                                                                    SecuriteInfo.com.Win64.TrojanX-gen.10450.23478.exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.26.0.5
                                                                                    9bb9a1974de3b7ca8de3fd9afd7fb0f92d8f24c33b651584b2d7e2d0bd0da2fe.zipGet hashmaliciousLimeRATBrowse
                                                                                    • 172.67.34.170
                                                                                    bTcG.exeGet hashmaliciousLimeRATBrowse
                                                                                    • 172.67.34.170
                                                                                    SecuriteInfo.com.Win64.PWSX-gen.25941.20836.exeGet hashmaliciousUnknownBrowse
                                                                                    • 162.159.137.232
                                                                                    SecuriteInfo.com.Win64.PWSX-gen.25941.20836.exeGet hashmaliciousUnknownBrowse
                                                                                    • 162.159.135.232
                                                                                    file.exeGet hashmaliciousLummaC, zgRATBrowse
                                                                                    • 104.21.10.151
                                                                                    https://far-skateboard-ba2.notion.site/GAFFNEY-Electrical-Services-Pty-Ltd-4f330ac7f10f4d20a77520190e6fd06c?pvs=4%22)%20and%20ContentType:(%221%22)Get hashmaliciousHTMLPhisherBrowse
                                                                                    • 172.64.148.154
                                                                                    https://far-skateboard-ba2.notion.site/GAFFNEY-Electrical-Services-Pty-Ltd-4f330ac7f10f4d20a77520190e6fd06c?pvs=4%22)%20and%20ContentType:(%221%22)Get hashmaliciousHTMLPhisherBrowse
                                                                                    • 172.64.148.154
                                                                                    bTc8.exeGet hashmaliciousNjratBrowse
                                                                                    • 172.67.34.170
                                                                                    SecuriteInfo.com.Win64.Evo-gen.27818.14006.exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.26.0.5
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    3b5074b1b5d032e5620f69f9f700ff0etoolspub1.exeGet hashmaliciousLummaC, Babuk, Djvu, LummaC Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                                                                                    • 104.21.85.189
                                                                                    • 104.21.73.97
                                                                                    SecuriteInfo.com.Trojan-PSW.Agent.30453.11887.exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.21.85.189
                                                                                    • 104.21.73.97
                                                                                    SecuriteInfo.com.Trojan-PSW.Agent.30453.11887.exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.21.85.189
                                                                                    • 104.21.73.97
                                                                                    file.exeGet hashmaliciousRisePro StealerBrowse
                                                                                    • 104.21.85.189
                                                                                    • 104.21.73.97
                                                                                    file.exeGet hashmaliciousRisePro Stealer, VidarBrowse
                                                                                    • 104.21.85.189
                                                                                    • 104.21.73.97
                                                                                    SecuriteInfo.com.IL.Trojan.MSILZilla.53588.22756.16168.exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.21.85.189
                                                                                    • 104.21.73.97
                                                                                    SecuriteInfo.com.IL.Trojan.MSILZilla.53588.22756.16168.exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.21.85.189
                                                                                    • 104.21.73.97
                                                                                    ODDBALL0.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                                                    • 104.21.85.189
                                                                                    • 104.21.73.97
                                                                                    latestrocki.exeGet hashmaliciousLummaC, Fabookie, Glupteba, LummaC Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                                                                                    • 104.21.85.189
                                                                                    • 104.21.73.97
                                                                                    toolspub1.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, LummaC Stealer, PureLog Stealer, RedLineBrowse
                                                                                    • 104.21.85.189
                                                                                    • 104.21.73.97
                                                                                    VXl6IxOofO.exeGet hashmaliciousGurcu StealerBrowse
                                                                                    • 104.21.85.189
                                                                                    • 104.21.73.97
                                                                                    7UunqDE3X2.exeGet hashmaliciousPureLog StealerBrowse
                                                                                    • 104.21.85.189
                                                                                    • 104.21.73.97
                                                                                    spoofer.exeGet hashmaliciousBlank Grabber, Dicrord Rat, Umbral StealerBrowse
                                                                                    • 104.21.85.189
                                                                                    • 104.21.73.97
                                                                                    https://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=fVW0Q484ME-xmkayXQgIKyKJkC3KriNNt5AG7Ds4ctRUM0hPVDc2SkRNSjY1Vk9JRjU5V1BTQThIQy4uGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                                                    • 104.21.85.189
                                                                                    • 104.21.73.97
                                                                                    InvoiceN0180A209_PDF.vbsGet hashmaliciousXWormBrowse
                                                                                    • 104.21.85.189
                                                                                    • 104.21.73.97
                                                                                    http://uodrle.comGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                                                    • 104.21.85.189
                                                                                    • 104.21.73.97
                                                                                    pdfcentral.exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.21.85.189
                                                                                    • 104.21.73.97
                                                                                    pdfcentral.exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.21.85.189
                                                                                    • 104.21.73.97
                                                                                    https://gate.getmygateway.com/KQGrXb?c=Get hashmaliciousUnknownBrowse
                                                                                    • 104.21.85.189
                                                                                    • 104.21.73.97
                                                                                    PDF2DoConvert (1).exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.21.85.189
                                                                                    • 104.21.73.97
                                                                                    No context
                                                                                    Process:C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe
                                                                                    File Type:ASCII text
                                                                                    Category:dropped
                                                                                    Size (bytes):105
                                                                                    Entropy (8bit):3.8863455911790052
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:RGtjybXLGSWK+ZjMGvRS3ZMz9GSOLj2SjyRE2qJ:hvWF7Ipg9OL2RE2m
                                                                                    MD5:2E9D094DDA5CDC3CE6519F75943A4FF4
                                                                                    SHA1:5D989B4AC8B699781681FE75ED9EF98191A5096C
                                                                                    SHA-256:C84C98BBF5E0EF9C8D0708B5D60C5BB656B7D6BE5135D7F7A8D25557E08CF142
                                                                                    SHA-512:D1F7EED00959E902BDB2125B91721460D3FF99F3BDFC1F2A343D4F58E8D4E5E5A06C0C6CDC0379211C94510F7C00D7A8B34FA7D0CA0C3D54CBBE878F1E9812B7
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:### Get Help ###.### Customize Firefox ###.### Get Involved ###.### About Us ###.### Getting Started ###.
                                                                                    Process:C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe
                                                                                    File Type:ASCII text
                                                                                    Category:dropped
                                                                                    Size (bytes):645
                                                                                    Entropy (8bit):4.175130895137056
                                                                                    Encrypted:false
                                                                                    SSDEEP:12:pYzdcsggfSBLoTSTeftRQ6vV2MWYY7VondA6r:psdvfSBL/4nvV6B7Voa4
                                                                                    MD5:97F0DA276EAF1D64D56F8D782583A038
                                                                                    SHA1:8F530A6BB4C7C633A86D34E60D967807C6CE55E7
                                                                                    SHA-256:41D20437D1DF0A9A89D0E13F57CF8C589DAECC3C6046623BAA12670B4B7EA9C9
                                                                                    SHA-512:B1C714F79AE9F1E15BC2D8ACC9CBC4A2A582D3B8E9C6DF527E85839A17E4F3D86B14AEF2FFF82E79F0953A4DFCB9AEA6983A5A5C5172F82A7B21B820CE4E78A3
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview: ==================================================. Operating system: Windows 10 Pro (64 Bit). PC user: 642294/user. ClipBoard: . Launch: C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe. ==================================================. Screen resolution: 1280x1024. Current time: 20/01/2024 22:45:45. HWID: DE2C84916D. ==================================================. CPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz. RAM: 4094MB. GPU: A1HRLS. ==================================================. IP Geolocation: Fail Fail. Log Date: 01/20/2024 8:35. BSSID: 00:50:56:a7:21:15. ==================================================
                                                                                    Process:C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe
                                                                                    File Type:ASCII text
                                                                                    Category:dropped
                                                                                    Size (bytes):3674
                                                                                    Entropy (8bit):4.726177092843143
                                                                                    Encrypted:false
                                                                                    SSDEEP:48:VTjLrVAG2VbAJtEyeVZiVjV7VsVcVHQSVAVVqVVVbAVVAAAmumjqVg5VVUtlVVC/:YG3trEUZjCBRzUi
                                                                                    MD5:8AF65C058B1A30C6F0DFC075C0622FA2
                                                                                    SHA1:224CD79BF73D0A3621F09812A0DDC0D50DC13802
                                                                                    SHA-256:D48D3BCABEF88BC9D5733B2D27EFBA13A114B19199B8845528E9E6E31E5B67CB
                                                                                    SHA-512:C268A53B9EA7A80A6BF81863985AACB4F838A4DC1B316F8F01D2D781E9C5955F60F1130936A5F6D09A4A746985B01222D48C505563FE92E7CF4654C75C95D6AA
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:NAME: svchost..NAME: GfRiSOBRkZVtonVG..NAME: explorer..NAME: WmiPrvSE..NAME: GfRiSOBRkZVtonVG..NAME: fontdrvhost..NAME: GfRiSOBRkZVtonVG..NAME: smartscreen..NAME: svchost..NAME: CromulentLauncher..NAME: csrss..NAME: svchost..NAME: sihost..NAME: GfRiSOBRkZVtonVG..NAME: GfRiSOBRkZVtonVG..NAME: RuntimeBroker..NAME: OfficeClickToRun..NAME: GfRiSOBRkZVtonVG..NAME: GfRiSOBRkZVtonVG..NAME: svchost..NAME: svchost..NAME: dasHost..NAME: svchost..NAME: ctfmon..NAME: 64drop..NAME: WmiPrvSE..NAME: conhost..NAME: svchost..NAME: GfRiSOBRkZVtonVG..NAME: svchost..NAME: GfRiSOBRkZVtonVG..NAME: svchost..NAME: svchost..NAME: backgroundTaskHost..NAME: svchost..NAME: GfRiSOBRkZVtonVG..NAME: svchost..NAME: dllhost..NAME: GfRiSOBRkZVtonVG..NAME: GfRiSOBRkZVtonVG..NAME: svchost..NAME: RuntimeBroker..NAME: StartMenuExperienceHost..NAME: GfRiSOBRkZVtonVG..NAME: GfRiSOBRkZVtonVG..NAME: fontdrvhost..NAME: GfRiSOBRkZVtonVG..NAME: GfRiSOBRkZVtonVG..NAME: TextInputHost..NAME: svchost..NAME: svchost..NAME: GfRiSOBRkZV
                                                                                    Process:C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe
                                                                                    File Type:PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
                                                                                    Category:dropped
                                                                                    Size (bytes):716623
                                                                                    Entropy (8bit):7.928642097663503
                                                                                    Encrypted:false
                                                                                    SSDEEP:12288:kaGkcf1u7ROGZg8Wfv8zx22zzFUJPOds/53O8EWCz7WhOOwSgPGx6mV/Q9tlV6kk:v+1wOGynS5UVUa+ICP+BHoj6dVZ
                                                                                    MD5:EEE95499D20167CB8428FA2D913CDC3A
                                                                                    SHA1:FA1D823CA08512189A19FC53AE05F3F2E82578FF
                                                                                    SHA-256:8A08ADE04033ACDE6AE912B9471338670E12B784269226890AAFBAD2BC8B9968
                                                                                    SHA-512:5ED8AD181D1C4A41A11C1504C33E955F9FB2CEEB6F96B3E63EFFB0D2473F2D899F91F4DFB8A3F0E5849480A1DE95193724D59B51B1845ED95B69AA815EE71708
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:.PNG........IHDR................C....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^....e....Y..5=.{.o.{..3o...3...............H........)$.Fx#...C ..{...{o%..R|....O.....YU...~+"v.s..,.....Zg..F..]x..6w.....N../..f..v..L..7..u.....W;Q|92V...%3..g...'..Z.x9C_.Q.}..}..h.....zL.k/...{a..Z..@..+^.I....cGO..Q..e.....5}..5......N...4.M...OO...<5....Hi.....+h...i...c.._|<....$..<........~......#.c.><<.<4%.{/...@.}~j.?....}.....zc<`..7..{=.0.........=.....1c....d..'......9.+V....M_c...]...w7..r.$..........4....9.....we.v.3..|_9...S0...c.h.xGj.d.x{...->nq......*..hqc.N.W.c.C{..2..m.{.[...i.........n..........n.y...ng9.Z~/...n}k...........'>o;.7.i,.....i...v.1..G..[......>..o.....hK..-nNs..}k..ons..iozC.[...i....}..-l...&7.....v|S....mz]jorm.c...]......[....]..ki.1?.>.<..s7.>..+6g...#.s.k3....6..F6o.?.......19.g..7..S......]...5il.s..v....:W5.~.>....u}.^......Y.....j<g].[..4..]...'.3..-..s..|.../O..y.5..1..z\.9]O{...o.\`1.y..
                                                                                    Process:C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):1248
                                                                                    Entropy (8bit):5.347863460191528
                                                                                    Encrypted:false
                                                                                    SSDEEP:24:ML9E4KXAE4Kze41qE4qXKDE4KhKiKhPKIE4oKNzKogE4K5sXE4qdKm:MxHKXAHKze41qHiYHKh3oPtHo64HKMHA
                                                                                    MD5:902DC85AB4A707C2AE73570A764FD473
                                                                                    SHA1:D5B0FD2C3A487F93F819D9B84572BAA735C827AF
                                                                                    SHA-256:83781ECAC28FA86EBA51089023042AF8936233D03CC0737FCF932648A1BA234B
                                                                                    SHA-512:8F50D6A8C208378D04FD9A503FEC05AEB0F23930E8C2E6730FFBC8BCF7801EC1AB74BEFA0C24A5639C36A8E6CD66F8A313FC26D12907CB1530AEB3AD17A0175D
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, Publi
                                                                                    Process:C:\Users\user\Desktop\64drop.exe
                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):1289216
                                                                                    Entropy (8bit):7.963070019788221
                                                                                    Encrypted:false
                                                                                    SSDEEP:24576:UAf8XwYjslts9M5I8ke6JXHLgr8zRmtIDhe7xKP8xL7o1Nzwta2:UcYIXUuIxe0+imyEZvo3Q
                                                                                    MD5:23D86A9388B2473D0B8C8D8C75DE793C
                                                                                    SHA1:D7938FB0DDAEED76D6EAD3AD9ED030934603247E
                                                                                    SHA-256:9633ED8A684B052247E4850948B3E8B33C428066EB1C32179C547F477C5DFAF7
                                                                                    SHA-512:7115B93EFBB44AB74B157D683A61BB4E8DBF6FAAC46516916CB95EF310B1CCB587FF638113FFBB76530A936EE5358562132475DE74710FF64E27D5ADD68D842D
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                    • Antivirus: ReversingLabs, Detection: 79%
                                                                                    • Antivirus: Virustotal, Detection: 49%, Browse
                                                                                    Reputation:low
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2.j...............0.............48>.. ........@.. .......................`>.. ........`... .. .... .. .................. ./......`......................../.................................................................................................. ....... ..............@............ ... ......................@............ ...@......................@....rsrc.... ...`......................@..@..........+......(..................@....data........./.....................@...........................................N.L......L.o(.........................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                    Category:dropped
                                                                                    Size (bytes):106496
                                                                                    Entropy (8bit):1.1358696453229276
                                                                                    Encrypted:false
                                                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                    Malicious:false
                                                                                    Reputation:high, very likely benign file
                                                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe
                                                                                    File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                                                                                    Category:dropped
                                                                                    Size (bytes):5242880
                                                                                    Entropy (8bit):0.037963276276857943
                                                                                    Encrypted:false
                                                                                    SSDEEP:192:58rJQaXoMXp0VW9FxWZWdgokBQNba9D3DO/JxW/QHI:58r54w0VW3xWZWdOBQFal3dQ
                                                                                    MD5:C0FDF21AE11A6D1FA1201D502614B622
                                                                                    SHA1:11724034A1CC915B061316A96E79E9DA6A00ADE8
                                                                                    SHA-256:FD4EB46C81D27A9B3669C0D249DF5CE2B49E5F37B42F917CA38AB8831121ADAC
                                                                                    SHA-512:A6147C196B033725018C7F28C1E75E20C2113A0C6D8172F5EABCB8FF334EA6CE10B758FFD1D22D50B4DB5A0A21BCC15294AC44E94D973F7A3EB9F8558F31769B
                                                                                    Malicious:false
                                                                                    Reputation:high, very likely benign file
                                                                                    Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                    Category:dropped
                                                                                    Size (bytes):40960
                                                                                    Entropy (8bit):0.8553638852307782
                                                                                    Encrypted:false
                                                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                    Category:dropped
                                                                                    Size (bytes):106496
                                                                                    Entropy (8bit):1.1358696453229276
                                                                                    Encrypted:false
                                                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                    Category:dropped
                                                                                    Size (bytes):114688
                                                                                    Entropy (8bit):0.9746603542602881
                                                                                    Encrypted:false
                                                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                    Category:dropped
                                                                                    Size (bytes):114688
                                                                                    Entropy (8bit):0.9746603542602881
                                                                                    Encrypted:false
                                                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                    Category:dropped
                                                                                    Size (bytes):49152
                                                                                    Entropy (8bit):0.8180424350137764
                                                                                    Encrypted:false
                                                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe
                                                                                    File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                                                    Category:dropped
                                                                                    Size (bytes):98304
                                                                                    Entropy (8bit):0.08235737944063153
                                                                                    Encrypted:false
                                                                                    SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                                                    MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                                                    SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                                                    SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                                                    SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                    Entropy (8bit):7.782837985955761
                                                                                    TrID:
                                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                    File name:64drop.exe
                                                                                    File size:1'778'157 bytes
                                                                                    MD5:8919a3ebfb67cc3d12f475baa82ca476
                                                                                    SHA1:0e6aa733c49dc293f2936b32600390cedb0767ae
                                                                                    SHA256:07b03eeff0d15ffa67346df3c0d0aceaa18be760811579e274066f3f2c5ec9e9
                                                                                    SHA512:eac4ba93e8f84413a4d5a4e590263c493011cdfa2a6b96dee2222930a22c30ef885d4651d0783b10c26b8b75cc1f61c32302671dcf9de9f1a3dd19a29c1d1593
                                                                                    SSDEEP:24576:rcbD/3+3Nb8c6xUN8c/CNlSC3Af8XwYJs4nUAo3E5IuquLJlxpCp8zMgNFLtU5Vp:rcbz+3H6NXL3cYi4nUpmIm2BIG5VBj
                                                                                    TLSH:2F8501153A84CC76C6721BFC16E1E334A77DAE246E29C683CAF1CDA7F6E5C952C11281
                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........=LF.S.F.S.F.S..$..K.S..$....S..$..^.S.....D.S...W.U.S...P.Q.S...V.t.S.O...M.S.O...A.S.F.R.N.S...V.`.S...S.G.S.....G.S...Q.G.S
                                                                                    Icon Hash:86961e87874d5e52
                                                                                    Entrypoint:0x415de0
                                                                                    Entrypoint Section:.text
                                                                                    Digitally signed:false
                                                                                    Imagebase:0x400000
                                                                                    Subsystem:windows gui
                                                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                    Time Stamp:0x64C8CFB7 [Tue Aug 1 09:26:15 2023 UTC]
                                                                                    TLS Callbacks:
                                                                                    CLR (.Net) Version:
                                                                                    OS Version Major:5
                                                                                    OS Version Minor:1
                                                                                    File Version Major:5
                                                                                    File Version Minor:1
                                                                                    Subsystem Version Major:5
                                                                                    Subsystem Version Minor:1
                                                                                    Import Hash:fa8d20faea9ef7b4e2b7fbfe93442593
                                                                                    Instruction
                                                                                    call 00007FE661562791h
                                                                                    jmp 00007FE66156212Dh
                                                                                    jmp 00007FE66156693Fh
                                                                                    push ebp
                                                                                    mov ebp, esp
                                                                                    sub esp, 0Ch
                                                                                    lea ecx, dword ptr [ebp-0Ch]
                                                                                    call 00007FE6615619A7h
                                                                                    push 00431B08h
                                                                                    lea eax, dword ptr [ebp-0Ch]
                                                                                    push eax
                                                                                    call 00007FE6615630CAh
                                                                                    int3
                                                                                    push ebp
                                                                                    mov ebp, esp
                                                                                    and dword ptr [004692A8h], 00000000h
                                                                                    sub esp, 24h
                                                                                    or dword ptr [00434674h], 01h
                                                                                    push 0000000Ah
                                                                                    call dword ptr [00429170h]
                                                                                    test eax, eax
                                                                                    je 00007FE661562462h
                                                                                    and dword ptr [ebp-10h], 00000000h
                                                                                    xor eax, eax
                                                                                    push ebx
                                                                                    push esi
                                                                                    push edi
                                                                                    xor ecx, ecx
                                                                                    lea edi, dword ptr [ebp-24h]
                                                                                    push ebx
                                                                                    cpuid
                                                                                    mov esi, ebx
                                                                                    pop ebx
                                                                                    nop
                                                                                    mov dword ptr [edi], eax
                                                                                    mov dword ptr [edi+04h], esi
                                                                                    mov dword ptr [edi+08h], ecx
                                                                                    xor ecx, ecx
                                                                                    mov dword ptr [edi+0Ch], edx
                                                                                    mov eax, dword ptr [ebp-24h]
                                                                                    mov edi, dword ptr [ebp-20h]
                                                                                    mov dword ptr [ebp-0Ch], eax
                                                                                    xor edi, 756E6547h
                                                                                    mov eax, dword ptr [ebp-18h]
                                                                                    xor eax, 49656E69h
                                                                                    mov dword ptr [ebp-04h], eax
                                                                                    mov eax, dword ptr [ebp-1Ch]
                                                                                    xor eax, 6C65746Eh
                                                                                    mov dword ptr [ebp-08h], eax
                                                                                    xor eax, eax
                                                                                    inc eax
                                                                                    push ebx
                                                                                    cpuid
                                                                                    mov esi, ebx
                                                                                    pop ebx
                                                                                    nop
                                                                                    lea ebx, dword ptr [ebp-24h]
                                                                                    mov dword ptr [ebx], eax
                                                                                    mov eax, dword ptr [ebp-04h]
                                                                                    or eax, dword ptr [ebp-08h]
                                                                                    or eax, edi
                                                                                    mov dword ptr [ebx+04h], esi
                                                                                    mov dword ptr [ebx+08h], ecx
                                                                                    mov dword ptr [ebx+0Ch], edx
                                                                                    jne 00007FE6615622F5h
                                                                                    mov eax, dword ptr [ebp-24h]
                                                                                    and eax, 0FFF3FF0h
                                                                                    cmp eax, 000106C0h
                                                                                    je 00007FE6615622D5h
                                                                                    Programming Language:
                                                                                    • [ C ] VS2008 SP1 build 30729
                                                                                    • [IMP] VS2008 SP1 build 30729
                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x32a300x34.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x32a640x50.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x6b0000x4662b.rsrc
                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xb20000x2954.reloc
                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x30e400x54.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2b3380x40.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x290000x22c.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3205c0x100.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                    .text0x10000x27d0c0x27e00False0.5858946414576802data6.69415089194142IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                    .rdata0x290000xa6e60xa800False0.4578218005952381data5.246739495724833IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    .data0x340000x35ca00x1000False0.41455078125DOS executable (block device driver w{\362ko\3050)4.160089790234222IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                    .didat0x6a0000x1780x200False0.4296875data3.2022535810191277IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                    .rsrc0x6b0000x4662b0x46800False0.5762411347517731data6.073263397508148IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    .reloc0xb20000x29540x2a00False0.7797619047619048data6.703800314116885IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                    PNG0x6b53c0xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlaced1.0027729636048528
                                                                                    PNG0x6c0840x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlaced0.9363390441839495
                                                                                    RT_ICON0x6d6300x41c28Device independent bitmap graphic, 255 x 512 x 32, image size 2611200.5717314146544299
                                                                                    RT_DIALOG0xaf2580x2badata0.5286532951289399
                                                                                    RT_DIALOG0xaf5140x13adata0.6560509554140127
                                                                                    RT_DIALOG0xaf6500xf2data0.71900826446281
                                                                                    RT_DIALOG0xaf7440x14adata0.6
                                                                                    RT_DIALOG0xaf8900x314data0.47588832487309646
                                                                                    RT_DIALOG0xafba40x24adata0.6279863481228669
                                                                                    RT_STRING0xafdf00x1fcdata0.421259842519685
                                                                                    RT_STRING0xaffec0x246data0.41924398625429554
                                                                                    RT_STRING0xb02340x1a6data0.514218009478673
                                                                                    RT_STRING0xb03dc0xdcdata0.65
                                                                                    RT_STRING0xb04b80x470data0.3873239436619718
                                                                                    RT_STRING0xb09280x164data0.5056179775280899
                                                                                    RT_STRING0xb0a8c0x110data0.5772058823529411
                                                                                    RT_STRING0xb0b9c0x158data0.4563953488372093
                                                                                    RT_STRING0xb0cf40xe8data0.5948275862068966
                                                                                    RT_STRING0xb0ddc0xe6data0.5695652173913044
                                                                                    RT_GROUP_ICON0xb0ec40x14data1.25
                                                                                    RT_MANIFEST0xb0ed80x753XML 1.0 document, ASCII text, with CRLF line terminators0.3957333333333333
                                                                                    DLLImport
                                                                                    KERNEL32.dllGetLastError, SetLastError, FormatMessageW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileTime, CloseHandle, CreateFileW, GetCurrentProcessId, CreateDirectoryW, SetFileAttributesW, GetFileAttributesW, DeleteFileW, MoveFileW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, SetCurrentDirectoryW, GetTimeFormatW, GetDateFormatW, LocalFree, GetCurrentProcess, GetExitCodeProcess, WaitForSingleObject, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetNumberFormatW, GetOEMCP, DecodePointer, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, TerminateProcess, RtlUnwind, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, HeapReAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetCommandLineA
                                                                                    OLEAUT32.dllVariantClear
                                                                                    gdiplus.dllGdipCreateBitmapFromStream, GdipAlloc, GdipCloneImage, GdipDisposeImage, GdipCreateBitmapFromStreamICM, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipFree
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Jan 20, 2024 20:35:54.496850014 CET49729443192.168.2.4104.21.73.97
                                                                                    Jan 20, 2024 20:35:54.496886015 CET44349729104.21.73.97192.168.2.4
                                                                                    Jan 20, 2024 20:35:54.496963978 CET49729443192.168.2.4104.21.73.97
                                                                                    Jan 20, 2024 20:35:54.527277946 CET49729443192.168.2.4104.21.73.97
                                                                                    Jan 20, 2024 20:35:54.527299881 CET44349729104.21.73.97192.168.2.4
                                                                                    Jan 20, 2024 20:35:54.786549091 CET44349729104.21.73.97192.168.2.4
                                                                                    Jan 20, 2024 20:35:54.787332058 CET49729443192.168.2.4104.21.73.97
                                                                                    Jan 20, 2024 20:35:54.790524006 CET49729443192.168.2.4104.21.73.97
                                                                                    Jan 20, 2024 20:35:54.790535927 CET44349729104.21.73.97192.168.2.4
                                                                                    Jan 20, 2024 20:35:54.790875912 CET44349729104.21.73.97192.168.2.4
                                                                                    Jan 20, 2024 20:35:54.844450951 CET49729443192.168.2.4104.21.73.97
                                                                                    Jan 20, 2024 20:35:54.893923998 CET49729443192.168.2.4104.21.73.97
                                                                                    Jan 20, 2024 20:35:54.941900969 CET44349729104.21.73.97192.168.2.4
                                                                                    Jan 20, 2024 20:35:55.060861111 CET44349729104.21.73.97192.168.2.4
                                                                                    Jan 20, 2024 20:35:55.060929060 CET44349729104.21.73.97192.168.2.4
                                                                                    Jan 20, 2024 20:35:55.060995102 CET49729443192.168.2.4104.21.73.97
                                                                                    Jan 20, 2024 20:35:55.065911055 CET49729443192.168.2.4104.21.73.97
                                                                                    Jan 20, 2024 20:35:55.193849087 CET49730443192.168.2.4104.21.85.189
                                                                                    Jan 20, 2024 20:35:55.193902016 CET44349730104.21.85.189192.168.2.4
                                                                                    Jan 20, 2024 20:35:55.193985939 CET49730443192.168.2.4104.21.85.189
                                                                                    Jan 20, 2024 20:35:55.194880009 CET49730443192.168.2.4104.21.85.189
                                                                                    Jan 20, 2024 20:35:55.194900036 CET44349730104.21.85.189192.168.2.4
                                                                                    Jan 20, 2024 20:35:55.454297066 CET44349730104.21.85.189192.168.2.4
                                                                                    Jan 20, 2024 20:35:55.454390049 CET49730443192.168.2.4104.21.85.189
                                                                                    Jan 20, 2024 20:35:55.458699942 CET49730443192.168.2.4104.21.85.189
                                                                                    Jan 20, 2024 20:35:55.458714008 CET44349730104.21.85.189192.168.2.4
                                                                                    Jan 20, 2024 20:35:55.459125042 CET44349730104.21.85.189192.168.2.4
                                                                                    Jan 20, 2024 20:35:55.461339951 CET49730443192.168.2.4104.21.85.189
                                                                                    Jan 20, 2024 20:35:55.505902052 CET44349730104.21.85.189192.168.2.4
                                                                                    Jan 20, 2024 20:35:55.768868923 CET44349730104.21.85.189192.168.2.4
                                                                                    Jan 20, 2024 20:35:55.768925905 CET44349730104.21.85.189192.168.2.4
                                                                                    Jan 20, 2024 20:35:55.768958092 CET44349730104.21.85.189192.168.2.4
                                                                                    Jan 20, 2024 20:35:55.768970966 CET49730443192.168.2.4104.21.85.189
                                                                                    Jan 20, 2024 20:35:55.768985987 CET44349730104.21.85.189192.168.2.4
                                                                                    Jan 20, 2024 20:35:55.769023895 CET49730443192.168.2.4104.21.85.189
                                                                                    Jan 20, 2024 20:35:55.769033909 CET44349730104.21.85.189192.168.2.4
                                                                                    Jan 20, 2024 20:35:55.769082069 CET44349730104.21.85.189192.168.2.4
                                                                                    Jan 20, 2024 20:35:55.769121885 CET49730443192.168.2.4104.21.85.189
                                                                                    Jan 20, 2024 20:35:55.776118040 CET49730443192.168.2.4104.21.85.189
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Jan 20, 2024 20:35:54.353410006 CET5591553192.168.2.41.1.1.1
                                                                                    Jan 20, 2024 20:35:54.473994970 CET53559151.1.1.1192.168.2.4
                                                                                    Jan 20, 2024 20:35:55.071039915 CET5642153192.168.2.41.1.1.1
                                                                                    Jan 20, 2024 20:35:55.192543983 CET53564211.1.1.1192.168.2.4
                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                    Jan 20, 2024 20:35:54.353410006 CET192.168.2.41.1.1.10x9fcStandard query (0)freegeoip.appA (IP address)IN (0x0001)false
                                                                                    Jan 20, 2024 20:35:55.071039915 CET192.168.2.41.1.1.10x85d0Standard query (0)ipbase.comA (IP address)IN (0x0001)false
                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                    Jan 20, 2024 20:35:54.473994970 CET1.1.1.1192.168.2.40x9fcNo error (0)freegeoip.app104.21.73.97A (IP address)IN (0x0001)false
                                                                                    Jan 20, 2024 20:35:54.473994970 CET1.1.1.1192.168.2.40x9fcNo error (0)freegeoip.app172.67.160.84A (IP address)IN (0x0001)false
                                                                                    Jan 20, 2024 20:35:55.192543983 CET1.1.1.1192.168.2.40x85d0No error (0)ipbase.com104.21.85.189A (IP address)IN (0x0001)false
                                                                                    Jan 20, 2024 20:35:55.192543983 CET1.1.1.1192.168.2.40x85d0No error (0)ipbase.com172.67.209.71A (IP address)IN (0x0001)false
                                                                                    • freegeoip.app
                                                                                    • ipbase.com
                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    0192.168.2.449729104.21.73.974436444C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-01-20 19:35:54 UTC67OUTGET /xml/ HTTP/1.1
                                                                                    Host: freegeoip.app
                                                                                    Connection: Keep-Alive
                                                                                    2024-01-20 19:35:55 UTC627INHTTP/1.1 301 Moved Permanently
                                                                                    Date: Sat, 20 Jan 2024 19:35:54 GMT
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Cache-Control: max-age=3600
                                                                                    Expires: Sat, 20 Jan 2024 20:35:54 GMT
                                                                                    Location: https://ipbase.com/xml/
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=hy%2B0oN%2BuuIEKRSmvNB6qMqeaeSpwtLXH3flRtrxS9oxs3mZyi8h86Lk9wuXTQrCjF6Hju0nTda80tSGnmxLVChY9jPXgQoU4lR%2FZ%2BSdm%2F6ff14NzBHutY%2FZi4jq7YKjI"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8489c368ab4f4583-ATL
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    2024-01-20 19:35:55 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    1192.168.2.449730104.21.85.1894436444C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-01-20 19:35:55 UTC64OUTGET /xml/ HTTP/1.1
                                                                                    Host: ipbase.com
                                                                                    Connection: Keep-Alive
                                                                                    2024-01-20 19:35:55 UTC729INHTTP/1.1 404 Not Found
                                                                                    Date: Sat, 20 Jan 2024 19:35:55 GMT
                                                                                    Content-Type: text/html; charset=utf-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Age: 49123
                                                                                    Cache-Control: public,max-age=0,must-revalidate
                                                                                    Cache-Status: "Netlify Edge"; hit
                                                                                    Vary: Accept-Encoding
                                                                                    X-Nf-Request-Id: 01HMM5YR1DAQMYCA70A6AA4ATM
                                                                                    CF-Cache-Status: DYNAMIC
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=3wp7UdVjfhykbLXgoIlI8oIM1dBON1pwjBVPUumt92WKQBMqsGwRABVDKGzSsQTUra6UlPTwUT1CdazoBSdA97z56uNNokOWx8pXjeL5dhM9QUOqMTy0BLz4vF2m"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8489c36cd931673c-ATL
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    2024-01-20 19:35:55 UTC640INData Raw: 63 30 39 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 2c 20 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2e 30 2c 20 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 6e 6f 22 3e 0a 0a 20 20 20 20 3c 74 69 74 6c 65 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d
                                                                                    Data Ascii: c09<!DOCTYPE html><html> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=no"> <title>Page Not Found</title> <link href='https://fonts.googleapis.com
                                                                                    2024-01-20 19:35:55 UTC1369INData Raw: 20 20 20 7d 0a 0a 20 20 20 20 68 31 20 7b 0a 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 32 70 78 3b 0a 20 20 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 32 34 70 78 3b 0a 20 20 20 20 7d 0a 0a 20 20 20 20 2e 6d 61 69 6e 20 7b 0a 20 20 20 20 20 20 70 6f 73 69 74 69 6f 6e 3a 20 72 65 6c 61 74 69 76 65 3b 0a 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 66 6c 65 78 3b 0a 20 20 20 20 20 20 66 6c 65 78 2d 64 69 72 65 63 74 69 6f 6e 3a 20 63 6f 6c 75 6d 6e 3b 0a 20 20 20 20 20 20 61 6c 69 67 6e 2d 69 74 65 6d 73 3a 20 63 65 6e 74 65 72 3b 0a 20 20 20 20 20 20 6a 75 73 74 69 66 79 2d 63 6f 6e 74 65 6e 74 3a 20 63 65 6e 74 65 72 3b 0a 20 20 20 20 20 20 68 65 69 67 68 74 3a 20 31 30 30 76 68 3b 0a
                                                                                    Data Ascii: } h1 { margin: 0; font-size: 22px; line-height: 24px; } .main { position: relative; display: flex; flex-direction: column; align-items: center; justify-content: center; height: 100vh;
                                                                                    2024-01-20 19:35:55 UTC1079INData Raw: 68 20 66 69 6c 6c 3d 22 23 30 30 37 30 36 37 22 20 64 3d 22 4d 31 31 2e 39 39 39 38 38 33 36 2c 34 2e 30 39 33 37 30 38 30 33 20 4c 38 2e 35 35 38 30 39 35 31 37 2c 37 2e 34 33 32 39 34 39 35 33 20 43 38 2e 32 33 35 33 31 34 35 39 2c 37 2e 37 34 36 31 31 32 39 38 20 38 2e 32 33 35 33 31 34 35 39 2c 38 2e 32 35 33 38 38 37 33 36 20 38 2e 35 35 38 30 39 35 31 37 2c 38 2e 35 36 36 39 33 37 36 39 20 4c 31 32 2c 31 31 2e 39 30 36 32 39 32 31 20 4c 39 2e 38 34 31 38 37 38 37 31 2c 31 34 20 4c 34 2e 32 34 32 30 38 35 34 34 2c 38 2e 35 36 36 39 33 37 35 31 20 43 33 2e 39 31 39 33 30 34 38 35 2c 38 2e 32 35 33 38 38 37 31 39 20 33 2e 39 31 39 33 30 34 38 35 2c 37 2e 37 34 36 31 31 32 38 31 20 34 2e 32 34 32 30 38 35 34 34 2c 37 2e 34 33 32 39 34 39 33 36 20 4c 39
                                                                                    Data Ascii: h fill="#007067" d="M11.9998836,4.09370803 L8.55809517,7.43294953 C8.23531459,7.74611298 8.23531459,8.25388736 8.55809517,8.56693769 L12,11.9062921 L9.84187871,14 L4.24208544,8.56693751 C3.91930485,8.25388719 3.91930485,7.74611281 4.24208544,7.43294936 L9
                                                                                    2024-01-20 19:35:55 UTC6INData Raw: 31 0d 0a 0a 0d 0a
                                                                                    Data Ascii: 1
                                                                                    2024-01-20 19:35:55 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Click to jump to process

                                                                                    Click to jump to process

                                                                                    Click to dive into process behavior distribution

                                                                                    Click to jump to process

                                                                                    Target ID:0
                                                                                    Start time:20:35:45
                                                                                    Start date:20/01/2024
                                                                                    Path:C:\Users\user\Desktop\64drop.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:C:\Users\user\Desktop\64drop.exe
                                                                                    Imagebase:0x9e0000
                                                                                    File size:1'778'157 bytes
                                                                                    MD5 hash:8919A3EBFB67CC3D12F475BAA82CA476
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:1
                                                                                    Start time:20:35:46
                                                                                    Start date:20/01/2024
                                                                                    Path:C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe"
                                                                                    Imagebase:0xf30000
                                                                                    File size:1'289'216 bytes
                                                                                    MD5 hash:23D86A9388B2473D0B8C8D8C75DE793C
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:Borland Delphi
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.1716566592.0000000000F32000.00000040.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_RagsStealer, Description: Yara detected Rags Stealer, Source: 00000001.00000002.1716566592.0000000000F32000.00000040.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_44CaliberStealer, Description: Yara detected 44Caliber Stealer, Source: 00000001.00000002.1716566592.0000000000F32000.00000040.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                    • Rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex, Description: Detects executables referencing Discord tokens regular expressions, Source: 00000001.00000002.1716566592.0000000000F32000.00000040.00000001.01000000.00000009.sdmp, Author: ditekSHen
                                                                                    • Rule: JoeSecurity_RagsStealer, Description: Yara detected Rags Stealer, Source: 00000001.00000002.1718689420.0000000005B58000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex, Description: Detects executables referencing Discord tokens regular expressions, Source: 00000001.00000002.1718689420.0000000005BC3000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                                    Antivirus matches:
                                                                                    • Detection: 100%, Avira
                                                                                    • Detection: 100%, Joe Sandbox ML
                                                                                    • Detection: 79%, ReversingLabs
                                                                                    • Detection: 49%, Virustotal, Browse
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Reset < >

                                                                                      Execution Graph

                                                                                      Execution Coverage:11.3%
                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                      Signature Coverage:3%
                                                                                      Total number of Nodes:2000
                                                                                      Total number of Limit Nodes:29
                                                                                      execution_graph 21041 9f4f96 21042 9f4f44 21041->21042 21042->21041 21043 9f5280 ___delayLoadHelper2@8 17 API calls 21042->21043 21043->21042 20453 9f4ebb 20454 9f5280 ___delayLoadHelper2@8 17 API calls 20453->20454 20455 9f4ec8 20454->20455 21044 9e10d5 21049 9e1267 21044->21049 21046 9e10da 21053 9f59c9 21046->21053 21050 9e1271 __EH_prolog 21049->21050 21056 9e5753 21050->21056 21052 9e12d5 21052->21046 21118 9f599c 21053->21118 21057 9e575d __EH_prolog 21056->21057 21060 9e5a60 21057->21060 21059 9e5779 21059->21052 21065 9e571f 21060->21065 21066 9e572f 21065->21066 21067 9e572a 21065->21067 21076 9e5a84 21066->21076 21070 9e56cb 21067->21070 21071 9e56de 21070->21071 21072 9e56d6 21070->21072 21074 9e56dc 21071->21074 21096 9f5758 21071->21096 21109 9e56f0 21072->21109 21074->21059 21077 9e5a92 Concurrency::cancel_current_task 21076->21077 21078 9f6c20 CallUnexpected RaiseException 21077->21078 21079 9e5aa0 21078->21079 21080 9e5734 21079->21080 21082 9e123b 21079->21082 21083 9e1255 Concurrency::cancel_current_task 21082->21083 21084 9e1248 21082->21084 21083->21080 21086 9e15b5 21084->21086 21087 9e15cf 21086->21087 21088 9e15d4 21086->21088 21087->21083 21091 9fa429 21088->21091 21092 9fa39e ___std_exception_copy 26 API calls 21091->21092 21093 9fa438 21092->21093 21094 9fa446 Concurrency::cancel_current_task 11 API calls 21093->21094 21095 9fa445 21094->21095 21099 9f575d ___std_exception_copy 21096->21099 21097 9f5777 21097->21074 21098 9fe06e _unexpected 7 API calls 21098->21099 21099->21097 21099->21098 21100 9f5779 21099->21100 21101 9e5a84 Concurrency::cancel_current_task 21100->21101 21102 9f5783 21100->21102 21103 9f6c20 CallUnexpected RaiseException 21101->21103 21104 9f6c20 CallUnexpected RaiseException 21102->21104 21105 9e5aa0 21103->21105 21107 9f5e0b 21104->21107 21106 9e5ab9 21105->21106 21108 9e123b Concurrency::cancel_current_task 26 API calls 21105->21108 21106->21074 21108->21106 21110 9e56fb 21109->21110 21111 9e5719 21109->21111 21112 9f5758 27 API calls 21110->21112 21113 9e5a84 Concurrency::cancel_current_task 27 API calls 21111->21113 21114 9e5701 21112->21114 21115 9e571e 21113->21115 21116 9e5708 21114->21116 21117 9fa429 Concurrency::cancel_current_task 26 API calls 21114->21117 21116->21074 21117->21111 21119 9f59ab 21118->21119 21120 9f59b2 21118->21120 21124 9fedaa 21119->21124 21127 9fee1a 21120->21127 21123 9e10e4 21125 9fee1a 29 API calls 21124->21125 21126 9fedbc 21125->21126 21126->21123 21130 9feb21 21127->21130 21133 9fea57 21130->21133 21132 9feb45 21132->21123 21134 9fea63 ___scrt_is_nonwritable_in_current_image 21133->21134 21141 a01041 EnterCriticalSection 21134->21141 21136 9fea71 21142 9fec69 21136->21142 21138 9fea7e 21152 9fea9c 21138->21152 21140 9fea8f _abort 21140->21132 21141->21136 21143 9fec87 21142->21143 21149 9fec7f _unexpected 21142->21149 21144 9fece0 21143->21144 21143->21149 21155 a023c3 21143->21155 21145 a023c3 29 API calls 21144->21145 21144->21149 21147 9fecf6 21145->21147 21150 9ff8ba _free 20 API calls 21147->21150 21148 9fecd6 21151 9ff8ba _free 20 API calls 21148->21151 21149->21138 21150->21149 21151->21144 21183 a01091 LeaveCriticalSection 21152->21183 21154 9feaa6 21154->21140 21156 a023ce 21155->21156 21157 a023f6 21156->21157 21158 a023e7 21156->21158 21159 a02405 21157->21159 21164 a0561f 21157->21164 21160 9ff9d2 __dosmaperr 20 API calls 21158->21160 21171 a00b17 21159->21171 21163 a023ec _abort 21160->21163 21163->21148 21165 a0562a 21164->21165 21166 a0563f HeapSize 21164->21166 21167 9ff9d2 __dosmaperr 20 API calls 21165->21167 21166->21159 21168 a0562f 21167->21168 21169 9fa419 ___std_exception_copy 26 API calls 21168->21169 21170 a0563a 21169->21170 21170->21159 21172 a00b24 21171->21172 21173 a00b2f 21171->21173 21174 9ff9e5 __vsnwprintf_l 21 API calls 21172->21174 21175 a00b37 21173->21175 21181 a00b40 _unexpected 21173->21181 21179 a00b2c 21174->21179 21176 9ff8ba _free 20 API calls 21175->21176 21176->21179 21177 a00b45 21180 9ff9d2 __dosmaperr 20 API calls 21177->21180 21178 a00b6a HeapReAlloc 21178->21179 21178->21181 21179->21163 21180->21179 21181->21177 21181->21178 21182 9fe06e _unexpected 7 API calls 21181->21182 21182->21181 21183->21154 22703 9f490e 22704 9f491b 22703->22704 22705 9e4ba7 53 API calls 22704->22705 22706 9f4928 22705->22706 22707 9e2aa2 _swprintf 51 API calls 22706->22707 22708 9f493d SetDlgItemTextW 22707->22708 22709 9f20d8 5 API calls 22708->22709 22710 9f495a 22709->22710 22711 9f380a 22713 9f38d4 22711->22713 22718 9f382d 22711->22718 22712 9f1e84 ExpandEnvironmentStringsW 22721 9f3245 _wcslen _wcsrchr 22712->22721 22713->22721 22738 9f424f 22713->22738 22715 9f3ebc 22717 9e7d7d CompareStringW 22717->22718 22718->22713 22718->22717 22719 9f3519 SetWindowTextW 22719->22721 22721->22712 22721->22715 22721->22719 22722 9f1ffe 76 API calls 22721->22722 22723 9e2b4b 6 API calls 22721->22723 22724 9f3307 SetFileAttributesW 22721->22724 22725 9e2ad4 FindClose 22721->22725 22736 9f3321 _abort _wcslen 22721->22736 22763 9e7d7d CompareStringW 22721->22763 22764 9f115d GetCurrentDirectoryW 22721->22764 22722->22721 22723->22721 22726 9f33c1 GetFileAttributesW 22724->22726 22724->22736 22725->22721 22726->22721 22728 9f33d3 DeleteFileW 22726->22728 22727 9e3502 51 API calls 22727->22736 22728->22721 22730 9f33e4 22728->22730 22729 9f36e3 GetDlgItem SetWindowTextW SendMessageW 22729->22736 22731 9e2aa2 _swprintf 51 API calls 22730->22731 22733 9f3404 GetFileAttributesW 22731->22733 22732 9f3723 SendMessageW 22732->22721 22733->22730 22734 9f3419 MoveFileW 22733->22734 22734->22721 22735 9f3431 MoveFileExW 22734->22735 22735->22721 22736->22721 22736->22727 22736->22729 22736->22732 22737 9f339d SHFileOperationW 22736->22737 22737->22726 22740 9f4259 _abort _wcslen 22738->22740 22739 9f44a7 22739->22721 22740->22739 22741 9f4365 22740->22741 22742 9f4480 22740->22742 22771 9e7d7d CompareStringW 22740->22771 22744 9e2780 3 API calls 22741->22744 22742->22739 22746 9f449e ShowWindow 22742->22746 22745 9f437a 22744->22745 22747 9f4399 ShellExecuteExW 22745->22747 22772 9e3216 22745->22772 22746->22739 22747->22739 22749 9f43ac 22747->22749 22751 9f43e5 WaitForInputIdle 22749->22751 22752 9f43d0 IsWindowVisible 22749->22752 22753 9f443b CloseHandle 22749->22753 22750 9f4391 22750->22747 22765 9f46d3 WaitForSingleObject 22751->22765 22752->22751 22754 9f43db ShowWindow 22752->22754 22756 9f4449 22753->22756 22757 9f4454 22753->22757 22754->22751 22780 9e7d7d CompareStringW 22756->22780 22757->22742 22758 9f43fd 22758->22753 22760 9f4410 GetExitCodeProcess 22758->22760 22760->22753 22761 9f4423 22760->22761 22761->22753 22763->22721 22764->22721 22766 9f46ee 22765->22766 22767 9f4733 22765->22767 22768 9f46f1 PeekMessageW 22766->22768 22767->22758 22769 9f4724 WaitForSingleObject 22768->22769 22770 9f4703 GetMessageW TranslateMessage DispatchMessageW 22768->22770 22769->22767 22769->22768 22770->22769 22771->22741 22773 9e3223 22772->22773 22774 9e3233 GetFullPathNameW 22773->22774 22776 9e3282 22773->22776 22775 9e3251 22774->22775 22775->22776 22777 9e35e5 GetCurrentDirectoryW 22775->22777 22776->22750 22778 9e3263 22777->22778 22778->22776 22779 9e3267 GetFullPathNameW 22778->22779 22779->22776 22780->22757 22781 9f5608 22782 9f5612 22781->22782 22783 9f5280 ___delayLoadHelper2@8 17 API calls 22782->22783 22784 9f561f 22783->22784 19665 a01000 19666 a0100b 19665->19666 19668 a01034 19666->19668 19670 a01030 19666->19670 19671 a0131a 19666->19671 19678 a01060 19668->19678 19682 a010a8 19671->19682 19674 a0135f InitializeCriticalSectionAndSpinCount 19675 a0134a 19674->19675 19689 9f63dc 19675->19689 19677 a01376 19677->19666 19679 a0108c 19678->19679 19680 a0106d 19678->19680 19679->19670 19681 a01077 DeleteCriticalSection 19680->19681 19681->19679 19681->19681 19683 a010d8 19682->19683 19686 a010d4 19682->19686 19683->19674 19683->19675 19684 a010f8 19684->19683 19687 a01104 GetProcAddress 19684->19687 19686->19683 19686->19684 19696 a01144 19686->19696 19688 a01114 _unexpected 19687->19688 19688->19683 19690 9f63e5 IsProcessorFeaturePresent 19689->19690 19691 9f63e4 19689->19691 19693 9f6427 19690->19693 19691->19677 19703 9f63ea SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 19693->19703 19695 9f650a 19695->19677 19697 a01165 LoadLibraryExW 19696->19697 19701 a0115a 19696->19701 19698 a01182 GetLastError 19697->19698 19699 a0119a 19697->19699 19698->19699 19702 a0118d LoadLibraryExW 19698->19702 19700 a011b1 FreeLibrary 19699->19700 19699->19701 19700->19701 19701->19686 19702->19699 19703->19695 19704 9f4d3d 19705 9f4c41 19704->19705 19707 9f5280 19705->19707 19733 9f4fde 19707->19733 19709 9f5290 19710 9f52ed 19709->19710 19719 9f5311 19709->19719 19711 9f521e DloadReleaseSectionWriteAccess 8 API calls 19710->19711 19712 9f52f8 RaiseException 19711->19712 19728 9f54e6 19712->19728 19713 9f5389 LoadLibraryExA 19714 9f539c GetLastError 19713->19714 19715 9f53ea 19713->19715 19720 9f53af 19714->19720 19721 9f53c5 19714->19721 19718 9f53f5 FreeLibrary 19715->19718 19722 9f53fc 19715->19722 19716 9f545a GetProcAddress 19717 9f54b8 19716->19717 19724 9f546a GetLastError 19716->19724 19744 9f521e 19717->19744 19718->19722 19719->19713 19719->19715 19719->19717 19719->19722 19720->19715 19720->19721 19723 9f521e DloadReleaseSectionWriteAccess 8 API calls 19721->19723 19722->19716 19722->19717 19725 9f53d0 RaiseException 19723->19725 19726 9f547d 19724->19726 19725->19728 19726->19717 19729 9f521e DloadReleaseSectionWriteAccess 8 API calls 19726->19729 19728->19705 19730 9f549e RaiseException 19729->19730 19731 9f4fde DloadAcquireSectionWriteAccess 8 API calls 19730->19731 19732 9f54b5 19731->19732 19732->19717 19734 9f4fea 19733->19734 19735 9f5010 19733->19735 19752 9f5087 19734->19752 19735->19709 19737 9f4fef 19738 9f500b 19737->19738 19757 9f51b0 19737->19757 19762 9f5011 19738->19762 19742 9f5275 19742->19709 19743 9f5271 RtlReleaseSRWLockExclusive 19743->19709 19745 9f5252 19744->19745 19746 9f5230 19744->19746 19745->19728 19747 9f5087 DloadAcquireSectionWriteAccess 4 API calls 19746->19747 19748 9f5235 19747->19748 19749 9f524d 19748->19749 19750 9f51b0 DloadProtectSection 3 API calls 19748->19750 19772 9f5254 19749->19772 19750->19749 19753 9f5011 DloadReleaseSectionWriteAccess 3 API calls 19752->19753 19754 9f508c 19753->19754 19755 9f50a4 RtlAcquireSRWLockExclusive 19754->19755 19756 9f50a8 19754->19756 19755->19737 19756->19737 19759 9f51c5 DloadProtectSection 19757->19759 19758 9f51cb 19758->19738 19759->19758 19760 9f5200 VirtualProtect 19759->19760 19768 9f50c6 VirtualQuery 19759->19768 19760->19758 19763 9f501f 19762->19763 19766 9f5034 19762->19766 19764 9f5023 GetModuleHandleW 19763->19764 19763->19766 19765 9f5038 GetProcAddress 19764->19765 19764->19766 19765->19766 19767 9f5048 GetProcAddress 19765->19767 19766->19742 19766->19743 19767->19766 19769 9f50e1 19768->19769 19770 9f50ec GetSystemInfo 19769->19770 19771 9f5123 19769->19771 19770->19771 19771->19760 19773 9f5011 DloadReleaseSectionWriteAccess 3 API calls 19772->19773 19774 9f5259 19773->19774 19775 9f5275 19774->19775 19776 9f5271 RtlReleaseSRWLockExclusive 19774->19776 19775->19745 19776->19745 19777 9fe83c 19788 a01f40 19777->19788 19782 9fe859 19784 9ff8ba _free 20 API calls 19782->19784 19785 9fe88e 19784->19785 19786 9fe864 19821 9ff8ba 19786->19821 19789 a01f49 19788->19789 19790 9fe84e 19788->19790 19827 a01e37 19789->19827 19792 a02340 GetEnvironmentStringsW 19790->19792 19793 a02357 19792->19793 19803 a023aa 19792->19803 19794 a0235d WideCharToMultiByte 19793->19794 19797 a02379 19794->19797 19794->19803 19795 a023b3 FreeEnvironmentStringsW 19796 9fe853 19795->19796 19796->19782 19804 9fe894 19796->19804 19798 9ff9e5 __vsnwprintf_l 21 API calls 19797->19798 19799 a0237f 19798->19799 19800 a02386 WideCharToMultiByte 19799->19800 19801 a0239c 19799->19801 19800->19801 19802 9ff8ba _free 20 API calls 19801->19802 19802->19803 19803->19795 19803->19796 19805 9fe8a9 19804->19805 19806 a01546 _unexpected 20 API calls 19805->19806 19817 9fe8d0 19806->19817 19807 9fe934 19808 9ff8ba _free 20 API calls 19807->19808 19809 9fe94e 19808->19809 19809->19786 19810 a01546 _unexpected 20 API calls 19810->19817 19811 9fe936 20447 9fe965 19811->20447 19815 9ff8ba _free 20 API calls 19815->19807 19816 9fe958 19818 9fa446 Concurrency::cancel_current_task 11 API calls 19816->19818 19817->19807 19817->19810 19817->19811 19817->19816 19819 9ff8ba _free 20 API calls 19817->19819 20438 9ff383 19817->20438 19820 9fe964 19818->19820 19819->19817 19822 9ff8c5 RtlFreeHeap 19821->19822 19823 9ff8ee __dosmaperr 19821->19823 19822->19823 19824 9ff8da 19822->19824 19823->19782 19825 9ff9d2 __dosmaperr 18 API calls 19824->19825 19826 9ff8e0 GetLastError 19825->19826 19826->19823 19847 9ff765 GetLastError 19827->19847 19829 a01e44 19867 a01f5e 19829->19867 19831 a01e4c 19876 a01bcb 19831->19876 19834 a01e63 19834->19790 19837 a01ea6 19839 9ff8ba _free 20 API calls 19837->19839 19839->19834 19841 a01ea1 19900 9ff9d2 19841->19900 19843 a01eea 19843->19837 19903 a01aa1 19843->19903 19844 a01ebe 19844->19843 19845 9ff8ba _free 20 API calls 19844->19845 19845->19843 19848 9ff77b 19847->19848 19849 9ff781 19847->19849 19906 a0126b 19848->19906 19853 9ff7d0 SetLastError 19849->19853 19913 a01546 19849->19913 19853->19829 19855 9ff8ba _free 20 API calls 19857 9ff7a1 19855->19857 19860 9ff7dc SetLastError 19857->19860 19858 9ff7b7 19927 9ff5cc 19858->19927 19859 9ff79b 19859->19855 19932 9ff340 19860->19932 19865 9ff8ba _free 20 API calls 19866 9ff7c9 19865->19866 19866->19853 19866->19860 19868 a01f6a ___scrt_is_nonwritable_in_current_image 19867->19868 19869 9ff765 _unexpected 38 API calls 19868->19869 19870 a01f74 19869->19870 19873 a01ff8 _abort 19870->19873 19874 9ff340 _abort 38 API calls 19870->19874 19875 9ff8ba _free 20 API calls 19870->19875 20287 a01041 EnterCriticalSection 19870->20287 20288 a01fef 19870->20288 19873->19831 19874->19870 19875->19870 20292 9fab99 19876->20292 19879 a01bec GetOEMCP 19882 a01c15 19879->19882 19880 a01bfe 19881 a01c03 GetACP 19880->19881 19880->19882 19881->19882 19882->19834 19883 9ff9e5 19882->19883 19884 9ffa23 19883->19884 19888 9ff9f3 _unexpected 19883->19888 19886 9ff9d2 __dosmaperr 20 API calls 19884->19886 19885 9ffa0e RtlAllocateHeap 19887 9ffa21 19885->19887 19885->19888 19886->19887 19887->19837 19890 a02000 19887->19890 19888->19884 19888->19885 19889 9fe06e _unexpected 7 API calls 19888->19889 19889->19888 19891 a01bcb 40 API calls 19890->19891 19892 a0201f 19891->19892 19895 a02070 IsValidCodePage 19892->19895 19897 a02026 19892->19897 19899 a02095 _abort 19892->19899 19893 9f63dc CatchGuardHandler 5 API calls 19894 a01e99 19893->19894 19894->19841 19894->19844 19896 a02082 GetCPInfo 19895->19896 19895->19897 19896->19897 19896->19899 19897->19893 20329 a01ca3 GetCPInfo 19899->20329 19901 9ff7e9 _abort 20 API calls 19900->19901 19902 9ff9d7 19901->19902 19902->19837 20402 a01a5e 19903->20402 19907 a010a8 _unexpected 5 API calls 19906->19907 19908 a01292 19907->19908 19909 a012aa TlsGetValue 19908->19909 19910 a0129e 19908->19910 19909->19910 19911 9f63dc CatchGuardHandler 5 API calls 19910->19911 19912 a012bb 19911->19912 19912->19849 19918 a01553 _unexpected 19913->19918 19914 a01593 19917 9ff9d2 __dosmaperr 19 API calls 19914->19917 19915 a0157e RtlAllocateHeap 19916 9ff793 19915->19916 19915->19918 19916->19859 19920 a012c1 19916->19920 19917->19916 19918->19914 19918->19915 19943 9fe06e 19918->19943 19921 a010a8 _unexpected 5 API calls 19920->19921 19922 a012e8 19921->19922 19923 a01303 TlsSetValue 19922->19923 19924 a012f7 19922->19924 19923->19924 19925 9f63dc CatchGuardHandler 5 API calls 19924->19925 19926 9ff7b0 19925->19926 19926->19858 19926->19859 19959 9ff5a4 19927->19959 20103 a02626 19932->20103 19935 9ff350 19937 9ff378 19935->19937 19938 9ff35a IsProcessorFeaturePresent 19935->19938 20139 9fe4de 19937->20139 19939 9ff365 19938->19939 20133 9fa24f 19939->20133 19948 9fe0b2 19943->19948 19945 9f63dc CatchGuardHandler 5 API calls 19946 9fe0ae 19945->19946 19946->19918 19947 9fe084 19947->19945 19949 9fe0be ___scrt_is_nonwritable_in_current_image 19948->19949 19954 a01041 EnterCriticalSection 19949->19954 19951 9fe0c9 19955 9fe0fb 19951->19955 19953 9fe0f0 _abort 19953->19947 19954->19951 19958 a01091 LeaveCriticalSection 19955->19958 19957 9fe102 19957->19953 19958->19957 19965 9ff4e4 19959->19965 19961 9ff5c8 19962 9ff554 19961->19962 19976 9ff3e8 19962->19976 19964 9ff578 19964->19865 19966 9ff4f0 ___scrt_is_nonwritable_in_current_image 19965->19966 19971 a01041 EnterCriticalSection 19966->19971 19968 9ff4fa 19972 9ff520 19968->19972 19970 9ff518 _abort 19970->19961 19971->19968 19975 a01091 LeaveCriticalSection 19972->19975 19974 9ff52a 19974->19970 19975->19974 19977 9ff3f4 ___scrt_is_nonwritable_in_current_image 19976->19977 19984 a01041 EnterCriticalSection 19977->19984 19979 9ff3fe 19985 9ff71a 19979->19985 19981 9ff416 19989 9ff42c 19981->19989 19983 9ff424 _abort 19983->19964 19984->19979 19986 9ff750 __fassign 19985->19986 19987 9ff729 __fassign 19985->19987 19986->19981 19987->19986 19992 a02f32 19987->19992 20102 a01091 LeaveCriticalSection 19989->20102 19991 9ff436 19991->19983 19993 a02f48 19992->19993 19995 a02fb2 19992->19995 19993->19995 19997 a02f7b 19993->19997 20002 9ff8ba _free 20 API calls 19993->20002 19996 9ff8ba _free 20 API calls 19995->19996 20019 a03000 19995->20019 19998 a02fd4 19996->19998 19999 a02f9d 19997->19999 20007 9ff8ba _free 20 API calls 19997->20007 20000 9ff8ba _free 20 API calls 19998->20000 20001 9ff8ba _free 20 API calls 19999->20001 20003 a02fe7 20000->20003 20004 a02fa7 20001->20004 20006 a02f70 20002->20006 20008 9ff8ba _free 20 API calls 20003->20008 20009 9ff8ba _free 20 API calls 20004->20009 20005 a0306e 20010 9ff8ba _free 20 API calls 20005->20010 20020 a02b11 20006->20020 20013 a02f92 20007->20013 20014 a02ff5 20008->20014 20009->19995 20017 a03074 20010->20017 20012 9ff8ba 20 API calls _free 20018 a0300e 20012->20018 20048 a02c0f 20013->20048 20016 9ff8ba _free 20 API calls 20014->20016 20016->20019 20017->19986 20018->20005 20018->20012 20060 a030a5 20019->20060 20021 a02b22 20020->20021 20022 a02c0b 20020->20022 20023 a02b33 20021->20023 20025 9ff8ba _free 20 API calls 20021->20025 20022->19997 20024 a02b45 20023->20024 20026 9ff8ba _free 20 API calls 20023->20026 20025->20023 20026->20024 20049 a02c74 20048->20049 20050 a02c1c 20048->20050 20049->19999 20051 a02c2c 20050->20051 20052 9ff8ba _free 20 API calls 20050->20052 20052->20051 20061 a030d0 20060->20061 20062 a030b2 20060->20062 20061->20018 20062->20061 20066 a02cb4 20062->20066 20065 9ff8ba _free 20 API calls 20065->20061 20067 a02d92 20066->20067 20068 a02cc5 20066->20068 20067->20065 20069 a02c78 __fassign 20 API calls 20068->20069 20070 a02ccd 20069->20070 20102->19991 20142 a02594 20103->20142 20106 a02681 20107 a0268d _unexpected 20106->20107 20111 a026ba _abort 20107->20111 20114 a026b4 _abort 20107->20114 20156 9ff7e9 GetLastError 20107->20156 20109 a02706 20110 9ff9d2 __dosmaperr 20 API calls 20109->20110 20112 a0270b 20110->20112 20118 a02732 20111->20118 20178 a01041 EnterCriticalSection 20111->20178 20175 9fa419 20112->20175 20114->20109 20114->20111 20132 a026e9 20114->20132 20119 a02791 20118->20119 20121 a02789 20118->20121 20129 a027bc 20118->20129 20179 a01091 LeaveCriticalSection 20118->20179 20119->20129 20180 a02678 20119->20180 20124 9fe4de _abort 28 API calls 20121->20124 20124->20119 20126 9ff765 _unexpected 38 API calls 20130 a0281f 20126->20130 20128 a02678 _abort 38 API calls 20128->20129 20183 a02841 20129->20183 20131 9ff765 _unexpected 38 API calls 20130->20131 20130->20132 20131->20132 20187 a087a0 20132->20187 20134 9fa26b _abort 20133->20134 20135 9fa297 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 20134->20135 20138 9fa368 _abort 20135->20138 20136 9f63dc CatchGuardHandler 5 API calls 20137 9fa386 20136->20137 20137->19937 20138->20136 20206 9fe2a9 20139->20206 20145 a0253a 20142->20145 20144 9ff345 20144->19935 20144->20106 20146 a02546 ___scrt_is_nonwritable_in_current_image 20145->20146 20151 a01041 EnterCriticalSection 20146->20151 20148 a02554 20152 a02588 20148->20152 20150 a0257b _abort 20150->20144 20151->20148 20155 a01091 LeaveCriticalSection 20152->20155 20154 a02592 20154->20150 20155->20154 20157 9ff808 20156->20157 20158 9ff802 20156->20158 20159 a01546 _unexpected 17 API calls 20157->20159 20162 9ff85f SetLastError 20157->20162 20160 a0126b _unexpected 11 API calls 20158->20160 20161 9ff81a 20159->20161 20160->20157 20164 9ff822 20161->20164 20165 a012c1 _unexpected 11 API calls 20161->20165 20163 9ff868 20162->20163 20163->20114 20166 9ff8ba _free 17 API calls 20164->20166 20167 9ff837 20165->20167 20168 9ff828 20166->20168 20167->20164 20169 9ff83e 20167->20169 20170 9ff856 SetLastError 20168->20170 20171 9ff5cc _unexpected 17 API calls 20169->20171 20170->20163 20172 9ff849 20171->20172 20173 9ff8ba _free 17 API calls 20172->20173 20174 9ff84f 20173->20174 20174->20162 20174->20170 20190 9fa39e 20175->20190 20177 9fa425 20177->20132 20178->20118 20179->20121 20181 9ff765 _unexpected 38 API calls 20180->20181 20182 a0267d 20181->20182 20182->20128 20184 a02847 20183->20184 20186 a02810 20183->20186 20205 a01091 LeaveCriticalSection 20184->20205 20186->20126 20186->20130 20186->20132 20188 9f63dc CatchGuardHandler 5 API calls 20187->20188 20189 a087aa 20188->20189 20189->20189 20191 9ff7e9 _abort 20 API calls 20190->20191 20192 9fa3b4 20191->20192 20193 9fa413 20192->20193 20194 9fa3c2 20192->20194 20201 9fa446 IsProcessorFeaturePresent 20193->20201 20198 9f63dc CatchGuardHandler 5 API calls 20194->20198 20196 9fa418 20197 9fa39e ___std_exception_copy 26 API calls 20196->20197 20199 9fa425 20197->20199 20200 9fa3e9 20198->20200 20199->20177 20200->20177 20202 9fa451 20201->20202 20203 9fa24f _abort 8 API calls 20202->20203 20204 9fa466 GetCurrentProcess TerminateProcess 20203->20204 20204->20196 20205->20186 20207 9fe2b5 _unexpected 20206->20207 20208 9fe2ce 20207->20208 20209 9fe2bc 20207->20209 20230 a01041 EnterCriticalSection 20208->20230 20242 9fe403 GetModuleHandleW 20209->20242 20213 9fe373 20231 9fe3b3 20213->20231 20218 9fe34a 20220 9fe362 20218->20220 20255 9ff071 20218->20255 20219 9fe2d5 20219->20213 20219->20218 20252 9fedc0 20219->20252 20226 9ff071 _abort 5 API calls 20220->20226 20221 9fe3bc 20224 a087a0 _abort 5 API calls 20221->20224 20222 9fe390 20234 9fe3c2 20222->20234 20229 9fe3c1 20224->20229 20226->20213 20230->20219 20259 a01091 LeaveCriticalSection 20231->20259 20233 9fe38c 20233->20221 20233->20222 20260 a01486 20234->20260 20243 9fe2c1 20242->20243 20243->20208 20244 9fe447 GetModuleHandleExW 20243->20244 20245 9fe494 20244->20245 20246 9fe471 GetProcAddress 20244->20246 20247 9fe49a FreeLibrary 20245->20247 20248 9fe4a3 20245->20248 20250 9fe486 20246->20250 20247->20248 20249 9f63dc CatchGuardHandler 5 API calls 20248->20249 20251 9fe2cd 20249->20251 20250->20245 20251->20208 20266 9feaf9 20252->20266 20256 9ff0a0 20255->20256 20257 9f63dc CatchGuardHandler 5 API calls 20256->20257 20258 9ff0c9 20257->20258 20258->20220 20259->20233 20261 a014a1 20260->20261 20262 a014ab 20260->20262 20264 9f63dc CatchGuardHandler 5 API calls 20261->20264 20263 a010a8 _unexpected 5 API calls 20262->20263 20263->20261 20265 9fe3cc 20264->20265 20269 9feaa8 20266->20269 20270 9feab4 ___scrt_is_nonwritable_in_current_image 20269->20270 20277 a01041 EnterCriticalSection 20270->20277 20272 9feac2 20278 9feb49 20272->20278 20277->20272 20281 9feb71 20278->20281 20282 9feb69 20278->20282 20279 9f63dc CatchGuardHandler 5 API calls 20281->20282 20283 9ff8ba _free 20 API calls 20281->20283 20282->20279 20283->20282 20287->19870 20291 a01091 LeaveCriticalSection 20288->20291 20290 a01ff6 20290->19870 20291->20290 20293 9fabb6 20292->20293 20299 9fabac 20292->20299 20294 9ff765 _unexpected 38 API calls 20293->20294 20293->20299 20295 9fabd7 20294->20295 20300 9ffcdd 20295->20300 20299->19879 20299->19880 20301 9fabf0 20300->20301 20302 9ffcf0 20300->20302 20304 9ffd0a 20301->20304 20302->20301 20308 a0317f 20302->20308 20305 9ffd1d 20304->20305 20307 9ffd32 20304->20307 20306 a01f5e __fassign 38 API calls 20305->20306 20305->20307 20306->20307 20307->20299 20309 a0318b ___scrt_is_nonwritable_in_current_image 20308->20309 20310 9ff765 _unexpected 38 API calls 20309->20310 20311 a03194 20310->20311 20312 a031e2 _abort 20311->20312 20320 a01041 EnterCriticalSection 20311->20320 20312->20301 20314 a031b2 20321 a031f6 20314->20321 20319 9ff340 _abort 38 API calls 20319->20312 20320->20314 20322 a031c6 20321->20322 20323 a03204 __fassign 20321->20323 20325 a031e5 20322->20325 20323->20322 20324 a02f32 __fassign 20 API calls 20323->20324 20324->20322 20328 a01091 LeaveCriticalSection 20325->20328 20327 a031d9 20327->20312 20327->20319 20328->20327 20330 a01cdd 20329->20330 20338 a01d87 20329->20338 20339 a02d98 20330->20339 20333 9f63dc CatchGuardHandler 5 API calls 20335 a01e33 20333->20335 20335->19897 20338->20333 20340 9fab99 __fassign 38 API calls 20339->20340 20341 a02db8 MultiByteToWideChar 20340->20341 20343 a02df6 20341->20343 20344 a02e8e 20341->20344 20346 9ff9e5 __vsnwprintf_l 21 API calls 20343->20346 20349 a02e17 _abort __vsnwprintf_l 20343->20349 20345 9f63dc CatchGuardHandler 5 API calls 20344->20345 20347 a01d3e 20345->20347 20346->20349 20353 a00f91 20347->20353 20348 a02e88 20358 a00fdc 20348->20358 20349->20348 20351 a02e5c MultiByteToWideChar 20349->20351 20351->20348 20352 a02e78 GetStringTypeW 20351->20352 20352->20348 20354 9fab99 __fassign 38 API calls 20353->20354 20355 a00fa4 20354->20355 20362 a00d74 20355->20362 20359 a00fe8 20358->20359 20361 a00ff9 20358->20361 20360 9ff8ba _free 20 API calls 20359->20360 20359->20361 20360->20361 20361->20344 20363 a00d8f __vsnwprintf_l 20362->20363 20364 a00db5 MultiByteToWideChar 20363->20364 20365 a00f69 20364->20365 20366 a00ddf 20364->20366 20367 9f63dc CatchGuardHandler 5 API calls 20365->20367 20369 9ff9e5 __vsnwprintf_l 21 API calls 20366->20369 20371 a00e00 __vsnwprintf_l 20366->20371 20368 a00f7c 20367->20368 20369->20371 20384 a00eb5 20371->20384 20403 a01a6a ___scrt_is_nonwritable_in_current_image 20402->20403 20410 a01041 EnterCriticalSection 20403->20410 20405 a01a74 20411 a01ac9 20405->20411 20410->20405 20423 a021f1 20411->20423 20413 a01b17 20414 a021f1 __vsnwprintf_l 26 API calls 20413->20414 20415 a01b33 20414->20415 20416 a021f1 __vsnwprintf_l 26 API calls 20415->20416 20417 a01b51 20416->20417 20424 a02202 20423->20424 20433 a021fe __InternalCxxFrameHandler 20423->20433 20425 a02209 20424->20425 20426 a0221c _abort 20424->20426 20427 9ff9d2 __dosmaperr 20 API calls 20425->20427 20430 a02253 20426->20430 20431 a0224a 20426->20431 20426->20433 20428 a0220e 20427->20428 20429 9fa419 ___std_exception_copy 26 API calls 20428->20429 20429->20433 20430->20433 20435 9ff9d2 __dosmaperr 20 API calls 20430->20435 20432 9ff9d2 __dosmaperr 20 API calls 20431->20432 20434 a0224f 20432->20434 20433->20413 20436 9fa419 ___std_exception_copy 26 API calls 20434->20436 20435->20434 20436->20433 20439 9ff39e 20438->20439 20440 9ff390 20438->20440 20441 9ff9d2 __dosmaperr 20 API calls 20439->20441 20440->20439 20442 9ff3b5 20440->20442 20446 9ff3a6 20441->20446 20444 9ff3b0 20442->20444 20445 9ff9d2 __dosmaperr 20 API calls 20442->20445 20443 9fa419 ___std_exception_copy 26 API calls 20443->20444 20444->19817 20445->20446 20446->20443 20448 9fe972 20447->20448 20449 9fe93c 20447->20449 20450 9fe989 20448->20450 20452 9ff8ba _free 20 API calls 20448->20452 20449->19815 20451 9ff8ba _free 20 API calls 20450->20451 20451->20449 20452->20448 20459 9f3939 20460 9f3942 GetTempPathW 20459->20460 20465 9f3245 _wcslen _wcsrchr 20459->20465 20466 9f3962 20460->20466 20463 9f3ebc 20465->20463 20469 9f3519 SetWindowTextW 20465->20469 20475 9f3307 SetFileAttributesW 20465->20475 20487 9f3321 _abort _wcslen 20465->20487 20495 9e7d7d CompareStringW 20465->20495 20496 9f115d GetCurrentDirectoryW 20465->20496 20501 9e2b4b 20465->20501 20505 9e2ad4 20465->20505 20508 9f1ffe 20465->20508 20514 9f1e84 20465->20514 20467 9f3999 SetDlgItemTextW 20466->20467 20489 9e2aa2 20466->20489 20492 9e2780 20466->20492 20467->20465 20471 9f39b6 20467->20471 20469->20465 20471->20465 20473 9f3a9c EndDialog 20471->20473 20473->20465 20477 9f33c1 GetFileAttributesW 20475->20477 20475->20487 20477->20465 20479 9f33d3 DeleteFileW 20477->20479 20479->20465 20481 9f33e4 20479->20481 20480 9f36e3 GetDlgItem SetWindowTextW SendMessageW 20480->20487 20482 9e2aa2 _swprintf 51 API calls 20481->20482 20484 9f3404 GetFileAttributesW 20482->20484 20483 9f3723 SendMessageW 20483->20465 20484->20481 20485 9f3419 MoveFileW 20484->20485 20485->20465 20486 9f3431 MoveFileExW 20485->20486 20486->20465 20487->20465 20487->20480 20487->20483 20488 9f339d SHFileOperationW 20487->20488 20497 9e3502 20487->20497 20488->20477 20518 9e1b14 20489->20518 20901 9e2792 20492->20901 20495->20465 20496->20465 20498 9e3517 20497->20498 20499 9e2aa2 _swprintf 51 API calls 20498->20499 20500 9e352e _wcslen 20498->20500 20499->20500 20500->20487 20504 9e2b59 20501->20504 20502 9e2bec 20502->20465 20503 9e2c15 6 API calls 20503->20504 20504->20502 20504->20503 20506 9e2adf FindClose 20505->20506 20507 9e2ae6 20505->20507 20506->20507 20507->20465 20509 9f2008 ___std_exception_copy 20508->20509 20513 9f2027 _wcslen 20509->20513 20915 9e18c4 20509->20915 20511 9f1e84 ExpandEnvironmentStringsW 20511->20513 20512 9f20c9 20512->20465 20513->20511 20513->20512 20515 9f1e8e 20514->20515 20516 9f1f60 ExpandEnvironmentStringsW 20515->20516 20517 9f1f7d 20515->20517 20516->20517 20517->20465 20519 9e1b2b __vsnwprintf_l 20518->20519 20522 9fc537 20519->20522 20525 9fa5fa 20522->20525 20526 9fa63a 20525->20526 20527 9fa622 20525->20527 20526->20527 20529 9fa642 20526->20529 20528 9ff9d2 __dosmaperr 20 API calls 20527->20528 20530 9fa627 20528->20530 20531 9fab99 __fassign 38 API calls 20529->20531 20532 9fa419 ___std_exception_copy 26 API calls 20530->20532 20533 9fa652 20531->20533 20540 9fa632 20532->20540 20542 9fab64 20533->20542 20534 9f63dc CatchGuardHandler 5 API calls 20536 9e1b35 20534->20536 20536->20466 20540->20534 20543 9fab83 __vswprintf_c_l 20542->20543 20544 9ff9d2 __dosmaperr 20 API calls 20543->20544 20545 9fa6ca 20544->20545 20546 9faf49 20545->20546 20562 9fc212 20546->20562 20548 9faf59 __vswprintf_c_l 20549 9fa6d5 20548->20549 20550 9faf6e 20548->20550 20569 9fb102 20548->20569 20576 9fb9b4 20548->20576 20581 9fb1ef 20548->20581 20586 9fb381 20548->20586 20617 9fb72c 20548->20617 20559 9fac1c 20549->20559 20551 9ff9d2 __dosmaperr 20 API calls 20550->20551 20552 9faf73 20551->20552 20553 9fa419 ___std_exception_copy 26 API calls 20552->20553 20553->20549 20560 9ff8ba _free 20 API calls 20559->20560 20561 9fac2c 20560->20561 20561->20540 20563 9fc22a 20562->20563 20564 9fc217 20562->20564 20563->20548 20565 9ff9d2 __dosmaperr 20 API calls 20564->20565 20566 9fc21c 20565->20566 20567 9fa419 ___std_exception_copy 26 API calls 20566->20567 20568 9fc227 20567->20568 20568->20548 20570 9fb107 __vswprintf_c_l 20569->20570 20571 9fb11e 20570->20571 20572 9ff9d2 __dosmaperr 20 API calls 20570->20572 20571->20548 20573 9fb110 20572->20573 20574 9fa419 ___std_exception_copy 26 API calls 20573->20574 20575 9fb11b 20574->20575 20575->20548 20577 9fb9bb 20576->20577 20578 9fb9c5 20576->20578 20641 9fadcf 20577->20641 20578->20548 20582 9fb1f6 20581->20582 20583 9fb200 20581->20583 20584 9fadcf __vswprintf_c_l 39 API calls 20582->20584 20583->20548 20585 9fb1ff 20584->20585 20585->20548 20587 9fb38a 20586->20587 20588 9fb3a4 20586->20588 20590 9fb7be 20587->20590 20591 9fb753 20587->20591 20592 9fb3d5 20587->20592 20589 9ff9d2 __dosmaperr 20 API calls 20588->20589 20588->20592 20593 9fb3c1 20589->20593 20595 9fb7c5 20590->20595 20596 9fb804 20590->20596 20602 9fb795 20590->20602 20591->20602 20604 9fb75f 20591->20604 20592->20548 20594 9fa419 ___std_exception_copy 26 API calls 20593->20594 20598 9fb3cc 20594->20598 20599 9fb76c 20595->20599 20600 9fb7ca 20595->20600 20704 9fc0d3 20596->20704 20598->20548 20614 9fb77a __vswprintf_c_l 20599->20614 20616 9fb78e __vswprintf_c_l 20599->20616 20696 9fbc5c 20599->20696 20600->20602 20603 9fb7cf 20600->20603 20601 9fb7a5 20601->20616 20676 9fbe5e 20601->20676 20602->20614 20602->20616 20690 9fbef6 20602->20690 20607 9fb7d4 20603->20607 20608 9fb7e2 20603->20608 20604->20599 20604->20601 20604->20614 20607->20616 20680 9fc0b4 20607->20680 20684 9fc040 20608->20684 20610 9f63dc CatchGuardHandler 5 API calls 20613 9fb985 20610->20613 20613->20548 20614->20616 20707 9fc35b 20614->20707 20616->20610 20618 9fb7be 20617->20618 20619 9fb753 20617->20619 20620 9fb795 20618->20620 20622 9fb7c5 20618->20622 20623 9fb804 20618->20623 20619->20620 20621 9fb75f 20619->20621 20628 9fbef6 __vsnwprintf_l 26 API calls 20620->20628 20638 9fb77a __vswprintf_c_l 20620->20638 20640 9fb78e __vswprintf_c_l 20620->20640 20627 9fb7a5 20621->20627 20632 9fb76c 20621->20632 20621->20638 20624 9fb7ca 20622->20624 20622->20632 20625 9fc0d3 __vsnwprintf_l 26 API calls 20623->20625 20624->20620 20626 9fb7cf 20624->20626 20625->20638 20630 9fb7d4 20626->20630 20631 9fb7e2 20626->20631 20635 9fbe5e __vswprintf_c_l 40 API calls 20627->20635 20627->20640 20628->20638 20629 9fbc5c __vswprintf_c_l 48 API calls 20629->20638 20636 9fc0b4 __vsnwprintf_l 26 API calls 20630->20636 20630->20640 20633 9fc040 __vsnwprintf_l 26 API calls 20631->20633 20632->20629 20632->20638 20632->20640 20633->20638 20634 9f63dc CatchGuardHandler 5 API calls 20637 9fb985 20634->20637 20635->20638 20636->20638 20637->20548 20639 9fc35b __vswprintf_c_l 40 API calls 20638->20639 20638->20640 20639->20640 20640->20634 20644 9ffa5f 20641->20644 20645 9ffa7a __vswprintf_c_l 20644->20645 20648 9fd437 20645->20648 20649 9fc212 __vswprintf_c_l 26 API calls 20648->20649 20652 9fd449 20649->20652 20650 9fd486 20651 9fab99 __fassign 38 API calls 20650->20651 20658 9fd492 20651->20658 20652->20650 20653 9fd460 20652->20653 20665 9fadf8 20652->20665 20654 9ff9d2 __dosmaperr 20 API calls 20653->20654 20655 9fd465 20654->20655 20657 9fa419 ___std_exception_copy 26 API calls 20655->20657 20657->20665 20659 9fd4b8 20658->20659 20666 a00ba6 20658->20666 20660 9fd78f 20659->20660 20670 9fdb44 20659->20670 20661 9fdb44 __vswprintf_c_l 26 API calls 20660->20661 20663 9fdab2 __vswprintf_c_l 20661->20663 20664 9ff9d2 __dosmaperr 20 API calls 20663->20664 20663->20665 20664->20665 20665->20548 20667 a00bbf 20666->20667 20669 a00bbb 20666->20669 20668 a00bd7 GetStringTypeW 20667->20668 20667->20669 20668->20669 20669->20658 20671 9fdb6c 20670->20671 20672 9fdb57 20670->20672 20671->20660 20672->20671 20673 9ff9d2 __dosmaperr 20 API calls 20672->20673 20674 9fdb61 20673->20674 20675 9fa419 ___std_exception_copy 26 API calls 20674->20675 20675->20671 20677 9fbe8a __vswprintf_c_l 20676->20677 20679 9fbeb9 20677->20679 20711 9ffa8b 20677->20711 20679->20614 20681 9fc0c0 20680->20681 20682 9fbef6 __vsnwprintf_l 26 API calls 20681->20682 20683 9fc0d2 20682->20683 20683->20614 20685 9fc055 __vsnwprintf_l 20684->20685 20686 9ff9d2 __dosmaperr 20 API calls 20685->20686 20689 9fc069 20685->20689 20687 9fc05e 20686->20687 20688 9fa419 ___std_exception_copy 26 API calls 20687->20688 20688->20689 20689->20614 20692 9fbf07 __vsnwprintf_l 20690->20692 20691 9fbf31 __vsnwprintf_l 20691->20614 20692->20691 20693 9ff9d2 __dosmaperr 20 API calls 20692->20693 20694 9fbf26 20693->20694 20695 9fa419 ___std_exception_copy 26 API calls 20694->20695 20695->20691 20697 9fbc78 20696->20697 20726 9fa797 20697->20726 20699 9fbcc5 __vsnwprintf_l 20736 a00602 20699->20736 20703 9fbd5e __vsnwprintf_l 20703->20614 20703->20703 20705 9fbef6 __vsnwprintf_l 26 API calls 20704->20705 20706 9fc0ea 20705->20706 20706->20614 20709 9fc36d __vswprintf_c_l 20707->20709 20710 9fc3bb __vswprintf_c_l 20707->20710 20708 9ffa8b __fassign 40 API calls 20708->20709 20709->20708 20709->20710 20710->20616 20712 9ffa9c 20711->20712 20713 9ffaa8 20711->20713 20712->20713 20714 9fab99 __fassign 38 API calls 20712->20714 20713->20679 20715 9ffac8 20714->20715 20715->20713 20723 a00d3b 20715->20723 20718 9ffb3c MultiByteToWideChar 20718->20713 20720 9ffb2c 20718->20720 20719 9ffafc 20719->20720 20721 9ffb0a MultiByteToWideChar 20719->20721 20720->20713 20722 9ff9d2 __dosmaperr 20 API calls 20720->20722 20721->20713 20721->20720 20722->20713 20724 9fab99 __fassign 38 API calls 20723->20724 20725 9ffaf6 20724->20725 20725->20718 20725->20719 20727 9fa7b3 20726->20727 20728 9fa7c2 20726->20728 20729 9ff9d2 __dosmaperr 20 API calls 20727->20729 20730 9fa7b8 20728->20730 20731 9ff9e5 __vsnwprintf_l 21 API calls 20728->20731 20729->20730 20730->20699 20732 9fa7e9 20731->20732 20733 9fa800 20732->20733 20768 9fac36 20732->20768 20735 9ff8ba _free 20 API calls 20733->20735 20735->20730 20737 a00612 20736->20737 20738 a00628 20736->20738 20739 9ff9d2 __dosmaperr 20 API calls 20737->20739 20740 a0063c 20738->20740 20746 a00652 __vsnwprintf_l 20738->20746 20742 a00617 20739->20742 20741 9ff9d2 __dosmaperr 20 API calls 20740->20741 20743 a00641 20741->20743 20744 9fa419 ___std_exception_copy 26 API calls 20742->20744 20745 9fa419 ___std_exception_copy 26 API calls 20743->20745 20758 9fbd3f 20744->20758 20745->20758 20747 a006ae 20746->20747 20749 a0068c __vsnwprintf_l 20746->20749 20748 a006cc 20747->20748 20750 a006d1 20747->20750 20751 a006f5 20748->20751 20752 a0072b 20748->20752 20771 a004d6 20749->20771 20781 9ffdc1 20750->20781 20754 a00713 20751->20754 20755 a006fa 20751->20755 20809 a000c4 20752->20809 20802 a002aa 20754->20802 20792 a0040e 20755->20792 20758->20703 20761 9fad17 20758->20761 20884 9fdffa 20761->20884 20763 9fad29 20764 9fad3d 20763->20764 20888 9ff92c 20763->20888 20766 9fdffa __vsnwprintf_l 46 API calls 20764->20766 20769 9ff8ba _free 20 API calls 20768->20769 20770 9fac45 20769->20770 20770->20733 20772 a004fc 20771->20772 20774 a00511 20771->20774 20773 9f63dc CatchGuardHandler 5 API calls 20772->20773 20775 a0050d 20773->20775 20776 9ff383 ___std_exception_copy 26 API calls 20774->20776 20775->20758 20777 a005b4 20776->20777 20777->20772 20778 a005c1 20777->20778 20779 9fa446 Concurrency::cancel_current_task 11 API calls 20778->20779 20780 a005cd 20779->20780 20782 9ffdd5 20781->20782 20783 9fab99 __fassign 38 API calls 20782->20783 20784 9ffde7 20783->20784 20785 9ffdef 20784->20785 20786 9ffe03 20784->20786 20787 9ff9d2 __dosmaperr 20 API calls 20785->20787 20790 a000c4 __vsnwprintf_l 40 API calls 20786->20790 20791 9ffdfe __alldvrm _abort __vsnwprintf_l _strrchr 20786->20791 20788 9ffdf4 20787->20788 20790->20791 20791->20758 20816 a03cfe 20792->20816 20803 a03cfe __vsnwprintf_l 28 API calls 20802->20803 20804 a002d7 20803->20804 20805 a0376a __vsnwprintf_l 26 API calls 20804->20805 20806 a0030f 20805->20806 20810 a03cfe __vsnwprintf_l 28 API calls 20809->20810 20811 a000ec 20810->20811 20812 a0376a __vsnwprintf_l 26 API calls 20811->20812 20813 a00131 20812->20813 20814 a00138 20813->20814 20815 a0015f __vsnwprintf_l 38 API calls 20813->20815 20814->20758 20815->20814 20820 a03d33 __vsnwprintf_l 20816->20820 20817 a03d6f 20818 9ff383 ___std_exception_copy 26 API calls 20817->20818 20820->20817 20826 a03dc2 20820->20826 20828 a05870 __vsnwprintf_l 22 API calls 20826->20828 20885 9fe008 20884->20885 20887 9fe012 20884->20887 20893 9fdfc6 20885->20893 20887->20763 20889 9ff93a 20888->20889 20890 9ff948 20888->20890 20890->20763 20894 9fde42 __vsnwprintf_l 46 API calls 20893->20894 20895 9fdfdb 20894->20895 20895->20887 20909 9f5690 20901->20909 20904 9e2789 20904->20466 20905 9e27b0 20911 9e35e5 20905->20911 20907 9e27c4 20907->20904 20908 9e27c8 GetFileAttributesW 20907->20908 20908->20904 20910 9e279f GetFileAttributesW 20909->20910 20910->20904 20910->20905 20912 9e35f2 _wcslen 20911->20912 20913 9e369a GetCurrentDirectoryW 20912->20913 20914 9e361b _wcslen 20912->20914 20913->20914 20914->20907 20920 9e18d7 20915->20920 20917 9e18cc 20923 9e1a76 20917->20923 20928 9e1667 20920->20928 20922 9e18e1 20922->20917 20925 9e1a86 20923->20925 20924 9e18d5 20924->20513 20925->20924 21038 9f6c20 20925->21038 20927 9e1aa8 20929 9e1678 20928->20929 20932 9e73d1 20929->20932 20931 9e1680 20931->20922 20933 9e73de 20932->20933 20935 9e73ed 20933->20935 20937 9e7612 20933->20937 20934 9e748a 20948 9e4ba7 53 API calls 20934->20948 20935->20934 20940 9e7420 20935->20940 20941 9e7436 20935->20941 20942 9e74b6 20935->20942 20943 9e7575 20935->20943 20944 9e7443 20935->20944 20949 9e74f6 20935->20949 20951 9e746a 20935->20951 20953 9e752c 20935->20953 20965 9e7412 20935->20965 20936 9e4ba7 53 API calls 20945 9e7471 20936->20945 20938 9e7648 20937->20938 20939 9e7624 20937->20939 20937->20940 20947 9e4ba7 53 API calls 20938->20947 20946 9e4ba7 53 API calls 20939->20946 20940->20931 20979 9f1ad3 20941->20979 20950 9e4ba7 53 API calls 20942->20950 20952 9e4ba7 53 API calls 20943->20952 20983 9e4ba7 20944->20983 20956 9f22e6 69 API calls 20945->20956 20955 9e7631 20946->20955 20966 9e7643 20947->20966 20948->20965 20949->20940 20949->20943 20949->20951 20949->20953 20957 9e74c6 20950->20957 20960 9e4ba7 53 API calls 20951->20960 20962 9e7582 20952->20962 20953->20936 20953->20940 20961 9e2aa2 _swprintf 51 API calls 20955->20961 20956->20940 20963 9f22e6 69 API calls 20957->20963 20960->20945 20961->20966 20964 9e2aa2 _swprintf 51 API calls 20962->20964 20963->20940 20967 9e7594 20964->20967 20970 9f22e6 20965->20970 20968 9e4ba7 53 API calls 20966->20968 20969 9f22e6 69 API calls 20967->20969 20968->20940 20969->20940 20971 9f22ef 20970->20971 20977 9f233c 20970->20977 20972 9f22fb GetLastError 20971->20972 20971->20977 20973 9e1b14 __vswprintf_c_l 51 API calls 20972->20973 20974 9f231e 20973->20974 20975 9f1ad3 16 API calls 20974->20975 20976 9f2329 20975->20976 20976->20977 20978 9f2330 SetLastError 20976->20978 20977->20940 20978->20977 20981 9f1ae0 20979->20981 20980 9f1b0d 20980->20940 20981->20980 20987 9f3f86 20981->20987 20984 9e4bb7 20983->20984 21002 9e4bd8 20984->21002 20997 9f20d8 PeekMessageW 20987->20997 20990 9f3fe8 SendMessageW SendMessageW 20992 9f4024 20990->20992 20993 9f4043 SendMessageW SendMessageW SendMessageW 20990->20993 20991 9f3fb4 20994 9f3fbf ShowWindow SendMessageW SendMessageW 20991->20994 20992->20993 20995 9f4099 SendMessageW 20993->20995 20996 9f4076 SendMessageW 20993->20996 20994->20990 20995->20980 20996->20995 20998 9f212c GetDlgItem 20997->20998 20999 9f20f3 GetMessageW 20997->20999 20998->20990 20998->20991 21000 9f2109 IsDialogMessageW 20999->21000 21001 9f2118 TranslateMessage DispatchMessageW 20999->21001 21000->20998 21000->21001 21001->20998 21008 9e3f40 21002->21008 21005 9e4bfb LoadStringW 21006 9e4bd5 21005->21006 21007 9e4c12 LoadStringW 21005->21007 21006->20965 21007->21006 21013 9e3e7c 21008->21013 21010 9e3f5d 21011 9e3f72 21010->21011 21021 9e3f80 21010->21021 21011->21005 21011->21006 21014 9e3e94 21013->21014 21015 9e3f14 _strncpy 21013->21015 21017 9e3eb8 21014->21017 21025 9e7b9f WideCharToMultiByte 21014->21025 21015->21010 21020 9e3ee9 21017->21020 21027 9e4b41 21017->21027 21030 9fc673 21020->21030 21022 9e3f8f 21021->21022 21024 9e3fa4 21021->21024 21023 9fc673 26 API calls 21022->21023 21023->21024 21024->21011 21026 9e7bcc 21025->21026 21026->21017 21028 9e4b5b __vsnprintf 50 API calls 21027->21028 21029 9e4b57 21028->21029 21029->21020 21031 9fc68f 21030->21031 21032 9ff9d2 __dosmaperr 20 API calls 21031->21032 21035 9fc6a3 21031->21035 21033 9fc698 21032->21033 21034 9fa419 ___std_exception_copy 26 API calls 21033->21034 21034->21035 21036 9f63dc CatchGuardHandler 5 API calls 21035->21036 21037 9fc722 21036->21037 21037->21015 21039 9f6c67 RaiseException 21038->21039 21040 9f6c3a 21038->21040 21039->20927 21040->21039 23840 9f4c37 23841 9f4c41 23840->23841 23842 9f5280 ___delayLoadHelper2@8 17 API calls 23841->23842 23842->23841 23853 a02461 23856 a02487 23853->23856 23857 a02483 23853->23857 23854 9f63dc CatchGuardHandler 5 API calls 23855 a024e9 23854->23855 23856->23857 23858 a00a50 31 API calls 23856->23858 23857->23854 23858->23856 21213 9f2350 21214 9f235a __EH_prolog 21213->21214 21385 9e11c6 21214->21385 21217 9f23b1 21218 9f2a8b 21463 9f415e 21218->21463 21219 9f239a 21219->21217 21221 9f240b 21219->21221 21222 9f23a8 21219->21222 21228 9f249e GetDlgItemTextW 21221->21228 21232 9f2421 21221->21232 21224 9f23ac 21222->21224 21225 9f23e8 21222->21225 21224->21217 21234 9e4ba7 53 API calls 21224->21234 21225->21217 21236 9f24cf EndDialog 21225->21236 21226 9f2aa6 SendMessageW 21227 9f2ab4 21226->21227 21229 9f2ace GetDlgItem SendMessageW 21227->21229 21230 9f2abd SendDlgItemMessageW 21227->21230 21228->21225 21231 9f24db 21228->21231 21481 9f115d GetCurrentDirectoryW 21229->21481 21230->21229 21237 9f24f0 GetDlgItem 21231->21237 21383 9f24e4 21231->21383 21233 9e4ba7 53 API calls 21232->21233 21240 9f243e SetDlgItemTextW 21233->21240 21241 9f23cb 21234->21241 21236->21217 21238 9f2527 SetFocus 21237->21238 21239 9f2504 SendMessageW SendMessageW 21237->21239 21243 9f2537 21238->21243 21258 9f2543 21238->21258 21239->21238 21244 9f2449 21240->21244 21495 9e1100 SHGetMalloc 21241->21495 21242 9f2afe GetDlgItem 21246 9f2b1b 21242->21246 21247 9f2b21 SetWindowTextW 21242->21247 21248 9e4ba7 53 API calls 21243->21248 21244->21217 21253 9f2456 GetMessageW 21244->21253 21246->21247 21482 9f16c0 GetClassNameW 21247->21482 21254 9f2541 21248->21254 21249 9f23d2 21249->21217 21259 9f2d6d SetDlgItemTextW 21249->21259 21250 9f29d1 21255 9e4ba7 53 API calls 21250->21255 21253->21217 21257 9f246d IsDialogMessageW 21253->21257 21264 9f3f86 16 API calls 21254->21264 21260 9f29e1 SetDlgItemTextW 21255->21260 21257->21244 21263 9f247c TranslateMessage DispatchMessageW 21257->21263 21267 9e4ba7 53 API calls 21258->21267 21259->21217 21261 9f29f5 21260->21261 21268 9e4ba7 53 API calls 21261->21268 21262 9f2b4a 21266 9f2b61 21262->21266 21269 9f31f1 97 API calls 21262->21269 21263->21244 21265 9f259d 21264->21265 21272 9f25d1 21265->21272 21276 9e2780 3 API calls 21265->21276 21270 9f2b91 21266->21270 21273 9e4ba7 53 API calls 21266->21273 21271 9f257a 21267->21271 21302 9f2a18 _wcslen 21268->21302 21269->21266 21279 9f31f1 97 API calls 21270->21279 21317 9f2c49 21270->21317 21274 9e2aa2 _swprintf 51 API calls 21271->21274 21405 9e2651 21272->21405 21277 9f2b74 SetDlgItemTextW 21273->21277 21274->21254 21275 9f2cfc 21280 9f2d05 EnableWindow 21275->21280 21285 9f2d0e 21275->21285 21286 9f25c7 21276->21286 21281 9e4ba7 53 API calls 21277->21281 21283 9f2bac 21279->21283 21280->21285 21288 9f2b88 SetDlgItemTextW 21281->21288 21293 9f2bbe 21283->21293 21316 9f2be3 21283->21316 21284 9f2d2b 21297 9f2d52 21284->21297 21308 9f2d4a SendMessageW 21284->21308 21285->21284 21529 9e1183 GetDlgItem KiUserCallbackDispatcher 21285->21529 21286->21272 21395 9f1981 21286->21395 21287 9f2a69 21291 9e4ba7 53 API calls 21287->21291 21288->21270 21289 9f25f5 21411 9f1719 SetCurrentDirectoryW 21289->21411 21290 9f25ea GetLastError 21290->21289 21291->21217 21514 9f09f5 ShowWindow 21293->21514 21294 9f2c3c 21300 9f31f1 97 API calls 21294->21300 21297->21217 21299 9f2d21 21300->21317 21301 9f2609 21304 9f2620 21301->21304 21305 9f2612 GetLastError 21301->21305 21302->21287 21311 9e4ba7 53 API calls 21302->21311 21310 9f2697 21304->21310 21313 9f26a6 21304->21313 21315 9f2630 GetTickCount 21304->21315 21305->21304 21308->21297 21309 9f2cda 21312 9f09f5 32 API calls 21309->21312 21310->21313 21314 9f28d2 21310->21314 21318 9f2a4c 21311->21318 21319 9f2cf9 21312->21319 21320 9f2877 21313->21320 21321 9f26bf GetModuleFileNameW 21313->21321 21322 9f286d 21313->21322 21427 9e11a1 GetDlgItem ShowWindow 21314->21427 21325 9e2aa2 _swprintf 51 API calls 21315->21325 21316->21294 21323 9f31f1 97 API calls 21316->21323 21317->21275 21317->21309 21326 9e4ba7 53 API calls 21317->21326 21327 9e2aa2 _swprintf 51 API calls 21318->21327 21319->21275 21330 9e4ba7 53 API calls 21320->21330 21497 9e58c2 21321->21497 21322->21225 21322->21320 21332 9f2c11 21323->21332 21331 9f264d 21325->21331 21326->21317 21327->21287 21328 9f28e2 21428 9e11a1 GetDlgItem ShowWindow 21328->21428 21334 9f2881 21330->21334 21412 9e1c7e 21331->21412 21332->21294 21339 9e2aa2 _swprintf 51 API calls 21334->21339 21337 9f28ec 21342 9e4ba7 53 API calls 21337->21342 21338 9e2aa2 _swprintf 51 API calls 21340 9f2709 CreateFileMappingW 21338->21340 21341 9f289f 21339->21341 21345 9f2767 GetCommandLineW 21340->21345 21379 9f27de __InternalCxxFrameHandler 21340->21379 21354 9e4ba7 53 API calls 21341->21354 21344 9f28f6 SetDlgItemTextW 21342->21344 21429 9e11a1 GetDlgItem ShowWindow 21344->21429 21347 9f2778 21345->21347 21346 9f2673 21350 9f267a GetLastError 21346->21350 21351 9f2685 21346->21351 21501 9f1f95 SHGetMalloc 21347->21501 21349 9f27e9 ShellExecuteExW 21364 9f2804 21349->21364 21350->21351 21420 9e1bae 21351->21420 21353 9f2908 SetDlgItemTextW GetDlgItem 21358 9f293d 21353->21358 21359 9f2925 GetWindowLongW SetWindowLongW 21353->21359 21356 9f28b9 21354->21356 21430 9f31f1 21358->21430 21359->21358 21360 9f1f95 SHGetMalloc 21362 9f27a0 21360->21362 21365 9f1f95 SHGetMalloc 21362->21365 21367 9f2819 WaitForInputIdle 21364->21367 21368 9f2847 21364->21368 21369 9f27ac 21365->21369 21366 9f31f1 97 API calls 21370 9f2959 21366->21370 21371 9f282e 21367->21371 21368->21322 21374 9f285d UnmapViewOfFile CloseHandle 21368->21374 21503 9e5971 21369->21503 21455 9f4512 21370->21455 21371->21368 21373 9f2833 Sleep 21371->21373 21373->21368 21373->21371 21374->21322 21377 9f27bd MapViewOfFile 21377->21379 21379->21349 21383->21225 21383->21250 21386 9e11cf 21385->21386 21387 9e1228 21385->21387 21389 9e1235 21386->21389 21531 9e4878 21386->21531 21553 9e4851 21387->21553 21389->21217 21389->21218 21389->21219 21392 9e1204 GetDlgItem 21392->21389 21393 9e1214 21392->21393 21393->21389 21394 9e121a SetWindowTextW 21393->21394 21394->21389 21566 9f1c99 GetCurrentProcess OpenProcessToken 21395->21566 21397 9f1996 21398 9f199e SetEntriesInAclW 21397->21398 21399 9f1a2f 21397->21399 21398->21399 21400 9f19e2 InitializeSecurityDescriptor 21398->21400 21399->21272 21401 9f1a21 21400->21401 21402 9f19f1 SetSecurityDescriptorDacl 21400->21402 21401->21399 21404 9f1a26 LocalFree 21401->21404 21402->21401 21403 9f1a04 CreateDirectoryW 21402->21403 21403->21401 21404->21399 21408 9e265b 21405->21408 21406 9e26ec 21407 9e2810 8 API calls 21406->21407 21410 9e2715 21406->21410 21407->21410 21408->21406 21408->21410 21573 9e2810 21408->21573 21410->21289 21410->21290 21411->21301 21413 9e1c88 21412->21413 21414 9e1ce5 CreateFileW 21413->21414 21415 9e1cd9 21413->21415 21414->21415 21416 9e1d2f 21415->21416 21417 9e35e5 GetCurrentDirectoryW 21415->21417 21416->21346 21418 9e1d14 21417->21418 21418->21416 21419 9e1d18 CreateFileW 21418->21419 21419->21416 21421 9e1be3 21420->21421 21422 9e1bd2 21420->21422 21421->21310 21422->21421 21423 9e1bde 21422->21423 21424 9e1be5 21422->21424 21594 9e1d5e 21423->21594 21599 9e1c30 21424->21599 21427->21328 21428->21337 21429->21353 21431 9f31fb __EH_prolog 21430->21431 21432 9f1e84 ExpandEnvironmentStringsW 21431->21432 21436 9f294b 21431->21436 21441 9f3232 _wcslen _wcsrchr 21432->21441 21434 9f1e84 ExpandEnvironmentStringsW 21434->21441 21435 9f3519 SetWindowTextW 21435->21441 21436->21366 21438 9f1ffe 76 API calls 21438->21441 21439 9e2b4b 6 API calls 21439->21441 21440 9f3307 SetFileAttributesW 21443 9f33c1 GetFileAttributesW 21440->21443 21453 9f3321 _abort _wcslen 21440->21453 21441->21434 21441->21435 21441->21436 21441->21438 21441->21439 21441->21440 21442 9e2ad4 FindClose 21441->21442 21441->21453 21631 9e7d7d CompareStringW 21441->21631 21632 9f115d GetCurrentDirectoryW 21441->21632 21442->21441 21443->21441 21445 9f33d3 DeleteFileW 21443->21445 21444 9e3502 51 API calls 21444->21453 21445->21441 21447 9f33e4 21445->21447 21446 9f36e3 GetDlgItem SetWindowTextW SendMessageW 21446->21453 21449 9f3723 SendMessageW 21449->21441 21453->21441 21453->21444 21453->21446 21453->21449 21454 9f339d SHFileOperationW 21453->21454 21454->21443 21456 9f451c __EH_prolog 21455->21456 21633 9e6a26 21456->21633 21464 9f4168 21463->21464 22612 9f10d6 21464->22612 21467 9f4175 GetWindow 21468 9f2a91 21467->21468 21471 9f4195 21467->21471 21468->21226 21468->21227 21469 9f41a2 GetClassNameW 22617 9e7d7d CompareStringW 21469->22617 21471->21468 21471->21469 21472 9f422a GetWindow 21471->21472 21473 9f41c6 GetWindowLongW 21471->21473 21472->21468 21472->21471 21473->21472 21474 9f41d6 SendMessageW 21473->21474 21474->21472 21475 9f41ec GetObjectW 21474->21475 22618 9f1115 21475->22618 21477 9f4203 22622 9f10f4 21477->22622 22626 9f131c 21477->22626 21481->21242 21483 9f16e1 21482->21483 21489 9f1706 21482->21489 22644 9e7d7d CompareStringW 21483->22644 21484 9f170b SHAutoComplete 21485 9f1714 21484->21485 21490 9efa07 21485->21490 21487 9f16f4 21488 9f16f8 FindWindowExW 21487->21488 21487->21489 21488->21489 21489->21484 21489->21485 22645 9ef9a5 21490->22645 21492 9efa24 21493 9e7956 MultiByteToWideChar 21492->21493 21494 9efa5a 21492->21494 21493->21494 21494->21262 21496 9e1118 21495->21496 21496->21249 21498 9e58c8 21497->21498 21500 9e58e5 21497->21500 21499 9e593a 81 API calls 21498->21499 21499->21500 21500->21338 21502 9f1fb7 21501->21502 21502->21360 21504 9e5989 21503->21504 21505 9e597f 21503->21505 21507 9e59fe GetCurrentProcessId 21504->21507 21508 9e59a3 21504->21508 22670 9e58fc 21505->22670 21512 9e59cf 21507->21512 21509 9e1853 76 API calls 21508->21509 21508->21512 21510 9e59c6 21509->21510 21512->21377 21515 9f0a1f 21514->21515 21529->21299 21532 9e2aa2 _swprintf 51 API calls 21531->21532 21533 9e48a3 21532->21533 21534 9e7b9f WideCharToMultiByte 21533->21534 21535 9e48ba 21534->21535 21536 9e4935 21535->21536 21544 9e3f80 26 API calls 21535->21544 21551 9e4914 SetDlgItemTextW 21535->21551 21556 9e3dac 21536->21556 21538 9e494d GetWindowRect GetClientRect 21539 9e4a71 GetSystemMetrics GetWindow 21538->21539 21547 9e49a5 21538->21547 21540 9e11f1 21539->21540 21541 9e4a92 21539->21541 21540->21389 21540->21392 21541->21540 21549 9e4aa5 GetWindowRect 21541->21549 21542 9e4a3c 21559 9e3e2c 21542->21559 21544->21535 21546 9e4a02 GetWindowLongW 21550 9e4a2c GetWindowRect 21546->21550 21547->21542 21547->21546 21548 9e4a62 SetWindowTextW 21548->21539 21552 9e4b1a GetWindow 21549->21552 21550->21542 21551->21535 21552->21540 21552->21541 21554 9e4857 GetWindowLongW SetWindowLongW 21553->21554 21555 9e4875 21553->21555 21554->21555 21555->21389 21557 9e3e2c 52 API calls 21556->21557 21558 9e3dcf 21557->21558 21558->21538 21560 9e2aa2 _swprintf 51 API calls 21559->21560 21561 9e3e51 21560->21561 21562 9e7b9f WideCharToMultiByte 21561->21562 21563 9e3e66 21562->21563 21564 9e3f80 26 API calls 21563->21564 21565 9e3e77 21564->21565 21565->21539 21565->21548 21567 9f1d10 21566->21567 21568 9f1cb9 GetTokenInformation 21566->21568 21567->21397 21569 9f1cde ___std_exception_copy 21568->21569 21570 9f1cd3 GetLastError 21568->21570 21571 9f1ce7 GetTokenInformation 21569->21571 21570->21567 21570->21569 21571->21567 21572 9f1d01 CopySid 21571->21572 21572->21567 21574 9e281d 21573->21574 21575 9e2841 21574->21575 21576 9e2834 CreateDirectoryW 21574->21576 21577 9e2780 3 API calls 21575->21577 21576->21575 21578 9e2874 21576->21578 21579 9e2847 21577->21579 21580 9e2883 21578->21580 21586 9e2a4b 21578->21586 21581 9e2887 GetLastError 21579->21581 21583 9e35e5 GetCurrentDirectoryW 21579->21583 21580->21408 21581->21580 21584 9e285d 21583->21584 21584->21581 21585 9e2861 CreateDirectoryW 21584->21585 21585->21578 21585->21581 21587 9f5690 21586->21587 21588 9e2a58 SetFileAttributesW 21587->21588 21589 9e2a6e 21588->21589 21590 9e2a9b 21588->21590 21591 9e35e5 GetCurrentDirectoryW 21589->21591 21590->21580 21592 9e2a82 21591->21592 21592->21590 21593 9e2a86 SetFileAttributesW 21592->21593 21593->21590 21595 9e1d91 21594->21595 21596 9e1d67 21594->21596 21595->21421 21596->21595 21605 9e272f 21596->21605 21600 9e1c3c 21599->21600 21602 9e1c5a 21599->21602 21600->21602 21603 9e1c48 FindCloseChangeNotification 21600->21603 21601 9e1c79 21601->21421 21602->21601 21613 9e17fd 21602->21613 21603->21602 21606 9f5690 21605->21606 21607 9e273c DeleteFileW 21606->21607 21608 9e274f 21607->21608 21609 9e1d8f 21607->21609 21610 9e35e5 GetCurrentDirectoryW 21608->21610 21609->21421 21614 9e1806 21613->21614 21617 9e1819 21613->21617 21619 9e1684 21614->21619 21617->21601 21620 9e1695 21619->21620 21621 9e73d1 74 API calls 21620->21621 21631->21441 21632->21441 22613 9f10f4 4 API calls 22612->22613 22614 9f10dd 22613->22614 22615 9f10e9 22614->22615 22616 9f1115 4 API calls 22614->22616 22615->21467 22615->21468 22616->22615 22617->21471 22619 9f111e 22618->22619 22620 9f1123 22618->22620 22635 9f1173 GetDC 22619->22635 22620->21477 22623 9f10fd 22622->22623 22624 9f1102 22622->22624 22625 9f1173 4 API calls 22623->22625 22624->21477 22625->22624 22638 9f11a9 GetDC GetDeviceCaps ReleaseDC 22626->22638 22628 9f1324 22629 9f133e GetObjectW 22628->22629 22630 9f1328 22628->22630 22633 9f1370 22629->22633 22639 9f15de GetDC 22630->22639 22632 9f1339 SendMessageW DeleteObject 22632->21472 22633->22632 22634 9f1567 DeleteObject 22633->22634 22634->22632 22636 9f11a7 22635->22636 22637 9f1182 GetDeviceCaps GetDeviceCaps ReleaseDC 22635->22637 22636->22620 22637->22636 22638->22628 22640 9f15fa GetObjectW 22639->22640 22642 9f1632 ReleaseDC 22640->22642 22642->22632 22644->21487 22646 9ef9af __EH_prolog 22645->22646 22653 9e1ee0 22646->22653 22648 9ef9d8 22649 9ef9ee 22648->22649 22664 9ef871 22648->22664 22651 9e1bae 80 API calls 22649->22651 22652 9ef9f9 22651->22652 22652->21492 22655 9e1eea 22653->22655 22654 9e1f4b CreateFileW 22656 9e1f6c GetLastError 22654->22656 22660 9e1fbb 22654->22660 22655->22654 22657 9e35e5 GetCurrentDirectoryW 22656->22657 22658 9e1f8c 22657->22658 22659 9e1f90 CreateFileW GetLastError 22658->22659 22658->22660 22659->22660 22662 9e1fb5 22659->22662 22661 9e1fff 22660->22661 22663 9e1fe5 SetFileTime 22660->22663 22661->22648 22662->22660 22663->22661 22665 9ef880 22664->22665 22666 9e1e2a 79 API calls 22665->22666 22667 9ef90f __InternalCxxFrameHandler 22665->22667 22668 9ef8a2 22666->22668 22667->22649 22668->22667 22669 9e16d9 74 API calls 22668->22669 22669->22667 22671 9e5934 22670->22671 22672 9e5905 22670->22672 22671->21504 22676 9e6b9c 22672->22676 23884 9ff650 23885 9ff66b 23884->23885 23886 9ff65b 23884->23886 23890 9ff671 23886->23890 23891 9ff68a 23890->23891 23892 9ff684 23890->23892 23894 9ff8ba _free 20 API calls 23891->23894 23893 9ff8ba _free 20 API calls 23892->23893 23893->23891 23895 9ff696 23894->23895 23896 9ff8ba _free 20 API calls 23895->23896 23897 9ff6a1 23896->23897 23898 9ff8ba _free 20 API calls 23897->23898 23899 9ff6ac 23898->23899 23900 9ff8ba _free 20 API calls 23899->23900 23901 9ff6b7 23900->23901 23902 9ff8ba _free 20 API calls 23901->23902 23903 9ff6c2 23902->23903 23904 9ff8ba _free 20 API calls 23903->23904 23905 9ff6cd 23904->23905 23906 9ff8ba _free 20 API calls 23905->23906 23907 9ff6d8 23906->23907 23908 9ff8ba _free 20 API calls 23907->23908 23909 9ff6e3 23908->23909 23910 9ff8ba _free 20 API calls 23909->23910 23911 9ff6f1 23910->23911 23916 9ff52c 23911->23916 23922 9ff438 23916->23922 23918 9ff550 23919 9ff57c 23918->23919 23935 9ff499 23919->23935 23923 9ff444 ___scrt_is_nonwritable_in_current_image 23922->23923 23930 a01041 EnterCriticalSection 23923->23930 23925 9ff44e 23928 9ff8ba _free 20 API calls 23925->23928 23929 9ff478 23925->23929 23927 9ff485 _abort 23927->23918 23928->23929 23931 9ff48d 23929->23931 23930->23925 23934 a01091 LeaveCriticalSection 23931->23934 23933 9ff497 23933->23927 23934->23933 23936 9ff4a5 ___scrt_is_nonwritable_in_current_image 23935->23936 23943 a01041 EnterCriticalSection 23936->23943 23938 9ff4af 23939 9ff71a _unexpected 20 API calls 23938->23939 23940 9ff4c2 23939->23940 23944 9ff4d8 23940->23944 23942 9ff4d0 _abort 23943->23938 23947 a01091 LeaveCriticalSection 23944->23947 23946 9ff4e2 23946->23942 23947->23946 21187 9ff870 21195 a011bf 21187->21195 21190 9ff884 21191 9ff7e9 _abort 20 API calls 21192 9ff88c 21191->21192 21193 9ff899 21192->21193 21202 9ff8a0 21192->21202 21196 a010a8 _unexpected 5 API calls 21195->21196 21197 a011e6 21196->21197 21198 a011fe TlsAlloc 21197->21198 21201 a011ef 21197->21201 21198->21201 21199 9f63dc CatchGuardHandler 5 API calls 21200 9ff87a 21199->21200 21200->21190 21200->21191 21201->21199 21203 9ff8aa 21202->21203 21204 9ff8b0 21202->21204 21206 a01215 21203->21206 21204->21190 21207 a010a8 _unexpected 5 API calls 21206->21207 21208 a0123c 21207->21208 21209 a01254 TlsFree 21208->21209 21212 a01248 21208->21212 21209->21212 21210 9f63dc CatchGuardHandler 5 API calls 21211 a01265 21210->21211 21211->21204 21212->21210 24039 a00850 24049 a051e7 24039->24049 24043 a0085d 24062 a052c8 24043->24062 24046 a00887 24047 9ff8ba _free 20 API calls 24046->24047 24048 a00892 24047->24048 24066 a051f0 24049->24066 24051 a00858 24052 a0509a 24051->24052 24053 a050a6 ___scrt_is_nonwritable_in_current_image 24052->24053 24086 a01041 EnterCriticalSection 24053->24086 24055 a0511c 24100 a05131 24055->24100 24057 a050f0 DeleteCriticalSection 24060 9ff8ba _free 20 API calls 24057->24060 24058 a05128 _abort 24058->24043 24061 a050b1 24060->24061 24061->24055 24061->24057 24087 a06433 24061->24087 24063 a052de 24062->24063 24065 a0086c DeleteCriticalSection 24062->24065 24064 9ff8ba _free 20 API calls 24063->24064 24063->24065 24064->24065 24065->24043 24065->24046 24067 a051fc ___scrt_is_nonwritable_in_current_image 24066->24067 24076 a01041 EnterCriticalSection 24067->24076 24069 a0529f 24081 a052bf 24069->24081 24072 a052ab _abort 24072->24051 24074 a0520b 24074->24069 24075 a051a0 66 API calls 24074->24075 24077 a0089c EnterCriticalSection 24074->24077 24078 a05295 24074->24078 24075->24074 24076->24074 24077->24074 24084 a008b0 LeaveCriticalSection 24078->24084 24080 a0529d 24080->24074 24085 a01091 LeaveCriticalSection 24081->24085 24083 a052c6 24083->24072 24084->24080 24085->24083 24086->24061 24088 a0643f ___scrt_is_nonwritable_in_current_image 24087->24088 24089 a06450 24088->24089 24090 a06465 24088->24090 24091 9ff9d2 __dosmaperr 20 API calls 24089->24091 24098 a06460 _abort 24090->24098 24103 a0089c EnterCriticalSection 24090->24103 24093 a06455 24091->24093 24095 9fa419 ___std_exception_copy 26 API calls 24093->24095 24094 a06481 24104 a063bd 24094->24104 24095->24098 24097 a0648c 24120 a064a9 24097->24120 24098->24061 24363 a01091 LeaveCriticalSection 24100->24363 24102 a05138 24102->24058 24103->24094 24105 a063ca 24104->24105 24106 a063df 24104->24106 24107 9ff9d2 __dosmaperr 20 API calls 24105->24107 24111 a063da 24106->24111 24123 a0513a 24106->24123 24108 a063cf 24107->24108 24110 9fa419 ___std_exception_copy 26 API calls 24108->24110 24110->24111 24111->24097 24113 a052c8 20 API calls 24114 a063fb 24113->24114 24129 a0074c 24114->24129 24116 a06401 24136 a066fb 24116->24136 24119 9ff8ba _free 20 API calls 24119->24111 24362 a008b0 LeaveCriticalSection 24120->24362 24122 a064b1 24122->24098 24124 a05152 24123->24124 24126 a0514e 24123->24126 24125 a0074c 26 API calls 24124->24125 24124->24126 24127 a05172 24125->24127 24126->24113 24151 a0602d 24127->24151 24130 a00758 24129->24130 24131 a0076d 24129->24131 24132 9ff9d2 __dosmaperr 20 API calls 24130->24132 24131->24116 24133 a0075d 24132->24133 24134 9fa419 ___std_exception_copy 26 API calls 24133->24134 24135 a00768 24134->24135 24135->24116 24137 a0670a 24136->24137 24138 a0671f 24136->24138 24139 9ff9bf __dosmaperr 20 API calls 24137->24139 24140 a0675a 24138->24140 24144 a06746 24138->24144 24141 a0670f 24139->24141 24142 9ff9bf __dosmaperr 20 API calls 24140->24142 24143 9ff9d2 __dosmaperr 20 API calls 24141->24143 24145 a0675f 24142->24145 24148 a06407 24143->24148 24319 a066d3 24144->24319 24147 9ff9d2 __dosmaperr 20 API calls 24145->24147 24149 a06767 24147->24149 24148->24111 24148->24119 24150 9fa419 ___std_exception_copy 26 API calls 24149->24150 24150->24148 24152 a06039 ___scrt_is_nonwritable_in_current_image 24151->24152 24153 a06041 24152->24153 24157 a06059 24152->24157 24176 9ff9bf 24153->24176 24155 a060f7 24158 9ff9bf __dosmaperr 20 API calls 24155->24158 24157->24155 24160 a0608e 24157->24160 24161 a060fc 24158->24161 24159 9ff9d2 __dosmaperr 20 API calls 24170 a0604e _abort 24159->24170 24179 a029d0 EnterCriticalSection 24160->24179 24163 9ff9d2 __dosmaperr 20 API calls 24161->24163 24165 a06104 24163->24165 24164 a06094 24166 a060b0 24164->24166 24167 a060c5 24164->24167 24168 9fa419 ___std_exception_copy 26 API calls 24165->24168 24169 9ff9d2 __dosmaperr 20 API calls 24166->24169 24180 a06118 24167->24180 24168->24170 24172 a060b5 24169->24172 24170->24126 24174 9ff9bf __dosmaperr 20 API calls 24172->24174 24173 a060c0 24231 a060ef 24173->24231 24174->24173 24177 9ff7e9 _abort 20 API calls 24176->24177 24178 9ff9c4 24177->24178 24178->24159 24179->24164 24181 a06146 24180->24181 24216 a0613f 24180->24216 24182 a06169 24181->24182 24183 a0614a 24181->24183 24187 a061ba 24182->24187 24188 a0619d 24182->24188 24184 9ff9bf __dosmaperr 20 API calls 24183->24184 24186 a0614f 24184->24186 24185 9f63dc CatchGuardHandler 5 API calls 24189 a06320 24185->24189 24190 9ff9d2 __dosmaperr 20 API calls 24186->24190 24191 a061d0 24187->24191 24234 a063a2 24187->24234 24192 9ff9bf __dosmaperr 20 API calls 24188->24192 24189->24173 24193 a06156 24190->24193 24237 a05cbd 24191->24237 24196 a061a2 24192->24196 24197 9fa419 ___std_exception_copy 26 API calls 24193->24197 24199 9ff9d2 __dosmaperr 20 API calls 24196->24199 24197->24216 24200 a061aa 24199->24200 24203 9fa419 ___std_exception_copy 26 API calls 24200->24203 24203->24216 24216->24185 24318 a029f3 LeaveCriticalSection 24231->24318 24233 a060f5 24233->24170 24287 a06324 24234->24287 24309 a05306 24237->24309 24296 a02aa7 24287->24296 24297 a02ab4 24296->24297 24298 a02ac9 24296->24298 24299 9ff9bf __dosmaperr 20 API calls 24297->24299 24300 9ff9bf __dosmaperr 20 API calls 24298->24300 24302 a02aee 24298->24302 24310 a05320 24309->24310 24311 a05313 24309->24311 24313 a0532c 24310->24313 24314 9ff9d2 __dosmaperr 20 API calls 24310->24314 24312 9ff9d2 __dosmaperr 20 API calls 24311->24312 24318->24233 24322 a06651 24319->24322 24323 a0665d ___scrt_is_nonwritable_in_current_image 24322->24323 24333 a029d0 EnterCriticalSection 24323->24333 24325 a0666b 24326 a06692 24325->24326 24327 a0669d 24325->24327 24334 a0677a 24326->24334 24329 9ff9d2 __dosmaperr 20 API calls 24327->24329 24330 a06698 24329->24330 24349 a066c7 24330->24349 24333->24325 24335 a02aa7 26 API calls 24334->24335 24338 a0678a 24335->24338 24336 a06790 24338->24336 24339 a067c2 24338->24339 24342 a02aa7 26 API calls 24338->24342 24339->24336 24361 a029f3 LeaveCriticalSection 24349->24361 24362->24122 24363->24102 22785 9f5c62 22786 9f5c6e ___scrt_is_nonwritable_in_current_image 22785->22786 22817 9f5803 22786->22817 22788 9f5c75 22789 9f5dc8 22788->22789 22792 9f5c9f 22788->22792 22910 9f5ff2 IsProcessorFeaturePresent 22789->22910 22791 9f5dcf 22890 9fe52c 22791->22890 22803 9f5cde ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 22792->22803 22828 9ff0cd 22792->22828 22796 9fe4de _abort 28 API calls 22798 9f5ddd 22796->22798 22799 9f5cbe 22800 9ff071 _abort 5 API calls 22800->22803 22801 9f5d3f 22832 9f610d 22801->22832 22803->22801 22893 9fe4f4 22803->22893 22818 9f580c 22817->22818 22914 9f5e0c IsProcessorFeaturePresent 22818->22914 22822 9f581d 22823 9f5821 22822->22823 22924 9fef57 22822->22924 22823->22788 22826 9f5838 22826->22788 22829 9ff0e4 22828->22829 22830 9f63dc CatchGuardHandler 5 API calls 22829->22830 22831 9f5cb8 22830->22831 22831->22799 22831->22800 23047 9f6660 22832->23047 22835 9f5d45 22836 9ff01e 22835->22836 22837 a01f40 51 API calls 22836->22837 22839 9ff027 22837->22839 22838 9f5d4d 22841 9f4968 22838->22841 22839->22838 23049 a022cb 22839->23049 23055 9e6be4 22841->23055 22845 9f4988 23104 9f181b 22845->23104 22847 9f4991 _abort 22848 9f49a4 GetCommandLineW 22847->22848 22891 9fe2a9 _abort 28 API calls 22890->22891 22892 9f5dd5 22891->22892 22892->22796 22894 9fe51c _unexpected 22893->22894 22894->22801 22895 9ff765 _unexpected 38 API calls 22894->22895 22898 9ff260 22895->22898 22896 9ff340 _abort 38 API calls 22897 9ff28a 22896->22897 22898->22896 22911 9f6008 _abort 22910->22911 22912 9f60b3 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 22911->22912 22913 9f60fe _abort 22912->22913 22913->22791 22915 9f5818 22914->22915 22916 9f8ade 22915->22916 22933 9f9d8c 22916->22933 22919 9f8ae7 22919->22822 22921 9f8aef 22922 9f8afa 22921->22922 22947 9f9dc8 22921->22947 22922->22822 22988 a0246a 22924->22988 22927 9f8afd 22928 9f8b06 22927->22928 22929 9f8b10 22927->22929 22930 9f8faf ___vcrt_uninitialize_ptd 6 API calls 22928->22930 22929->22823 22931 9f8b0b 22930->22931 22932 9f9dc8 ___vcrt_uninitialize_locks DeleteCriticalSection 22931->22932 22932->22929 22935 9f9d95 22933->22935 22936 9f9dbe 22935->22936 22937 9f8ae3 22935->22937 22951 9fa141 22935->22951 22938 9f9dc8 ___vcrt_uninitialize_locks DeleteCriticalSection 22936->22938 22937->22919 22939 9f8f7c 22937->22939 22938->22937 22969 9fa052 22939->22969 22943 9f8fac 22943->22921 22946 9f8f91 22946->22921 22948 9f9df2 22947->22948 22949 9f9dd3 22947->22949 22948->22919 22950 9f9ddd DeleteCriticalSection 22949->22950 22950->22948 22950->22950 22956 9f9f67 22951->22956 22954 9fa179 InitializeCriticalSectionAndSpinCount 22955 9fa164 22954->22955 22955->22935 22957 9f9f84 22956->22957 22961 9f9f88 22956->22961 22957->22954 22957->22955 22958 9f9ff0 GetProcAddress 22958->22957 22960 9f9ffe 22958->22960 22960->22957 22961->22957 22961->22958 22962 9f9fe1 22961->22962 22964 9fa007 LoadLibraryExW 22961->22964 22962->22958 22963 9f9fe9 FreeLibrary 22962->22963 22963->22958 22965 9fa01e GetLastError 22964->22965 22966 9fa04e 22964->22966 22965->22966 22967 9fa029 ___vcrt_FlsGetValue 22965->22967 22966->22961 22967->22966 22968 9fa03f LoadLibraryExW 22967->22968 22968->22961 22970 9f9f67 ___vcrt_FlsGetValue 5 API calls 22969->22970 22971 9fa06c 22970->22971 22972 9fa085 TlsAlloc 22971->22972 22973 9f8f86 22971->22973 22973->22946 22974 9fa103 22973->22974 22975 9f9f67 ___vcrt_FlsGetValue 5 API calls 22974->22975 22976 9fa11d 22975->22976 22977 9fa138 TlsSetValue 22976->22977 22978 9f8f9f 22976->22978 22977->22978 22978->22943 22979 9f8faf 22978->22979 22980 9f8fb9 22979->22980 22981 9f8fbf 22979->22981 22983 9fa08d 22980->22983 22981->22946 22984 9f9f67 ___vcrt_FlsGetValue 5 API calls 22983->22984 22985 9fa0a7 22984->22985 22986 9fa0bf TlsFree 22985->22986 22987 9fa0b3 22985->22987 22986->22987 22987->22981 22991 a02487 22988->22991 22992 a02483 22988->22992 22989 9f63dc CatchGuardHandler 5 API calls 22990 9f582a 22989->22990 22990->22826 22990->22927 22991->22992 22994 a00a50 22991->22994 22992->22989 22995 a00a5c ___scrt_is_nonwritable_in_current_image 22994->22995 23006 a01041 EnterCriticalSection 22995->23006 22997 a00a63 23007 a02938 22997->23007 22999 a00a72 23004 a00a81 22999->23004 23020 a008d9 GetStartupInfoW 22999->23020 23031 a00a9d 23004->23031 23005 a00a92 _abort 23005->22991 23006->22997 23008 a02944 ___scrt_is_nonwritable_in_current_image 23007->23008 23009 a02951 23008->23009 23010 a02968 23008->23010 23012 9ff9d2 __dosmaperr 20 API calls 23009->23012 23034 a01041 EnterCriticalSection 23010->23034 23013 a02956 23012->23013 23014 9fa419 ___std_exception_copy 26 API calls 23013->23014 23015 a02960 _abort 23014->23015 23015->22999 23018 a029a0 23042 a029c7 23018->23042 23019 a02974 23019->23018 23035 a02889 23019->23035 23021 a008f6 23020->23021 23022 a00988 23020->23022 23021->23022 23023 a02938 27 API calls 23021->23023 23026 a0098f 23022->23026 23025 a0091f 23023->23025 23024 a0094d GetFileType 23024->23025 23025->23022 23025->23024 23029 a00996 23026->23029 23027 a009d9 GetStdHandle 23027->23029 23028 a00a41 23028->23004 23029->23027 23029->23028 23030 a009ec GetFileType 23029->23030 23030->23029 23046 a01091 LeaveCriticalSection 23031->23046 23033 a00aa4 23033->23005 23034->23019 23036 a01546 _unexpected 20 API calls 23035->23036 23038 a0289b 23036->23038 23037 a028a8 23039 9ff8ba _free 20 API calls 23037->23039 23038->23037 23041 a0131a 11 API calls 23038->23041 23040 a028fa 23039->23040 23040->23019 23041->23038 23045 a01091 LeaveCriticalSection 23042->23045 23044 a029ce 23044->23015 23045->23044 23046->23033 23048 9f6120 GetStartupInfoW 23047->23048 23048->22835 23052 a02272 23049->23052 23053 9fab99 __fassign 38 API calls 23052->23053 23054 a02286 23053->23054 23054->22839 23056 9f5690 23055->23056 23057 9e6bee GetModuleHandleW 23056->23057 23058 9e6c68 23057->23058 23059 9e6c09 GetProcAddress 23057->23059 23062 9e6f95 GetModuleFileNameW 23058->23062 23157 9fdbcd 23058->23157 23060 9e6c3a GetProcAddress 23059->23060 23061 9e6c22 23059->23061 23063 9e6c4c 23060->23063 23061->23060 23071 9e6fb3 23062->23071 23063->23058 23066 9e6ee0 GetModuleFileNameW CreateFileW 23067 9e6f89 CloseHandle 23066->23067 23068 9e6f10 SetFilePointer 23066->23068 23067->23062 23068->23067 23069 9e6f1e ReadFile 23068->23069 23069->23067 23073 9e6f3c 23069->23073 23070 9e2d8e GetVersionExW 23070->23071 23071->23070 23072 9e6b9c 2 API calls 23071->23072 23074 9e7015 GetFileAttributesW 23071->23074 23076 9e6fde CompareStringW 23071->23076 23077 9e702d 23071->23077 23072->23071 23073->23067 23075 9e6b9c 2 API calls 23073->23075 23074->23071 23074->23077 23075->23073 23076->23071 23078 9e7038 23077->23078 23081 9e706d 23077->23081 23080 9e7051 GetFileAttributesW 23078->23080 23082 9e7069 23078->23082 23079 9e717c 23103 9f115d GetCurrentDirectoryW 23079->23103 23080->23078 23080->23082 23081->23079 23083 9e2d8e GetVersionExW 23081->23083 23082->23081 23084 9e7087 23083->23084 23085 9e708e 23084->23085 23086 9e70f4 23084->23086 23088 9e6b9c 2 API calls 23085->23088 23087 9e2aa2 _swprintf 51 API calls 23086->23087 23089 9e711c AllocConsole 23087->23089 23090 9e7098 23088->23090 23091 9e7129 GetCurrentProcessId AttachConsole 23089->23091 23092 9e7174 ExitProcess 23089->23092 23093 9e6b9c 2 API calls 23090->23093 23161 9fa203 23091->23161 23095 9e70a2 23093->23095 23097 9e4ba7 53 API calls 23095->23097 23096 9e714a GetStdHandle WriteConsoleW Sleep FreeConsole 23096->23092 23098 9e70bd 23097->23098 23103->22845 23105 9e6b9c 2 API calls 23104->23105 23106 9f182f OleInitialize 23105->23106 23107 9f1852 GdiplusStartup SHGetMalloc 23106->23107 23107->22847 23158 9fdbe6 __vswprintf_c_l 23157->23158 23163 9fd20f 23158->23163 23162 9fa20b 23161->23162 23162->23096 23162->23162 23164 9fc212 __vswprintf_c_l 26 API calls 23163->23164 23168 9fd221 23164->23168 23165 9fd25c 23166 9fab99 __fassign 38 API calls 23165->23166 23173 9fd268 23166->23173 23167 9fd236 23169 9ff9d2 __dosmaperr 20 API calls 23167->23169 23168->23165 23168->23167 23180 9e6ed5 23168->23180 23170 9fd23b 23169->23170 23171 9fa419 ___std_exception_copy 26 API calls 23170->23171 23171->23180 23174 9fd297 23173->23174 23181 9fdb9a 23173->23181 23177 9fd303 23174->23177 23188 9fdb1c 23174->23188 23175 9fdb1c __vsnwprintf_l 26 API calls 23178 9fd3ca __vswprintf_c_l 23175->23178 23177->23175 23179 9ff9d2 __dosmaperr 20 API calls 23178->23179 23178->23180 23179->23180 23180->23062 23180->23066 23182 9fdbbc 23181->23182 23183 9fdba6 23181->23183 23203 9fdb70 23182->23203 23183->23182 23184 9fdbae 23183->23184 23194 a00c05 23184->23194 23187 9fdbba 23187->23173 23189 9fdb2c 23188->23189 23190 9fdb40 23188->23190 23189->23190 23191 9ff9d2 __dosmaperr 20 API calls 23189->23191 23190->23177 23192 9fdb35 23191->23192 23195 9fab99 __fassign 38 API calls 23194->23195 23204 9fdb7c 23203->23204 23205 9fdb89 23203->23205 23204->23187 23207 a00b80 23205->23207 24988 9ff160 24989 9ff16c ___scrt_is_nonwritable_in_current_image 24988->24989 24990 9ff1a3 _abort 24989->24990 24996 a01041 EnterCriticalSection 24989->24996 24992 9ff180 24993 a031f6 __fassign 20 API calls 24992->24993 24994 9ff190 24993->24994 24997 9ff1a9 24994->24997 24996->24992 25000 a01091 LeaveCriticalSection 24997->25000 24999 9ff1b0 24999->24990 25000->24999

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                        • Part of subcall function 009E6BE4: GetModuleHandleW.KERNEL32(kernel32), ref: 009E6BFD
                                                                                        • Part of subcall function 009E6BE4: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 009E6C0F
                                                                                        • Part of subcall function 009E6BE4: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 009E6C40
                                                                                        • Part of subcall function 009F115D: GetCurrentDirectoryW.KERNEL32(?,?), ref: 009F1165
                                                                                        • Part of subcall function 009F181B: OleInitialize.OLE32(00000000), ref: 009F1834
                                                                                        • Part of subcall function 009F181B: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 009F186B
                                                                                        • Part of subcall function 009F181B: SHGetMalloc.SHELL32(00A2F948), ref: 009F1875
                                                                                      • GetCommandLineW.KERNEL32 ref: 009F49A7
                                                                                      • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 009F49D1
                                                                                      • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007402), ref: 009F49E2
                                                                                      • UnmapViewOfFile.KERNEL32(00000000), ref: 009F4A33
                                                                                        • Part of subcall function 009F4676: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 009F468C
                                                                                        • Part of subcall function 009F4676: SetEnvironmentVariableW.KERNELBASE(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 009F46C8
                                                                                        • Part of subcall function 009E5A27: _wcslen.LIBCMT ref: 009E5A4B
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 009F4A3A
                                                                                      • GetModuleFileNameW.KERNEL32(00000000,00A46210,00000800), ref: 009F4A54
                                                                                      • SetEnvironmentVariableW.KERNELBASE(sfxname,00A46210), ref: 009F4A60
                                                                                      • GetLocalTime.KERNEL32(?), ref: 009F4A6B
                                                                                      • _swprintf.LIBCMT ref: 009F4AAA
                                                                                      • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 009F4ABF
                                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 009F4AC6
                                                                                      • LoadIconW.USER32(00000000,00000064), ref: 009F4ADD
                                                                                      • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_00012350,00000000), ref: 009F4B2E
                                                                                      • Sleep.KERNEL32(?), ref: 009F4B5C
                                                                                      • DeleteObject.GDI32 ref: 009F4B95
                                                                                      • DeleteObject.GDI32(?), ref: 009F4BA5
                                                                                      • CloseHandle.KERNEL32 ref: 009F4BE8
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$CommandCurrentDialogDirectoryGdiplusIconInitializeLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf_wcslen
                                                                                      • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                                                      • API String ID: 3014515783-3710569615
                                                                                      • Opcode ID: e41d16bc765923bd03bb00a0fe0359ad5fb021b1b45ff19475bfe927a3259615
                                                                                      • Instruction ID: de12843a50d8c3e67efa82d99217ebdd743f5d1d291d95066330680141fec47d
                                                                                      • Opcode Fuzzy Hash: e41d16bc765923bd03bb00a0fe0359ad5fb021b1b45ff19475bfe927a3259615
                                                                                      • Instruction Fuzzy Hash: 7061E575544358BBD311EBE5EC49F7B3BACABD6345F000529F680921A2DB75CC42C762
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1231 9f11d2-9f11ef FindResourceW 1232 9f12eb 1231->1232 1233 9f11f5-9f1206 SizeofResource 1231->1233 1234 9f12ed-9f12f1 1232->1234 1233->1232 1235 9f120c-9f121b LoadResource 1233->1235 1235->1232 1236 9f1221-9f122c LockResource 1235->1236 1236->1232 1237 9f1232-9f1247 GlobalAlloc 1236->1237 1238 9f124d-9f1256 GlobalLock 1237->1238 1239 9f12e3-9f12e9 1237->1239 1240 9f12dc-9f12dd GlobalFree 1238->1240 1241 9f125c-9f127a call 9f6c90 1238->1241 1239->1234 1240->1239 1245 9f127c-9f129e call 9f1136 1241->1245 1246 9f12d5-9f12d6 GlobalUnlock 1241->1246 1245->1246 1251 9f12a0-9f12a8 1245->1251 1246->1240 1252 9f12aa-9f12be GdipCreateHBITMAPFromBitmap 1251->1252 1253 9f12c3-9f12d1 1251->1253 1252->1253 1254 9f12c0 1252->1254 1253->1246 1254->1253
                                                                                      APIs
                                                                                      • FindResourceW.KERNELBASE(?,PNG,00000000,?,?,?,009F22AD,00000066), ref: 009F11E5
                                                                                      • SizeofResource.KERNEL32(00000000,?,?,?,009F22AD,00000066), ref: 009F11FC
                                                                                      • LoadResource.KERNEL32(00000000,?,?,?,009F22AD,00000066), ref: 009F1213
                                                                                      • LockResource.KERNEL32(00000000,?,?,?,009F22AD,00000066), ref: 009F1222
                                                                                      • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,009F22AD,00000066), ref: 009F123D
                                                                                      • GlobalLock.KERNEL32(00000000,?,?,?,?,?,009F22AD,00000066), ref: 009F124E
                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 009F12D6
                                                                                        • Part of subcall function 009F1136: GdipAlloc.GDIPLUS(00000010), ref: 009F113C
                                                                                      • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 009F12B7
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 009F12DD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: GlobalResource$AllocGdipLock$BitmapCreateFindFreeFromLoadSizeofUnlock
                                                                                      • String ID: PNG
                                                                                      • API String ID: 541704414-364855578
                                                                                      • Opcode ID: f36c592f03f043ce42cd23174221220181e3b2d644ce2e701c209f42680ef99c
                                                                                      • Instruction ID: 7724b57e9b0a86a57cf0b98a4951e95765b12b317333415edf0acb395a1df34f
                                                                                      • Opcode Fuzzy Hash: f36c592f03f043ce42cd23174221220181e3b2d644ce2e701c209f42680ef99c
                                                                                      • Instruction Fuzzy Hash: D5315E7560071AEFD711DFE1EC489ABBABCFF85760B004919FA55D2261EB31D802CBA1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1569 9e2c15-9e2c39 call 9f5690 1572 9e2c3b-9e2c48 FindFirstFileW 1569->1572 1573 9e2ca1-9e2caa FindNextFileW 1569->1573 1574 9e2cbc-9e2d79 call 9e695c call 9e39d4 call 9e73ad * 3 1572->1574 1576 9e2c4a-9e2c5c call 9e35e5 1572->1576 1573->1574 1575 9e2cac-9e2cba GetLastError 1573->1575 1580 9e2d7e-9e2d8b 1574->1580 1577 9e2c93-9e2c9c 1575->1577 1584 9e2c5e-9e2c76 FindFirstFileW 1576->1584 1585 9e2c78-9e2c81 GetLastError 1576->1585 1577->1580 1584->1574 1584->1585 1586 9e2c83-9e2c86 1585->1586 1587 9e2c91 1585->1587 1586->1587 1589 9e2c88-9e2c8b 1586->1589 1587->1577 1589->1587 1591 9e2c8d-9e2c8f 1589->1591 1591->1577
                                                                                      APIs
                                                                                      • FindFirstFileW.KERNELBASE(?,?), ref: 009E2C3E
                                                                                        • Part of subcall function 009E35E5: _wcslen.LIBCMT ref: 009E3609
                                                                                      • FindFirstFileW.KERNELBASE(?,?,?,?,00000800), ref: 009E2C6C
                                                                                      • GetLastError.KERNEL32(?,?,00000800), ref: 009E2C78
                                                                                      • FindNextFileW.KERNEL32(?,?), ref: 009E2CA2
                                                                                      • GetLastError.KERNEL32 ref: 009E2CAE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileFind$ErrorFirstLast$Next_wcslen
                                                                                      • String ID:
                                                                                      • API String ID: 42610566-0
                                                                                      • Opcode ID: 847bd5ff10acb1a835c5eb9f5f9d75e8e561a975b9e05c4c0e2fef6854f62c90
                                                                                      • Instruction ID: 5e7722f5a964ef15717606fb6081e6b90a6500df23513f6dc7a7418e342206c4
                                                                                      • Opcode Fuzzy Hash: 847bd5ff10acb1a835c5eb9f5f9d75e8e561a975b9e05c4c0e2fef6854f62c90
                                                                                      • Instruction Fuzzy Hash: E9417D72900559ABCB26DF64CC84BEEB3BCBB48350F104596E99DE3201D734AE85DF90
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1596 9f1981-9f1998 call 9f1c99 1599 9f199e-9f19e0 SetEntriesInAclW 1596->1599 1600 9f1a31-9f1a32 1596->1600 1601 9f1a2f-9f1a30 1599->1601 1602 9f19e2-9f19ef InitializeSecurityDescriptor 1599->1602 1601->1600 1603 9f1a21-9f1a24 1602->1603 1604 9f19f1-9f1a02 SetSecurityDescriptorDacl 1602->1604 1603->1601 1606 9f1a26-9f1a29 LocalFree 1603->1606 1604->1603 1605 9f1a04-9f1a1b CreateDirectoryW 1604->1605 1605->1603 1606->1601
                                                                                      APIs
                                                                                        • Part of subcall function 009F1C99: GetCurrentProcess.KERNEL32(00020008,009F1996,?,?,?,?,009F1996,?), ref: 009F1CA8
                                                                                        • Part of subcall function 009F1C99: OpenProcessToken.ADVAPI32(00000000,?,?,?,?,009F1996,?), ref: 009F1CAF
                                                                                        • Part of subcall function 009F1C99: GetTokenInformation.KERNELBASE(009F1996,00000001(TokenIntegrityLevel),00000000,00000000,?,?,?,?,?,009F1996,?), ref: 009F1CC9
                                                                                        • Part of subcall function 009F1C99: GetLastError.KERNEL32(?,?,?,?,009F1996,?), ref: 009F1CD3
                                                                                        • Part of subcall function 009F1C99: GetTokenInformation.KERNELBASE(009F1996,00000001(TokenIntegrityLevel),00000000,?,?,?,?,?,?,?,009F1996,?), ref: 009F1CF7
                                                                                        • Part of subcall function 009F1C99: CopySid.ADVAPI32(00000044,009F1996,00000000,?,?,?,?,?,009F1996,?), ref: 009F1D08
                                                                                      • SetEntriesInAclW.ADVAPI32(00000001,11060000,00000000,?,?,?,?), ref: 009F19D8
                                                                                      • InitializeSecurityDescriptor.ADVAPI32(?,00000001,?,?,?), ref: 009F19E7
                                                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000,?,?,?), ref: 009F19FA
                                                                                      • CreateDirectoryW.KERNELBASE(?,0000000C,?,?,?), ref: 009F1A1B
                                                                                      • LocalFree.KERNEL32(?,?,?,?), ref: 009F1A29
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: Token$DescriptorInformationProcessSecurity$CopyCreateCurrentDaclDirectoryEntriesErrorFreeInitializeLastLocalOpen
                                                                                      • String ID:
                                                                                      • API String ID: 2740647886-0
                                                                                      • Opcode ID: 0a0ac444d6cbec6d644605edfc84378bb7ace7604d28ae0785d44fc8e10b3d66
                                                                                      • Instruction ID: 31b293cae472b9560f8b47d231b32c813daae25db817f6eca1dfcb0e35a66b13
                                                                                      • Opcode Fuzzy Hash: 0a0ac444d6cbec6d644605edfc84378bb7ace7604d28ae0785d44fc8e10b3d66
                                                                                      • Instruction Fuzzy Hash: AA21C4B5C0121DEADF21CFA5D948AEEBBBCFF85700F10806AE905E2110D7759B46CBA0
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetCurrentProcess.KERNEL32(00000003,?,009FE398,00000003,00A11D50,0000000C,009FE4EF,00000003,00000002,00000000,?,009FF382,00000003), ref: 009FE3E3
                                                                                      • TerminateProcess.KERNEL32(00000000,?,009FE398,00000003,00A11D50,0000000C,009FE4EF,00000003,00000002,00000000,?,009FF382,00000003), ref: 009FE3EA
                                                                                      • ExitProcess.KERNEL32 ref: 009FE3FC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: Process$CurrentExitTerminate
                                                                                      • String ID:
                                                                                      • API String ID: 1703294689-0
                                                                                      • Opcode ID: 360914952deec7436ba919c34427a3c0acc729e8241617174447baac84f99e99
                                                                                      • Instruction ID: b5d9ab35797207a5a06e01ed027294a4a43766a59b21f59347ef989dae00f09f
                                                                                      • Opcode Fuzzy Hash: 360914952deec7436ba919c34427a3c0acc729e8241617174447baac84f99e99
                                                                                      • Instruction Fuzzy Hash: 59E0B63151029CABCF15AFA8DE4DA5A3B6AEB44391B044814FE158B172CB75ED53CB90
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 009F2355
                                                                                        • Part of subcall function 009E11C6: GetDlgItem.USER32(00000000,00003021), ref: 009E120A
                                                                                        • Part of subcall function 009E11C6: SetWindowTextW.USER32(00000000,00A09584), ref: 009E1220
                                                                                      • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 009F2441
                                                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 009F245F
                                                                                      • IsDialogMessageW.USER32(?,?), ref: 009F2472
                                                                                      • TranslateMessage.USER32(?), ref: 009F2480
                                                                                      • DispatchMessageW.USER32(?), ref: 009F248A
                                                                                      • GetDlgItemTextW.USER32(?,00000066,?,00000800), ref: 009F24AD
                                                                                      • EndDialog.USER32(?,00000001), ref: 009F24D0
                                                                                      • GetDlgItem.USER32(?,00000068), ref: 009F24F3
                                                                                      • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 009F250E
                                                                                      • SendMessageW.USER32(00000000,000000C2,00000000,00A09584), ref: 009F2521
                                                                                        • Part of subcall function 009F3F05: _wcslen.LIBCMT ref: 009F3F2F
                                                                                      • SetFocus.USER32(00000000), ref: 009F2528
                                                                                      • _swprintf.LIBCMT ref: 009F2587
                                                                                        • Part of subcall function 009E2AA2: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 009E2AB5
                                                                                      • GetLastError.KERNEL32(00000000,?), ref: 009F25EA
                                                                                      • GetLastError.KERNEL32(?,00000000,?), ref: 009F2612
                                                                                      • GetTickCount.KERNEL32 ref: 009F2630
                                                                                      • _swprintf.LIBCMT ref: 009F2648
                                                                                      • GetLastError.KERNEL32 ref: 009F267A
                                                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,00000000,?), ref: 009F26CD
                                                                                      • _swprintf.LIBCMT ref: 009F2704
                                                                                      • CreateFileMappingW.KERNEL32(000000FF,00000000,08000004,00000000,00007402,winrarsfxmappingfile.tmp), ref: 009F2758
                                                                                      • GetCommandLineW.KERNEL32 ref: 009F276E
                                                                                      • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000,00A3696A,00000400,00000001,00000001), ref: 009F27C5
                                                                                      • ShellExecuteExW.SHELL32(0000003C), ref: 009F27ED
                                                                                      • WaitForInputIdle.USER32(?,00002710), ref: 009F2821
                                                                                      • Sleep.KERNEL32(00000064), ref: 009F2835
                                                                                      • UnmapViewOfFile.KERNEL32(?,?,0000421C,00A3696A,00000400), ref: 009F285E
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 009F2867
                                                                                      • _swprintf.LIBCMT ref: 009F289A
                                                                                      • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 009F28F9
                                                                                      • SetDlgItemTextW.USER32(?,00000065,00A09584), ref: 009F2910
                                                                                      • GetDlgItem.USER32(?,00000065), ref: 009F2919
                                                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 009F2928
                                                                                      • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 009F2937
                                                                                      • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 009F29E4
                                                                                      • _wcslen.LIBCMT ref: 009F2A3A
                                                                                      • _swprintf.LIBCMT ref: 009F2A64
                                                                                      • SendMessageW.USER32(?,00000080,00000001,?), ref: 009F2AAE
                                                                                      • SendDlgItemMessageW.USER32(?,0000006C,00000172,00000000,?), ref: 009F2AC8
                                                                                      • GetDlgItem.USER32(?,00000068), ref: 009F2AD1
                                                                                      • SendMessageW.USER32(00000000,00000435,00000000,00400000), ref: 009F2AE7
                                                                                      • GetDlgItem.USER32(?,00000066), ref: 009F2B01
                                                                                      • SetWindowTextW.USER32(00000000,00A38D8A), ref: 009F2B23
                                                                                      • SetDlgItemTextW.USER32(?,0000006B,00000000), ref: 009F2B78
                                                                                      • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 009F2B8B
                                                                                      • DialogBoxParamW.USER32(LICENSEDLG,00000000,Function_00012130,00000000,?), ref: 009F2C2E
                                                                                      • EnableWindow.USER32(00000000,00000000), ref: 009F2D08
                                                                                      • SendMessageW.USER32(?,00000111,00000001,00000000), ref: 009F2D4A
                                                                                        • Part of subcall function 009F31F1: __EH_prolog.LIBCMT ref: 009F31F6
                                                                                      • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 009F2D6E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: Item$MessageText$Send$Window_swprintf$File$DialogErrorLast$H_prologLongView_wcslen$CloseCommandCountCreateDispatchEnableExecuteFocusHandleIdleInputLineMappingModuleNameParamShellSleepTickTranslateUnmapWait__vswprintf_c_l
                                                                                      • String ID: %s$"%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                                                                                      • API String ID: 3103142498-1645151803
                                                                                      • Opcode ID: e16ed3f17559f3d5d471be802298838f869a93b149b887e5fb2f32012c8219e6
                                                                                      • Instruction ID: d733ebb9b1af2577d834e3ca86504bf7e03d4200b915aa9b6a9108a7ca72ef9c
                                                                                      • Opcode Fuzzy Hash: e16ed3f17559f3d5d471be802298838f869a93b149b887e5fb2f32012c8219e6
                                                                                      • Instruction Fuzzy Hash: 1542A575A44348BEEB21DBA49C4AFBE377CAB91700F144165F740A60E2C7B94D86CB62
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 270 9e6be4-9e6c07 call 9f5690 GetModuleHandleW 273 9e6c68-9e6ec9 270->273 274 9e6c09-9e6c20 GetProcAddress 270->274 277 9e6ecf-9e6eda call 9fdbcd 273->277 278 9e6f95-9e6fc1 GetModuleFileNameW call 9e3919 call 9e695c 273->278 275 9e6c3a-9e6c4a GetProcAddress 274->275 276 9e6c22-9e6c38 274->276 279 9e6c4c-9e6c61 275->279 280 9e6c66 275->280 276->275 277->278 288 9e6ee0-9e6f0e GetModuleFileNameW CreateFileW 277->288 294 9e6fc3-9e6fcf call 9e2d8e 278->294 279->280 280->273 289 9e6f89-9e6f90 CloseHandle 288->289 290 9e6f10-9e6f1c SetFilePointer 288->290 289->278 290->289 292 9e6f1e-9e6f3a ReadFile 290->292 292->289 296 9e6f3c-9e6f61 292->296 299 9e6ffe-9e7025 call 9e39d4 GetFileAttributesW 294->299 300 9e6fd1-9e6fdc call 9e6b9c 294->300 298 9e6f7e-9e6f87 call 9e6689 296->298 298->289 307 9e6f63-9e6f7d call 9e6b9c 298->307 310 9e702f 299->310 311 9e7027-9e702b 299->311 300->299 309 9e6fde-9e6ffc CompareStringW 300->309 307->298 309->299 309->311 314 9e7031-9e7036 310->314 311->294 313 9e702d 311->313 313->314 315 9e706d-9e706f 314->315 316 9e7038 314->316 317 9e717c-9e7186 315->317 318 9e7075-9e708c call 9e3963 call 9e2d8e 315->318 319 9e703a-9e7061 call 9e39d4 GetFileAttributesW 316->319 329 9e708e-9e70ef call 9e6b9c * 2 call 9e4ba7 call 9e2aa2 call 9e4ba7 call 9f12f4 318->329 330 9e70f4-9e7127 call 9e2aa2 AllocConsole 318->330 324 9e706b 319->324 325 9e7063-9e7067 319->325 324->315 325->319 327 9e7069 325->327 327->315 336 9e7174-9e7176 ExitProcess 329->336 335 9e7129-9e716e GetCurrentProcessId AttachConsole call 9fa203 GetStdHandle WriteConsoleW Sleep FreeConsole 330->335 330->336 335->336
                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNEL32(kernel32), ref: 009E6BFD
                                                                                      • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 009E6C0F
                                                                                      • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 009E6C40
                                                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 009E6EEA
                                                                                      • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 009E6F04
                                                                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 009E6F14
                                                                                      • ReadFile.KERNEL32(00000000,?,00007FFE,00A0987C,00000000), ref: 009E6F32
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 009E6F8A
                                                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 009E6F9F
                                                                                      • CompareStringW.KERNEL32(00000400,00001001,?,?,DXGIDebug.dll,?,00A0987C,?,00000000,?,00000800), ref: 009E6FF3
                                                                                      • GetFileAttributesW.KERNELBASE(?,?,00A0987C,00000800,?,00000000,?,00000800), ref: 009E701D
                                                                                      • GetFileAttributesW.KERNEL32(?,?,00A09944,00000800), ref: 009E7059
                                                                                        • Part of subcall function 009E6B9C: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 009E6BB7
                                                                                        • Part of subcall function 009E6B9C: LoadLibraryW.KERNELBASE(?,?,009E590F,Crypt32.dll,00000000,009E5989,?,?,009E596C,00000000,00000000,?,00000000), ref: 009E6BD9
                                                                                      • _swprintf.LIBCMT ref: 009E70CB
                                                                                      • _swprintf.LIBCMT ref: 009E7117
                                                                                        • Part of subcall function 009E2AA2: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 009E2AB5
                                                                                      • AllocConsole.KERNEL32 ref: 009E711F
                                                                                      • GetCurrentProcessId.KERNEL32 ref: 009E7129
                                                                                      • AttachConsole.KERNEL32(00000000), ref: 009E7130
                                                                                      • _wcslen.LIBCMT ref: 009E7145
                                                                                      • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 009E7156
                                                                                      • WriteConsoleW.KERNEL32(00000000), ref: 009E715D
                                                                                      • Sleep.KERNEL32(00002710), ref: 009E7168
                                                                                      • FreeConsole.KERNEL32 ref: 009E716E
                                                                                      • ExitProcess.KERNEL32 ref: 009E7176
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l_wcslen
                                                                                      • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
                                                                                      • API String ID: 1207345701-3298887752
                                                                                      • Opcode ID: 92355b89d315db847583c107b634e995b6e653ef5505365f833e93d869754421
                                                                                      • Instruction ID: 0f6aa1d4b6ad0ffab6df72a2ecba425382735ac189de16fd92e3b1367a37e1e4
                                                                                      • Opcode Fuzzy Hash: 92355b89d315db847583c107b634e995b6e653ef5505365f833e93d869754421
                                                                                      • Instruction Fuzzy Hash: 3CD173B1508388AFD731DF91E848BDFBBECBB85344F50491DF18996292D7B08949CB62
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 009E4000
                                                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 009E403C
                                                                                        • Part of subcall function 009E3919: _wcslen.LIBCMT ref: 009E3921
                                                                                        • Part of subcall function 009E6934: _wcslen.LIBCMT ref: 009E693A
                                                                                        • Part of subcall function 009E7956: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,009E35CB,00000000,?,?), ref: 009E7972
                                                                                      • _wcslen.LIBCMT ref: 009E4379
                                                                                      • __fprintf_l.LIBCMT ref: 009E44AC
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcslen$ByteCharFileH_prologModuleMultiNameWide__fprintf_l
                                                                                      • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$R$RTL$a
                                                                                      • API String ID: 566448164-801612888
                                                                                      • Opcode ID: 2498d71e5da23ea4cb5c2afd97b07480228d4cb734589ca2daa09ee3859cabf5
                                                                                      • Instruction ID: 61c6561905c35f99ea110876b5a35f2258d5f18324336ed5cd917fa3c5c681e3
                                                                                      • Opcode Fuzzy Hash: 2498d71e5da23ea4cb5c2afd97b07480228d4cb734589ca2daa09ee3859cabf5
                                                                                      • Instruction Fuzzy Hash: 75320F71900298EBCF26EF65CC45BEE37A8FF55700F40456AFA0597291EB729D84CB90
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                        • Part of subcall function 009F20D8: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 009F20E9
                                                                                        • Part of subcall function 009F20D8: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 009F20FA
                                                                                        • Part of subcall function 009F20D8: IsDialogMessageW.USER32(?,?), ref: 009F210E
                                                                                        • Part of subcall function 009F20D8: TranslateMessage.USER32(?), ref: 009F211C
                                                                                        • Part of subcall function 009F20D8: DispatchMessageW.USER32(?), ref: 009F2126
                                                                                      • GetDlgItem.USER32(00000068,00A47248), ref: 009F3F9A
                                                                                      • ShowWindow.USER32(00000000,00000005,?,?,?,009F1B0D,00000001,?,?,009F2329,00A0ADA0,00A47248,00A47248,00001000,00000000,00000000), ref: 009F3FC2
                                                                                      • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 009F3FCD
                                                                                      • SendMessageW.USER32(00000000,000000C2,00000000,00A09584), ref: 009F3FDB
                                                                                      • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 009F3FF1
                                                                                      • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 009F400B
                                                                                      • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 009F404F
                                                                                      • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 009F405D
                                                                                      • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 009F406C
                                                                                      • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 009F4093
                                                                                      • SendMessageW.USER32(00000000,000000C2,00000000,00A09F1C), ref: 009F40A2
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                                                                      • String ID: \
                                                                                      • API String ID: 3569833718-2967466578
                                                                                      • Opcode ID: 008b60a1e65d0f0eb7826166b334511b0ce251d7dc4c7c21ca8576eab9ff1255
                                                                                      • Instruction ID: 8768c56aa0b52016a931ce02fe1da4620f9f213595de6829515fc87e609570b9
                                                                                      • Opcode Fuzzy Hash: 008b60a1e65d0f0eb7826166b334511b0ce251d7dc4c7c21ca8576eab9ff1255
                                                                                      • Instruction Fuzzy Hash: C7310175185340BFE321DF64AC08FAB3FACEBD2314F000528F652962A0C766494EC7A7
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: __allrem_wcslen$H_prolog
                                                                                      • String ID: AES-0017$x$z01$zip$zipx$zx01
                                                                                      • API String ID: 2085098250-2742067682
                                                                                      • Opcode ID: ad9cca37f24403b3b54abf8a42d6bdc6c4b507d1ed21bdc2ce048a347b7f1e20
                                                                                      • Instruction ID: 51dcd85db1e25eda16fbc798be24c0f038ddead80618c2ff7e1e725904354e52
                                                                                      • Opcode Fuzzy Hash: ad9cca37f24403b3b54abf8a42d6bdc6c4b507d1ed21bdc2ce048a347b7f1e20
                                                                                      • Instruction Fuzzy Hash: 69B2C074900294AFDB26DFAADC85ABD77B9FB99304F14402AF805D72A1E734DC82CB51
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1159 9f424f-9f4267 call 9f5690 1162 9f426d-9f4279 call 9fa203 1159->1162 1163 9f44a8-9f44b0 1159->1163 1162->1163 1166 9f427f-9f42a7 call 9f6660 1162->1166 1169 9f42a9 1166->1169 1170 9f42b1-9f42bf 1166->1170 1169->1170 1171 9f42d2-9f42d8 1170->1171 1172 9f42c1-9f42c4 1170->1172 1174 9f431b-9f431e 1171->1174 1173 9f42c8-9f42ce 1172->1173 1176 9f42f7-9f4304 1173->1176 1177 9f42d0 1173->1177 1174->1173 1175 9f4320-9f4326 1174->1175 1178 9f432d-9f432f 1175->1178 1179 9f4328-9f432b 1175->1179 1181 9f430a-9f430e 1176->1181 1182 9f4480-9f4482 1176->1182 1180 9f42e2-9f42ec 1177->1180 1183 9f4342-9f4358 call 9e349e 1178->1183 1184 9f4331-9f4338 1178->1184 1179->1178 1179->1183 1185 9f42ee 1180->1185 1186 9f42da-9f42e0 1180->1186 1187 9f4486 1181->1187 1188 9f4314-9f4319 1181->1188 1182->1187 1194 9f435a-9f4367 call 9e7d7d 1183->1194 1195 9f4371-9f437c call 9e2780 1183->1195 1184->1183 1189 9f433a 1184->1189 1185->1176 1186->1180 1191 9f42f0-9f42f3 1186->1191 1193 9f448f 1187->1193 1188->1174 1189->1183 1191->1176 1196 9f4496-9f4498 1193->1196 1194->1195 1204 9f4369 1194->1204 1205 9f437e-9f4395 call 9e3216 1195->1205 1206 9f4399-9f43a6 ShellExecuteExW 1195->1206 1199 9f449a-9f449c 1196->1199 1200 9f44a7 1196->1200 1199->1200 1203 9f449e-9f44a1 ShowWindow 1199->1203 1200->1163 1203->1200 1204->1195 1205->1206 1206->1200 1208 9f43ac-9f43b9 1206->1208 1210 9f43cc-9f43ce 1208->1210 1211 9f43bb-9f43c2 1208->1211 1213 9f43e5-9f43f8 WaitForInputIdle call 9f46d3 1210->1213 1214 9f43d0-9f43d9 IsWindowVisible 1210->1214 1211->1210 1212 9f43c4-9f43ca 1211->1212 1212->1210 1215 9f443b-9f4447 CloseHandle 1212->1215 1220 9f43fd-9f4404 1213->1220 1214->1213 1216 9f43db-9f43e3 ShowWindow 1214->1216 1218 9f4449-9f4456 call 9e7d7d 1215->1218 1219 9f4458-9f4466 1215->1219 1216->1213 1218->1193 1218->1219 1219->1196 1222 9f4468-9f446a 1219->1222 1220->1215 1223 9f4406-9f440e 1220->1223 1222->1196 1225 9f446c-9f4472 1222->1225 1223->1215 1226 9f4410-9f4421 GetExitCodeProcess 1223->1226 1225->1196 1227 9f4474-9f447e 1225->1227 1226->1215 1228 9f4423-9f442d 1226->1228 1227->1196 1229 9f442f 1228->1229 1230 9f4434 1228->1230 1229->1230 1230->1215
                                                                                      APIs
                                                                                      • _wcslen.LIBCMT ref: 009F426E
                                                                                      • ShellExecuteExW.SHELL32(?), ref: 009F439E
                                                                                      • IsWindowVisible.USER32(?), ref: 009F43D1
                                                                                      • ShowWindow.USER32(?,00000000), ref: 009F43DD
                                                                                      • WaitForInputIdle.USER32(?,000007D0), ref: 009F43EE
                                                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 009F4419
                                                                                      • CloseHandle.KERNEL32(?), ref: 009F443F
                                                                                      • ShowWindow.USER32(?,00000001), ref: 009F44A1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$Show$CloseCodeExecuteExitHandleIdleInputProcessShellVisibleWait_wcslen
                                                                                      • String ID: .exe$.inf
                                                                                      • API String ID: 3646668279-3750412487
                                                                                      • Opcode ID: 7be3d57e7ec74b07e9764c6a0b658c75abe98e3b1a0afe4ab7af3fc05fbe0d9d
                                                                                      • Instruction ID: 9936475adaaf690967caf33bd57ddd3e4a5f70c75aa5a6992a89e18bf04f04f1
                                                                                      • Opcode Fuzzy Hash: 7be3d57e7ec74b07e9764c6a0b658c75abe98e3b1a0afe4ab7af3fc05fbe0d9d
                                                                                      • Instruction Fuzzy Hash: F051E6341083889ADB31DF61D8447BB7BECAF81754F04481DF7C0A72A1D7B58D859B52
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1256 a00d74-a00d8d 1257 a00da3-a00da8 1256->1257 1258 a00d8f-a00d9f call a0535c 1256->1258 1260 a00db5-a00dd9 MultiByteToWideChar 1257->1260 1261 a00daa-a00db2 1257->1261 1258->1257 1266 a00da1 1258->1266 1263 a00f6c-a00f7f call 9f63dc 1260->1263 1264 a00ddf-a00deb 1260->1264 1261->1260 1267 a00ded-a00dfe 1264->1267 1268 a00e3f 1264->1268 1266->1257 1269 a00e00-a00e0f call a08420 1267->1269 1270 a00e1d-a00e2e call 9ff9e5 1267->1270 1272 a00e41-a00e43 1268->1272 1275 a00f61 1269->1275 1281 a00e15-a00e1b 1269->1281 1270->1275 1282 a00e34 1270->1282 1272->1275 1276 a00e49-a00e5c MultiByteToWideChar 1272->1276 1280 a00f63-a00f6a call a00fdc 1275->1280 1276->1275 1279 a00e62-a00e74 call a0137c 1276->1279 1286 a00e79-a00e7d 1279->1286 1280->1263 1285 a00e3a-a00e3d 1281->1285 1282->1285 1285->1272 1286->1275 1288 a00e83-a00e8a 1286->1288 1289 a00ec4-a00ed0 1288->1289 1290 a00e8c-a00e91 1288->1290 1292 a00ed2-a00ee3 1289->1292 1293 a00f1c 1289->1293 1290->1280 1291 a00e97-a00e99 1290->1291 1291->1275 1294 a00e9f-a00eb9 call a0137c 1291->1294 1296 a00ee5-a00ef4 call a08420 1292->1296 1297 a00efe-a00f0f call 9ff9e5 1292->1297 1295 a00f1e-a00f20 1293->1295 1294->1280 1308 a00ebf 1294->1308 1299 a00f22-a00f3b call a0137c 1295->1299 1300 a00f5a-a00f60 call a00fdc 1295->1300 1296->1300 1311 a00ef6-a00efc 1296->1311 1297->1300 1312 a00f11 1297->1312 1299->1300 1314 a00f3d-a00f44 1299->1314 1300->1275 1308->1275 1313 a00f17-a00f1a 1311->1313 1312->1313 1313->1295 1315 a00f80-a00f86 1314->1315 1316 a00f46-a00f47 1314->1316 1317 a00f48-a00f58 WideCharToMultiByte 1315->1317 1316->1317 1317->1300 1318 a00f88-a00f8f call a00fdc 1317->1318 1318->1280
                                                                                      APIs
                                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,009FBD5E,009FBD5E,?,?,?,00A00FC5,00000001,00000001,F4E85006), ref: 00A00DCE
                                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00A00FC5,00000001,00000001,F4E85006,?,?,?), ref: 00A00E54
                                                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,F4E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00A00F4E
                                                                                      • __freea.LIBCMT ref: 00A00F5B
                                                                                        • Part of subcall function 009FF9E5: RtlAllocateHeap.NTDLL(00000000,?,?,?,009FA7E9,?,0000015D,?,?,?,?,009FBCC5,000000FF,00000000,?,?), ref: 009FFA17
                                                                                      • __freea.LIBCMT ref: 00A00F64
                                                                                      • __freea.LIBCMT ref: 00A00F89
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                      • String ID:
                                                                                      • API String ID: 1414292761-0
                                                                                      • Opcode ID: 2d38bb5245d2b1e207722cb4ad0dd7a4e83088abeb220ad3c7d9470fe0f50db2
                                                                                      • Instruction ID: d9cbf2d3e50cede4634e2192ee82febd4ee9024da7b5a1de730c40f2f539227f
                                                                                      • Opcode Fuzzy Hash: 2d38bb5245d2b1e207722cb4ad0dd7a4e83088abeb220ad3c7d9470fe0f50db2
                                                                                      • Instruction Fuzzy Hash: DF519E7260021FABDB258F64EC81FAB77A9EB44750F194629FD08D61D0EB74DC50E6A0
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 009E7295
                                                                                        • Part of subcall function 009E2D8E: GetVersionExW.KERNEL32(?), ref: 009E2DB3
                                                                                      • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 009E72B9
                                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 009E72D3
                                                                                      • TzSpecificLocalTimeToSystemTime.KERNELBASE(00000000,?,?), ref: 009E72E6
                                                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 009E72F6
                                                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 009E7306
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: Time$File$System$Local$SpecificVersion
                                                                                      • String ID:
                                                                                      • API String ID: 2092733347-0
                                                                                      • Opcode ID: 82879cc0a16220a8540bdc405ec1672db69f9ececc26d357fe86edfd0866f8af
                                                                                      • Instruction ID: 56a56a182c506606d2c20d2c7483926723b8fdd63c75e27bd664f89a73e98617
                                                                                      • Opcode Fuzzy Hash: 82879cc0a16220a8540bdc405ec1672db69f9ececc26d357fe86edfd0866f8af
                                                                                      • Instruction Fuzzy Hash: 9531EA75108356AFC704DFA9D88499BB7E8BF88754F00591EF999C3210E730D949CBA6
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1330 9f1c99-9f1cb7 GetCurrentProcess OpenProcessToken 1331 9f1d1c 1330->1331 1332 9f1cb9-9f1cd1 GetTokenInformation 1330->1332 1333 9f1d1e-9f1d20 1331->1333 1334 9f1cde-9f1cff call 9fc65d GetTokenInformation 1332->1334 1335 9f1cd3-9f1cdc GetLastError 1332->1335 1338 9f1d01-9f1d0e CopySid 1334->1338 1339 9f1d10-9f1d1a call 9fa479 1334->1339 1335->1331 1335->1334 1338->1339 1339->1333
                                                                                      APIs
                                                                                      • GetCurrentProcess.KERNEL32(00020008,009F1996,?,?,?,?,009F1996,?), ref: 009F1CA8
                                                                                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,009F1996,?), ref: 009F1CAF
                                                                                      • GetTokenInformation.KERNELBASE(009F1996,00000001(TokenIntegrityLevel),00000000,00000000,?,?,?,?,?,009F1996,?), ref: 009F1CC9
                                                                                      • GetLastError.KERNEL32(?,?,?,?,009F1996,?), ref: 009F1CD3
                                                                                      • GetTokenInformation.KERNELBASE(009F1996,00000001(TokenIntegrityLevel),00000000,?,?,?,?,?,?,?,009F1996,?), ref: 009F1CF7
                                                                                      • CopySid.ADVAPI32(00000044,009F1996,00000000,?,?,?,?,?,009F1996,?), ref: 009F1D08
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: Token$InformationProcess$CopyCurrentErrorLastOpen
                                                                                      • String ID:
                                                                                      • API String ID: 3984476752-0
                                                                                      • Opcode ID: 90cfcd85f973375e0d59848bef32fd650e186f375fd1a2155b06ae5bd92edc6e
                                                                                      • Instruction ID: c41ce8be430d603c868f88a45c70cd718cba634021a7572512ea8685058575b8
                                                                                      • Opcode Fuzzy Hash: 90cfcd85f973375e0d59848bef32fd650e186f375fd1a2155b06ae5bd92edc6e
                                                                                      • Instruction Fuzzy Hash: 67015B79640108FFEB159FE0AC89EEE7B7DEB55340F200015F606A10A1D7728E41ABA1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1342 9f46d3-9f46ec WaitForSingleObject 1343 9f46ee-9f46ef 1342->1343 1344 9f4734-9f4736 1342->1344 1345 9f46f1-9f4701 PeekMessageW 1343->1345 1346 9f4724-9f4731 WaitForSingleObject 1345->1346 1347 9f4703-9f471e GetMessageW TranslateMessage DispatchMessageW 1345->1347 1346->1345 1348 9f4733 1346->1348 1347->1346 1348->1344
                                                                                      APIs
                                                                                      • WaitForSingleObject.KERNEL32(?,0000000A), ref: 009F46DF
                                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 009F46F9
                                                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 009F470A
                                                                                      • TranslateMessage.USER32(?), ref: 009F4714
                                                                                      • DispatchMessageW.USER32(?), ref: 009F471E
                                                                                      • WaitForSingleObject.KERNEL32(?,0000000A), ref: 009F4729
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
                                                                                      • String ID:
                                                                                      • API String ID: 2148572870-0
                                                                                      • Opcode ID: e29a7cca054c80dcd0585693801f2cc98a920a23896fd624dda0e7bb1b813e87
                                                                                      • Instruction ID: 7435d22740c7a9de0470fd957fcd394ebd6aa6b1056ccd025973308d28bfdbd8
                                                                                      • Opcode Fuzzy Hash: e29a7cca054c80dcd0585693801f2cc98a920a23896fd624dda0e7bb1b813e87
                                                                                      • Instruction Fuzzy Hash: C2F03C76A0112DABDB20ABE5DC8DDDB7F6DEF92391B004011F606D2050E6358546CBA1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1349 9f3939-9f393c 1350 9f3abb-9f3abe 1349->1350 1351 9f3942-9f3967 GetTempPathW call 9e31e2 1349->1351 1353 9f3e8b-9f3eb6 call 9f1e84 1350->1353 1354 9f3ac4-9f3aca 1350->1354 1360 9f396b-9f3997 call 9e2aa2 call 9e2780 1351->1360 1362 9f3ebc-9f3eca 1353->1362 1363 9f3245-9f3253 1353->1363 1357 9f3acc 1354->1357 1358 9f3ad6-9f3add 1354->1358 1357->1358 1358->1353 1371 9f3969-9f396a 1360->1371 1372 9f3999-9f39b0 SetDlgItemTextW 1360->1372 1366 9f3254-9f3269 call 9f1b9e 1363->1366 1373 9f326b 1366->1373 1371->1360 1372->1353 1375 9f39b6-9f39bc 1372->1375 1374 9f326d-9f3282 call 9e7d7d 1373->1374 1380 9f328f-9f3292 1374->1380 1381 9f3284-9f3288 1374->1381 1375->1353 1377 9f39c2-9f39dd call 9f6b70 1375->1377 1385 9f39df-9f39eb 1377->1385 1386 9f3a2d-9f3a34 1377->1386 1380->1353 1384 9f3298 1380->1384 1381->1374 1383 9f328a 1381->1383 1383->1353 1389 9f329f-9f32a2 1384->1389 1390 9f352e-9f3530 1384->1390 1391 9f3511-9f3513 1384->1391 1392 9f3470-9f3472 1384->1392 1385->1386 1393 9f39ed 1385->1393 1387 9f3a66-9f3a96 call 9f1924 call 9f12f4 1386->1387 1388 9f3a36-9f3a61 call 9e695c * 2 1386->1388 1387->1353 1429 9f3a9c-9f3ab6 EndDialog 1387->1429 1388->1387 1389->1353 1399 9f32a8-9f3302 call 9f115d call 9e3825 call 9e2abe call 9e2bf8 call 9e1b85 1389->1399 1390->1353 1396 9f3536-9f353d 1390->1396 1391->1353 1394 9f3519-9f3529 SetWindowTextW 1391->1394 1392->1353 1397 9f3478-9f3484 1392->1397 1400 9f39f0-9f39f4 1393->1400 1394->1353 1396->1353 1402 9f3543-9f355c 1396->1402 1403 9f3498-9f349d 1397->1403 1404 9f3486-9f3497 call 9fdcc7 1397->1404 1464 9f3441-9f3456 call 9e2b4b 1399->1464 1407 9f3a08-9f3a25 call 9e695c 1400->1407 1408 9f39f6-9f3a04 1400->1408 1411 9f355e 1402->1411 1412 9f3564-9f3572 call 9fa203 1402->1412 1416 9f349f-9f34a5 1403->1416 1417 9f34a7-9f34b2 call 9f1ffe 1403->1417 1404->1403 1407->1386 1408->1400 1418 9f3a06 1408->1418 1411->1412 1412->1353 1434 9f3578-9f3581 1412->1434 1424 9f34b7-9f34b9 1416->1424 1417->1424 1418->1386 1426 9f34bb-9f34c2 call 9fa203 1424->1426 1427 9f34c4-9f34e4 call 9fa203 call 9fc668 1424->1427 1426->1427 1453 9f34fd-9f34ff 1427->1453 1454 9f34e6-9f34ed 1427->1454 1429->1353 1438 9f35aa-9f35ad 1434->1438 1439 9f3583-9f3587 1434->1439 1441 9f35b3-9f35b6 1438->1441 1442 9f3692-9f36a0 call 9e695c 1438->1442 1439->1441 1444 9f3589-9f3591 1439->1444 1447 9f35b8-9f35bd 1441->1447 1448 9f35c3-9f35de 1441->1448 1462 9f36a2-9f36b6 call 9f7204 1442->1462 1444->1353 1451 9f3597-9f35a5 call 9e695c 1444->1451 1447->1442 1447->1448 1465 9f3628-9f362f 1448->1465 1466 9f35e0-9f361a 1448->1466 1451->1462 1453->1353 1461 9f3505-9f350c call 9fa479 1453->1461 1459 9f34ef-9f34f1 1454->1459 1460 9f34f4-9f34fc call 9fdcc7 1454->1460 1459->1460 1460->1453 1461->1353 1477 9f36b8-9f36bc 1462->1477 1478 9f36c3-9f371d call 9e695c call 9f1d23 GetDlgItem SetWindowTextW SendMessageW call 9fc55b 1462->1478 1483 9f345c-9f346b call 9e2ad4 1464->1483 1484 9f3307-9f331b SetFileAttributesW 1464->1484 1474 9f365d-9f3680 call 9fa203 * 2 1465->1474 1475 9f3631-9f3649 call 9fa203 1465->1475 1501 9f361e-9f3620 1466->1501 1502 9f361c 1466->1502 1474->1462 1506 9f3682-9f3690 call 9e6934 1474->1506 1475->1474 1488 9f364b-9f3658 call 9e6934 1475->1488 1477->1478 1485 9f36be-9f36c0 1477->1485 1478->1353 1516 9f3723-9f3737 SendMessageW 1478->1516 1483->1353 1490 9f33c1-9f33d1 GetFileAttributesW 1484->1490 1491 9f3321-9f3354 call 9e3502 call 9e31e2 call 9fa203 1484->1491 1485->1478 1488->1474 1490->1464 1499 9f33d3-9f33e2 DeleteFileW 1490->1499 1521 9f3367-9f3375 call 9e37e6 1491->1521 1522 9f3356-9f3365 call 9fa203 1491->1522 1499->1464 1505 9f33e4-9f33e7 1499->1505 1501->1465 1502->1501 1509 9f33eb-9f3417 call 9e2aa2 GetFileAttributesW 1505->1509 1506->1462 1519 9f33e9-9f33ea 1509->1519 1520 9f3419-9f342f MoveFileW 1509->1520 1516->1353 1519->1509 1520->1464 1523 9f3431-9f343b MoveFileExW 1520->1523 1521->1483 1528 9f337b-9f33bb call 9fa203 call 9f6660 SHFileOperationW 1521->1528 1522->1521 1522->1528 1523->1464 1528->1490
                                                                                      APIs
                                                                                      • GetTempPathW.KERNEL32(00000800,?), ref: 009F394F
                                                                                        • Part of subcall function 009E31E2: _wcslen.LIBCMT ref: 009E31E8
                                                                                      • _swprintf.LIBCMT ref: 009F3983
                                                                                        • Part of subcall function 009E2AA2: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 009E2AB5
                                                                                      • SetDlgItemTextW.USER32(?,00000066,00A37D82), ref: 009F39A3
                                                                                      • EndDialog.USER32(?,00000001), ref: 009F3AB0
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcslen
                                                                                      • String ID: %s%s%u
                                                                                      • API String ID: 110358324-1360425832
                                                                                      • Opcode ID: ec7bfe078c01b8fb879f511629919890378782623f5c6b4a233f840c837566f5
                                                                                      • Instruction ID: 6fbb8ec509d1dab7f1ce355812503f2f9b9e0b9a21b5ce008b95fdbbd2a0a8d7
                                                                                      • Opcode Fuzzy Hash: ec7bfe078c01b8fb879f511629919890378782623f5c6b4a233f840c837566f5
                                                                                      • Instruction Fuzzy Hash: EF418CB190025DAADF21DB95DC40FFE77BCEB54340F4080A6FA08A7081EB799B848F61
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                        • Part of subcall function 009E6B9C: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 009E6BB7
                                                                                        • Part of subcall function 009E6B9C: LoadLibraryW.KERNELBASE(?,?,009E590F,Crypt32.dll,00000000,009E5989,?,?,009E596C,00000000,00000000,?,00000000), ref: 009E6BD9
                                                                                      • OleInitialize.OLE32(00000000), ref: 009F1834
                                                                                      • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 009F186B
                                                                                      • SHGetMalloc.SHELL32(00A2F948), ref: 009F1875
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                                                                                      • String ID: riched20.dll$3To
                                                                                      • API String ID: 3498096277-2168385784
                                                                                      • Opcode ID: 66ba9d7f0714acbec28257f054635f4ca0da3a03836d143ff8bc83334213ae51
                                                                                      • Instruction ID: c6d75e7e58905b981fe05fa3b74fc6aa54df282bd85f429e75840f914bb38276
                                                                                      • Opcode Fuzzy Hash: 66ba9d7f0714acbec28257f054635f4ca0da3a03836d143ff8bc83334213ae51
                                                                                      • Instruction Fuzzy Hash: 8BF04FB9D00209ABDB10AF99D849AAFFBFCEFD5300F00402AE414E2240D7B556058BA1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1537 9e1ee0-9e1f01 call 9f5690 1540 9e1f0c 1537->1540 1541 9e1f03-9e1f06 1537->1541 1543 9e1f0e-9e1f1f 1540->1543 1541->1540 1542 9e1f08-9e1f0a 1541->1542 1542->1543 1544 9e1f27-9e1f31 1543->1544 1545 9e1f21 1543->1545 1546 9e1f36-9e1f43 call 9e1b85 1544->1546 1547 9e1f33 1544->1547 1545->1544 1550 9e1f4b-9e1f6a CreateFileW 1546->1550 1551 9e1f45 1546->1551 1547->1546 1552 9e1f6c-9e1f8e GetLastError call 9e35e5 1550->1552 1553 9e1fbb-9e1fbf 1550->1553 1551->1550 1557 9e1fc8-9e1fcd 1552->1557 1559 9e1f90-9e1fb3 CreateFileW GetLastError 1552->1559 1555 9e1fc3-9e1fc6 1553->1555 1555->1557 1558 9e1fd9-9e1fde 1555->1558 1557->1558 1560 9e1fcf 1557->1560 1561 9e1fff-9e2010 1558->1561 1562 9e1fe0-9e1fe3 1558->1562 1559->1555 1563 9e1fb5-9e1fb9 1559->1563 1560->1558 1565 9e202e-9e2039 1561->1565 1566 9e2012-9e202a call 9e695c 1561->1566 1562->1561 1564 9e1fe5-9e1ff9 SetFileTime 1562->1564 1563->1555 1564->1561 1566->1565
                                                                                      APIs
                                                                                      • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,08000000,00000000), ref: 009E1F5F
                                                                                      • GetLastError.KERNEL32 ref: 009E1F6C
                                                                                      • CreateFileW.KERNEL32(00000000,?,?,00000000,00000003,08000000,00000000,?,?,00000800), ref: 009E1FA2
                                                                                      • GetLastError.KERNEL32 ref: 009E1FAA
                                                                                      • SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000), ref: 009E1FF9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$CreateErrorLast$Time
                                                                                      • String ID:
                                                                                      • API String ID: 1999340476-0
                                                                                      • Opcode ID: c969b4f55fafcc57a56ec915d3a3c6f14cd8d11764a8b8c35eb35c97050a3daa
                                                                                      • Instruction ID: bd228858bf62a91a96d28040b559d72ab360a4392dc4e72a1f4608dfb73c0859
                                                                                      • Opcode Fuzzy Hash: c969b4f55fafcc57a56ec915d3a3c6f14cd8d11764a8b8c35eb35c97050a3daa
                                                                                      • Instruction Fuzzy Hash: 3E311130544785AFE321CF26CC45BEABBA8FB44320F200B19F9A5961D1C7B4AD89CBD5
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1607 9f20d8-9f20f1 PeekMessageW 1608 9f212c-9f212e 1607->1608 1609 9f20f3-9f2107 GetMessageW 1607->1609 1610 9f2109-9f2116 IsDialogMessageW 1609->1610 1611 9f2118-9f2126 TranslateMessage DispatchMessageW 1609->1611 1610->1608 1610->1611 1611->1608
                                                                                      APIs
                                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 009F20E9
                                                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 009F20FA
                                                                                      • IsDialogMessageW.USER32(?,?), ref: 009F210E
                                                                                      • TranslateMessage.USER32(?), ref: 009F211C
                                                                                      • DispatchMessageW.USER32(?), ref: 009F2126
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: Message$DialogDispatchPeekTranslate
                                                                                      • String ID:
                                                                                      • API String ID: 1266772231-0
                                                                                      • Opcode ID: 264743d525de62f9495d119ccd15c558687c041d9099a2102532ea5a5a6096fa
                                                                                      • Instruction ID: f10713ae80538a1d5c7a889cd55e2ec1aa580c99da4a50a836e322c7f3a30913
                                                                                      • Opcode Fuzzy Hash: 264743d525de62f9495d119ccd15c558687c041d9099a2102532ea5a5a6096fa
                                                                                      • Instruction Fuzzy Hash: 40F03079A01119AB9B20DBF6DC4CEEB7F7CEE962507004014B605D2040E779D506C7B1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetClassNameW.USER32(?,?,00000050), ref: 009F16D7
                                                                                      • SHAutoComplete.SHLWAPI(?,00000010), ref: 009F170E
                                                                                        • Part of subcall function 009E7D7D: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,009E3108,?,?,?,009E30B5,?,-00000002,?,00000000,?), ref: 009E7D93
                                                                                      • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 009F16FE
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                                                      • String ID: EDIT
                                                                                      • API String ID: 4243998846-3080729518
                                                                                      • Opcode ID: a5c3b5edc8330ce3713e394219f1afeccdee5e2e3eac1265ab52f88074c397ab
                                                                                      • Instruction ID: 5aa09adec5fa2de0ba98dc41bf3e900f047da467be48d513bd93ce3da5deb048
                                                                                      • Opcode Fuzzy Hash: a5c3b5edc8330ce3713e394219f1afeccdee5e2e3eac1265ab52f88074c397ab
                                                                                      • Instruction Fuzzy Hash: ABF08236640728B7DB30A6559C09FAB766C9FD6B40F040015BA45F20D0D765990286F6
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 009F468C
                                                                                      • SetEnvironmentVariableW.KERNELBASE(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 009F46C8
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: EnvironmentVariable
                                                                                      • String ID: sfxcmd$sfxpar
                                                                                      • API String ID: 1431749950-3493335439
                                                                                      • Opcode ID: 799b7e548d47c50fe11edd77a63b786f1741b3ad4f168c11065999656c08d883
                                                                                      • Instruction ID: 634eaed32c825b4e32e22194117834f8865ea8308735514c88a049b894a52b94
                                                                                      • Opcode Fuzzy Hash: 799b7e548d47c50fe11edd77a63b786f1741b3ad4f168c11065999656c08d883
                                                                                      • Instruction Fuzzy Hash: 20F0E57290033CB6DF216B95DC0ABBB7BACAF55B81B000511FE88D6082D7648C41C7F1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,?,009F9FB8,00000000,?,00A49614,?,?,?,009FA15B,00000004,InitializeCriticalSectionEx,00A0C0B4,InitializeCriticalSectionEx), ref: 009FA014
                                                                                      • GetLastError.KERNEL32(?,009F9FB8,00000000,?,00A49614,?,?,?,009FA15B,00000004,InitializeCriticalSectionEx,00A0C0B4,InitializeCriticalSectionEx,00000000,?,009F9DA2), ref: 009FA01E
                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 009FA046
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: LibraryLoad$ErrorLast
                                                                                      • String ID: api-ms-
                                                                                      • API String ID: 3177248105-2084034818
                                                                                      • Opcode ID: d102f051fa8a6a46aa54acc66cdacca32705c5839e23d1d483a4ec8a6293513a
                                                                                      • Instruction ID: 0fb657e2dd8e9c19fb651337accfb33c0501b2e6ac0c90d854047f0de627bf2c
                                                                                      • Opcode Fuzzy Hash: d102f051fa8a6a46aa54acc66cdacca32705c5839e23d1d483a4ec8a6293513a
                                                                                      • Instruction Fuzzy Hash: F0E048707C420DFBEF201F90FD0AB793B59BB01B50F144020FE0DA40E1DBA29852D645
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: _strncpy$Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                      • String ID:
                                                                                      • API String ID: 2527496121-0
                                                                                      • Opcode ID: 68be70dfb966b01a6805ec0a19e3bb824aa465e93b7c207a29034b2408531959
                                                                                      • Instruction ID: 4a37f726f8ea9d0ae8747e887be8a290857d942f787e07d38c620d6fb8e9ee86
                                                                                      • Opcode Fuzzy Hash: 68be70dfb966b01a6805ec0a19e3bb824aa465e93b7c207a29034b2408531959
                                                                                      • Instruction Fuzzy Hash: 0BB18CB16153519FD325DFADDC90A3A77A5FB98308B00093DF855932A0FB34AD478B92
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetStdHandle.KERNEL32(000000F6), ref: 009E1DA5
                                                                                      • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 009E1DBD
                                                                                      • GetLastError.KERNEL32 ref: 009E1DEF
                                                                                      • GetLastError.KERNEL32 ref: 009E1E0E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$FileHandleRead
                                                                                      • String ID:
                                                                                      • API String ID: 2244327787-0
                                                                                      • Opcode ID: d9d66d4dfadb8aa1ffafa2417350a594206938e39771e79932fbc5bf1c08ebb5
                                                                                      • Instruction ID: b13e8f6409646e54a1222e1dd339b95bab92600a68eed2b59b3741de23db20fc
                                                                                      • Opcode Fuzzy Hash: d9d66d4dfadb8aa1ffafa2417350a594206938e39771e79932fbc5bf1c08ebb5
                                                                                      • Instruction Fuzzy Hash: 49118E34A00694EBCF269FA6CC04AAA37ADFB45321F104A2EF826C61D0D7748E85DB51
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,009FA652,00000000,00000000,?,00A010EB,009FA652,00000000,00000000,00000000,?,00A012E8,00000006,FlsSetValue), ref: 00A01176
                                                                                      • GetLastError.KERNEL32(?,00A010EB,009FA652,00000000,00000000,00000000,?,00A012E8,00000006,FlsSetValue,00A0D690,FlsSetValue,00000000,00000364,?,009FF837), ref: 00A01182
                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00A010EB,009FA652,00000000,00000000,00000000,?,00A012E8,00000006,FlsSetValue,00A0D690,FlsSetValue,00000000), ref: 00A01190
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: LibraryLoad$ErrorLast
                                                                                      • String ID:
                                                                                      • API String ID: 3177248105-0
                                                                                      • Opcode ID: 9b2146098112b5fce9cd912a3328ac31874a6d776b81dee41d1d1adbfe9b3902
                                                                                      • Instruction ID: 41c02289b94248e8274d026f2a879c3c0feba736ac41cdb74079caba99edaa22
                                                                                      • Opcode Fuzzy Hash: 9b2146098112b5fce9cd912a3328ac31874a6d776b81dee41d1d1adbfe9b3902
                                                                                      • Instruction Fuzzy Hash: EE01AC3675122E9BC7258BA8BC84A977B6CAF457617100728FA0AD71C1D721D802C6D0
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetStdHandle.KERNEL32(000000F5,?,?,00000000,00000000,009EAFDE,?,?,?,?,?,009EB798,00A1E5AC,?,009EC12B,00010000), ref: 009E253E
                                                                                      • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 009E2585
                                                                                      • WriteFile.KERNELBASE(00000008,?,009EC12B,00010000,00000000,02B1F091,?,?,?,00000000,00000000,009EAFDE,?,?,?,?), ref: 009E25B1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileWrite$Handle
                                                                                      • String ID:
                                                                                      • API String ID: 4209713984-0
                                                                                      • Opcode ID: 37196598a798c533b711639ba50532987d9f27fdf3d9334cbc024442576d553f
                                                                                      • Instruction ID: 2cafe70ec1d31e0c3703ecb851c0e82420324e6c42ffc4c591f53273448f4401
                                                                                      • Opcode Fuzzy Hash: 37196598a798c533b711639ba50532987d9f27fdf3d9334cbc024442576d553f
                                                                                      • Instruction Fuzzy Hash: 9C31D131104386AFDB16CF15D928BAE77AEFB85714F04491DF88157290CB74DD49CBA2
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                        • Part of subcall function 009E38FD: _wcslen.LIBCMT ref: 009E3903
                                                                                      • CreateDirectoryW.KERNELBASE(?,00000000,?), ref: 009E2837
                                                                                      • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?), ref: 009E286A
                                                                                      • GetLastError.KERNEL32(?,?), ref: 009E2887
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateDirectory$ErrorLast_wcslen
                                                                                      • String ID:
                                                                                      • API String ID: 2260680371-0
                                                                                      • Opcode ID: c1122606427d84edbdc6aa045dfcecaec5de4d8721cba74e74ffcd8cd8e475c6
                                                                                      • Instruction ID: dca1310c3ef2c711a2b832ff4a6c469c1e6da26fff2771f9f20fc52aadd49c82
                                                                                      • Opcode Fuzzy Hash: c1122606427d84edbdc6aa045dfcecaec5de4d8721cba74e74ffcd8cd8e475c6
                                                                                      • Instruction Fuzzy Hash: A201F7352002E43AEF2BABB68C4ABFE336C6F05780F084464FA46D6091DB64CE81C661
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 00A01CC8
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: Info
                                                                                      • String ID:
                                                                                      • API String ID: 1807457897-3916222277
                                                                                      • Opcode ID: 1b89ee60b31ab6bf5166808042c428db6551b9e3f17b3a239d5d3e77bc44ae9b
                                                                                      • Instruction ID: 03caa62175915ac8120172fd737774df4d2c8df00b98dcfc6623503e94fee13f
                                                                                      • Opcode Fuzzy Hash: 1b89ee60b31ab6bf5166808042c428db6551b9e3f17b3a239d5d3e77bc44ae9b
                                                                                      • Instruction Fuzzy Hash: ED41087050434C9FDB228F64DC84BFABBFAEB45304F2404ECE58A87182E275AA45DF60
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,F4E85006,00000001,?,000000FF), ref: 00A013ED
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: String
                                                                                      • String ID: LCMapStringEx
                                                                                      • API String ID: 2568140703-3893581201
                                                                                      • Opcode ID: e3e05426bfa886c69b0434db3f9f0da5ec7fa23a41cdf4e7f600d2cb76e5268e
                                                                                      • Instruction ID: 58e9a50a16d1afbde03811168b0e3204a3fbd18dabe6b35949943e9041985d72
                                                                                      • Opcode Fuzzy Hash: e3e05426bfa886c69b0434db3f9f0da5ec7fa23a41cdf4e7f600d2cb76e5268e
                                                                                      • Instruction Fuzzy Hash: 8301D33250021DBBCF02AF90ED05DEE3F66FB48750F054555FA18251A1CA769932AB85
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,00A0091F), ref: 00A01365
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: CountCriticalInitializeSectionSpin
                                                                                      • String ID: InitializeCriticalSectionEx
                                                                                      • API String ID: 2593887523-3084827643
                                                                                      • Opcode ID: edb95e3c3c548e161a9c69c369af36082e353a1b42336e943877e0367dcdbaa5
                                                                                      • Instruction ID: 868b6ed337c0536b67ff73d0ef177e0bf4781095a68effb18e77814ec04cc588
                                                                                      • Opcode Fuzzy Hash: edb95e3c3c548e161a9c69c369af36082e353a1b42336e943877e0367dcdbaa5
                                                                                      • Instruction Fuzzy Hash: 2AF0BE32A4121CBBCF11AF90EC05DEEBF65EF48711F408069FD085A2B0CA724D129B84
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: Alloc
                                                                                      • String ID: FlsAlloc
                                                                                      • API String ID: 2773662609-671089009
                                                                                      • Opcode ID: edfa53a76177574fd0950e765b54563667810a33b21f941c905549025694a5e0
                                                                                      • Instruction ID: 8f664cb444087115f98cdfd0deb3519be131159c4ef2caff70fb7c8bb222d75a
                                                                                      • Opcode Fuzzy Hash: edfa53a76177574fd0950e765b54563667810a33b21f941c905549025694a5e0
                                                                                      • Instruction Fuzzy Hash: FBE0E532B5121C7BC701AFA4BC06EEE7B64EB59711F414169F909572D1DE721D0286C9
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F561A
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID: 3To
                                                                                      • API String ID: 697777088-245939750
                                                                                      • Opcode ID: 19923770bd7f20295276096590453040dc92a0ae5a3ac05efdd5aa208c3cb3e9
                                                                                      • Instruction ID: e4e1738722c6f3bbc403a0f373f013798764a65304b46c086868f69718e8f22c
                                                                                      • Opcode Fuzzy Hash: 19923770bd7f20295276096590453040dc92a0ae5a3ac05efdd5aa208c3cb3e9
                                                                                      • Instruction Fuzzy Hash: D8B012952BA4047C310452511D03E7A010CD4C0F123B18B3BF310C008194404C501337
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                        • Part of subcall function 00A01BCB: GetOEMCP.KERNEL32(00000000,?,?,00A01E54,?), ref: 00A01BF6
                                                                                      • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,00A01E99,?,00000000), ref: 00A02074
                                                                                      • GetCPInfo.KERNEL32(00000000,00A01E99,?,?,?,00A01E99,?,00000000), ref: 00A02087
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: CodeInfoPageValid
                                                                                      • String ID:
                                                                                      • API String ID: 546120528-0
                                                                                      • Opcode ID: 8412f509329bd89b778d0cc789b0245ac2dc399d249e55519d379a73062bcdef
                                                                                      • Instruction ID: 3d7f0dfbf2d0a9bb041de286fc0c2d5f42c48f2959451d8c3f210625f4733ea3
                                                                                      • Opcode Fuzzy Hash: 8412f509329bd89b778d0cc789b0245ac2dc399d249e55519d379a73062bcdef
                                                                                      • Instruction Fuzzy Hash: 21512370A0034D9EDB208F75E8897FBBBE5EF41300F14426ED5968B1D1D7759946CB90
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • SetFilePointer.KERNELBASE(000000FF,?,?,?), ref: 009E21A2
                                                                                      • GetLastError.KERNEL32 ref: 009E21B1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorFileLastPointer
                                                                                      • String ID:
                                                                                      • API String ID: 2976181284-0
                                                                                      • Opcode ID: cf81a796b6500625e8038f283e990af9e9a4261d4381da665477d0dcef81946e
                                                                                      • Instruction ID: c7e711db1ea2d2e893a54d2b6962c2f385814e973dd2448583ca252738c6bd64
                                                                                      • Opcode Fuzzy Hash: cf81a796b6500625e8038f283e990af9e9a4261d4381da665477d0dcef81946e
                                                                                      • Instruction Fuzzy Hash: 274159706083C69BDB26DF66C884AAA73EDFF98362F10091DE945832C1D7B4DD85CB91
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                        • Part of subcall function 009FF765: GetLastError.KERNEL32(?,?,009FABD7,?,?,?,009FA652,00000050), ref: 009FF769
                                                                                        • Part of subcall function 009FF765: _free.LIBCMT ref: 009FF79C
                                                                                        • Part of subcall function 009FF765: SetLastError.KERNEL32(00000000), ref: 009FF7DD
                                                                                        • Part of subcall function 009FF765: _abort.LIBCMT ref: 009FF7E3
                                                                                        • Part of subcall function 00A01F5E: _abort.LIBCMT ref: 00A01F90
                                                                                        • Part of subcall function 00A01F5E: _free.LIBCMT ref: 00A01FC4
                                                                                        • Part of subcall function 00A01BCB: GetOEMCP.KERNEL32(00000000,?,?,00A01E54,?), ref: 00A01BF6
                                                                                      • _free.LIBCMT ref: 00A01EAF
                                                                                      • _free.LIBCMT ref: 00A01EE5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: _free$ErrorLast_abort
                                                                                      • String ID:
                                                                                      • API String ID: 2991157371-0
                                                                                      • Opcode ID: 2e1b6f81737a3d676d5138cd733fc57fcb9a832e0e77149f9a7b6f747cd2e68b
                                                                                      • Instruction ID: 871c4108bf9d327a2fcd2b7b2990e73fd936a5c8ff9bfb8fa59c9c96793b118c
                                                                                      • Opcode Fuzzy Hash: 2e1b6f81737a3d676d5138cd733fc57fcb9a832e0e77149f9a7b6f747cd2e68b
                                                                                      • Instruction Fuzzy Hash: EB31613190420CAFDB10EBA8E981BEDB7F5AF85324F2541A9E9049B2D1EB729D41CB50
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • FlushFileBuffers.KERNEL32(?), ref: 009E23BC
                                                                                      • SetFileTime.KERNELBASE(?,?,?,?), ref: 009E2470
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$BuffersFlushTime
                                                                                      • String ID:
                                                                                      • API String ID: 1392018926-0
                                                                                      • Opcode ID: 951f4b5f97e1c08fa4a388abd5ea863862efabe489355af63bcb6a7ccf79654a
                                                                                      • Instruction ID: f3c7b0a283a2884d07edd4f00d36940ed298ffb5a59d05d46cbcfaaa03881540
                                                                                      • Opcode Fuzzy Hash: 951f4b5f97e1c08fa4a388abd5ea863862efabe489355af63bcb6a7ccf79654a
                                                                                      • Instruction Fuzzy Hash: BE21D0312483C59BC716DF66C891AABBBECAF95704F04481DF4C587191D329ED0DDB62
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • CreateFileW.KERNELBASE(?,?,00000001,00000000,00000002,00000000,00000000,?), ref: 009E1CF6
                                                                                      • CreateFileW.KERNEL32(?,?,00000001,00000000,00000002,00000000,00000000,?,?,00000800), ref: 009E1D26
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateFile
                                                                                      • String ID:
                                                                                      • API String ID: 823142352-0
                                                                                      • Opcode ID: 9949ec72d28dede8695f41fe152638c3b39ac1ac67c38343476c08a619caafaa
                                                                                      • Instruction ID: 712a4f845bb45fbcedfd44602727f8ffccc945c46d9b6ad54113970aa3a357d6
                                                                                      • Opcode Fuzzy Hash: 9949ec72d28dede8695f41fe152638c3b39ac1ac67c38343476c08a619caafaa
                                                                                      • Instruction Fuzzy Hash: 6621B0B15443886EE3318A66CC89FF777ECEB49361F504A19FAE6C21D1C778AC848671
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • FreeLibrary.KERNEL32(00000000,?,00A49614,?,?,?,009FA15B,00000004,InitializeCriticalSectionEx,00A0C0B4,InitializeCriticalSectionEx,00000000,?,009F9DA2,00A49614,00000FA0), ref: 009F9FEA
                                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 009F9FF4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressFreeLibraryProc
                                                                                      • String ID:
                                                                                      • API String ID: 3013587201-0
                                                                                      • Opcode ID: 4d101c8d0c7ba4bc884aeb543551e58ded6a76d39caf5295bfcbe7f87dd6e4d4
                                                                                      • Instruction ID: affc98a6822fcade89fc1bf3438fa7f9e51f788dad599e9070f4ddd5b0631380
                                                                                      • Opcode Fuzzy Hash: 4d101c8d0c7ba4bc884aeb543551e58ded6a76d39caf5295bfcbe7f87dd6e4d4
                                                                                      • Instruction Fuzzy Hash: D5116035A0551D9FCF12CFA4EC80AAA73A9FF463647250165EB06D7250E731DD02DB91
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000001), ref: 009E24C7
                                                                                      • GetLastError.KERNEL32 ref: 009E24D4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorFileLastPointer
                                                                                      • String ID:
                                                                                      • API String ID: 2976181284-0
                                                                                      • Opcode ID: 62eca6fe1d15130762b07c8b9229313b4adf1da46e05599a7593e19fd66e4979
                                                                                      • Instruction ID: 41c999e29be770df28f29ee477b06139c285852772dc614d08f22e1c9c9d8041
                                                                                      • Opcode Fuzzy Hash: 62eca6fe1d15130762b07c8b9229313b4adf1da46e05599a7593e19fd66e4979
                                                                                      • Instruction Fuzzy Hash: 5011CE30600250ABE7369B6ACC44B6AB3ECAB45370F604A28E152D25E0F774ED46C760
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                        • Part of subcall function 009E3919: _wcslen.LIBCMT ref: 009E3921
                                                                                        • Part of subcall function 009E7D9F: _wcslen.LIBCMT ref: 009E7DA7
                                                                                        • Part of subcall function 009E7D9F: _wcslen.LIBCMT ref: 009E7DB8
                                                                                        • Part of subcall function 009E7D9F: _wcslen.LIBCMT ref: 009E7DC8
                                                                                        • Part of subcall function 009E7D9F: _wcslen.LIBCMT ref: 009E7DD6
                                                                                        • Part of subcall function 009E7D9F: CompareStringW.KERNEL32(00000400,00001001,?,?,?,?,00000000,00000000,?,009E2F91,?,?,00000000,?,?,?), ref: 009E7DF1
                                                                                        • Part of subcall function 009F1719: SetCurrentDirectoryW.KERNELBASE(?,009F1A78,00A36D80,00000000,00A37D82,00000006), ref: 009F171D
                                                                                      • _wcslen.LIBCMT ref: 009F1A91
                                                                                      • SHFileOperationW.SHELL32(?,?,?,?,?,00A37D82,00000006), ref: 009F1ACA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcslen$CompareCurrentDirectoryFileOperationString
                                                                                      • String ID:
                                                                                      • API String ID: 1016385243-0
                                                                                      • Opcode ID: 726b27d1c459608a1c3fba11e2ea58afb5d14523b4cf68750a334da7b3aaaa05
                                                                                      • Instruction ID: e9f64828b61f2670a7794c9457e1ed260608068722725ae8d0b6ee2a806d4789
                                                                                      • Opcode Fuzzy Hash: 726b27d1c459608a1c3fba11e2ea58afb5d14523b4cf68750a334da7b3aaaa05
                                                                                      • Instruction Fuzzy Hash: 95017C75D0025CA5DB21ABE4DD0AFEE76BCAF48344F000465F605E3192E6B4EA848BE5
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                        • Part of subcall function 00A02340: GetEnvironmentStringsW.KERNEL32 ref: 00A02349
                                                                                        • Part of subcall function 00A02340: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00A0236C
                                                                                        • Part of subcall function 00A02340: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00A02392
                                                                                        • Part of subcall function 00A02340: _free.LIBCMT ref: 00A023A5
                                                                                        • Part of subcall function 00A02340: FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00A023B4
                                                                                      • _free.LIBCMT ref: 009FE882
                                                                                      • _free.LIBCMT ref: 009FE889
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: _free$ByteCharEnvironmentMultiStringsWide$Free
                                                                                      • String ID:
                                                                                      • API String ID: 400815659-0
                                                                                      • Opcode ID: d0f1329351df7131d1b91946f84da7d30ab9f0757590b9d3620bc4fffa31fcf3
                                                                                      • Instruction ID: 03e26c800435946b15250a90f83a58d1701da3a5474f972b2be445e142cde8c2
                                                                                      • Opcode Fuzzy Hash: d0f1329351df7131d1b91946f84da7d30ab9f0757590b9d3620bc4fffa31fcf3
                                                                                      • Instruction Fuzzy Hash: 9DE02217A4561841E625363A3C02BFF06498FD23B5F2003BAFF24CB2E2DE2C88020396
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • LoadStringW.USER32(009E1680,?,?,009E1680), ref: 009E4C08
                                                                                      • LoadStringW.USER32(009E1680,?,?), ref: 009E4C1F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: LoadString
                                                                                      • String ID:
                                                                                      • API String ID: 2948472770-0
                                                                                      • Opcode ID: 8f6a88a43dcc0069452e4c667019852aeae460c1c0ef3b0a536cff968a1e2fb2
                                                                                      • Instruction ID: 9fe5d6625b86b3313ec21414a77db3435d1ffce544d52084b8cd06c9e1d55ffe
                                                                                      • Opcode Fuzzy Hash: 8f6a88a43dcc0069452e4c667019852aeae460c1c0ef3b0a536cff968a1e2fb2
                                                                                      • Instruction Fuzzy Hash: 5EF01C35201659BBDF125FA6EC08DEB7F6DEF59391B008425FE4486130E6328C61EBE1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • SetFileAttributesW.KERNELBASE(?,00000000,?,?,009E2883,?,?), ref: 009E2A5F
                                                                                        • Part of subcall function 009E35E5: _wcslen.LIBCMT ref: 009E3609
                                                                                      • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,?,009E2883,?,?), ref: 009E2A90
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AttributesFile$_wcslen
                                                                                      • String ID:
                                                                                      • API String ID: 2673547680-0
                                                                                      • Opcode ID: 709f64302ec0de6dcc19c9ce0fd72c120abe2dcdf0802a69fa3800d3eebf2af6
                                                                                      • Instruction ID: 5704b0bddf36177fcb409e85d33c507c1e8142f79052b064af5ffc9f70c0d9ff
                                                                                      • Opcode Fuzzy Hash: 709f64302ec0de6dcc19c9ce0fd72c120abe2dcdf0802a69fa3800d3eebf2af6
                                                                                      • Instruction Fuzzy Hash: F5F06D3110025EABEF12DFA2DC05BDA3B6DBF043C5F44C421B989E61A1DB71DE969B60
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • DeleteFileW.KERNELBASE(000000FF,?,?,009E1D8F,?,?,009E1BE3,?,?,?,?,?,00A08AA3,000000FF), ref: 009E2740
                                                                                        • Part of subcall function 009E35E5: _wcslen.LIBCMT ref: 009E3609
                                                                                      • DeleteFileW.KERNEL32(?,000000FF,?,00000800,?,?,009E1D8F,?,?,009E1BE3,?,?,?,?,?,00A08AA3), ref: 009E276E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: DeleteFile$_wcslen
                                                                                      • String ID:
                                                                                      • API String ID: 2643169976-0
                                                                                      • Opcode ID: cae023e7d34e728ae937c6ebeb115fe9b7a871a79f25245e4402c508edbdd78c
                                                                                      • Instruction ID: 7a76a618fa075fe085425d3676e863307f917d4404b7cf8fe26a64564df89663
                                                                                      • Opcode Fuzzy Hash: cae023e7d34e728ae937c6ebeb115fe9b7a871a79f25245e4402c508edbdd78c
                                                                                      • Instruction Fuzzy Hash: CBE0D87124024DABDB129F61CC05BDA37ECBF043C2F444021BA48D2061DB71DD85DA50
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GdiplusShutdown.GDIPLUS(?,?,?,?,00A08AA3,000000FF), ref: 009F18B5
                                                                                      • OleUninitialize.OLE32(?,?,?,?,00A08AA3,000000FF), ref: 009F18BA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: GdiplusShutdownUninitialize
                                                                                      • String ID:
                                                                                      • API String ID: 3856339756-0
                                                                                      • Opcode ID: 1c75eca6e5a5264027e48245da1f192c702569bebb4dfde9be313dbf3cbe671c
                                                                                      • Instruction ID: 62686fd20d39d281261eb0cd4ea3632554d5a3dc2e936f3967f466dece956c36
                                                                                      • Opcode Fuzzy Hash: 1c75eca6e5a5264027e48245da1f192c702569bebb4dfde9be313dbf3cbe671c
                                                                                      • Instruction Fuzzy Hash: AAE06576644654EFCB10DB4CED05B4AFBB8FB89B20F004265F515D37A0CB746802CA90
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • _swprintf.LIBCMT ref: 009F4938
                                                                                        • Part of subcall function 009E2AA2: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 009E2AB5
                                                                                      • SetDlgItemTextW.USER32(00000065,?), ref: 009F494F
                                                                                        • Part of subcall function 009F20D8: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 009F20E9
                                                                                        • Part of subcall function 009F20D8: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 009F20FA
                                                                                        • Part of subcall function 009F20D8: IsDialogMessageW.USER32(?,?), ref: 009F210E
                                                                                        • Part of subcall function 009F20D8: TranslateMessage.USER32(?), ref: 009F211C
                                                                                        • Part of subcall function 009F20D8: DispatchMessageW.USER32(?), ref: 009F2126
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: Message$DialogDispatchItemPeekTextTranslate__vswprintf_c_l_swprintf
                                                                                      • String ID:
                                                                                      • API String ID: 2718869927-0
                                                                                      • Opcode ID: b695308eb5d6fea55dde4afb6816141b6e026b366067fe7acdcbe8337abf7d40
                                                                                      • Instruction ID: dc3d60e0776b1a674b84d9fe60f8f396369e7a0d7844ee143fecf905fb473423
                                                                                      • Opcode Fuzzy Hash: b695308eb5d6fea55dde4afb6816141b6e026b366067fe7acdcbe8337abf7d40
                                                                                      • Instruction Fuzzy Hash: DAE09B764042482ADB12ABA5CC06FBA3BAC5B45385F440471B200E60A2E574D9528761
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetFileAttributesW.KERNELBASE(?), ref: 009E27A3
                                                                                        • Part of subcall function 009E35E5: _wcslen.LIBCMT ref: 009E3609
                                                                                      • GetFileAttributesW.KERNELBASE(?,?,?,00000800), ref: 009E27CF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AttributesFile$_wcslen
                                                                                      • String ID:
                                                                                      • API String ID: 2673547680-0
                                                                                      • Opcode ID: 765c5788f0451aadae0e5c1cbf429994c366f77798df446520a3f22a6c1d7bb2
                                                                                      • Instruction ID: d79fb52b44f021fc95ced977b1c34b542c5cd864a32088bd5e0e653021f1b472
                                                                                      • Opcode Fuzzy Hash: 765c5788f0451aadae0e5c1cbf429994c366f77798df446520a3f22a6c1d7bb2
                                                                                      • Instruction Fuzzy Hash: 27E092715002685BCB11AB69CC04BE97B6CAB093E1F000160FF59E3295D671DD81CA90
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 009E6BB7
                                                                                      • LoadLibraryW.KERNELBASE(?,?,009E590F,Crypt32.dll,00000000,009E5989,?,?,009E596C,00000000,00000000,?,00000000), ref: 009E6BD9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: DirectoryLibraryLoadSystem
                                                                                      • String ID:
                                                                                      • API String ID: 1175261203-0
                                                                                      • Opcode ID: 9a38a2aec38b88c092cb4c2ee26806a1665bf4736a27b266fe9772825d326045
                                                                                      • Instruction ID: 9a70afb0b0e3b0fc70b0b8b715983902545ecb129626e75757368c5b64e2d5fd
                                                                                      • Opcode Fuzzy Hash: 9a38a2aec38b88c092cb4c2ee26806a1665bf4736a27b266fe9772825d326045
                                                                                      • Instruction Fuzzy Hash: D4E0127290016CA6EB119BA5DC08FDB766CAB483D1F4440617549D2009D674DA848BB0
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 009F0EE9
                                                                                      • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 009F0EF0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: BitmapCreateFromGdipStream
                                                                                      • String ID:
                                                                                      • API String ID: 1918208029-0
                                                                                      • Opcode ID: 4f14c8c77561e4348754fd7be5b1b6cc5a0b5b7be8242c1e151705975427eddb
                                                                                      • Instruction ID: 058e8420ffb5f9b107ac4769403f5ef83f99da6d65398ef0ddc32ec8c8ad5aaf
                                                                                      • Opcode Fuzzy Hash: 4f14c8c77561e4348754fd7be5b1b6cc5a0b5b7be8242c1e151705975427eddb
                                                                                      • Instruction Fuzzy Hash: 78E06D7141020CEBCB10DF44C9007ADB7ECEB44355F20841AEA9593641D3B0AE409B51
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 009F8F9A
                                                                                      • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 009F8FA5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: Value___vcrt____vcrt_uninitialize_ptd
                                                                                      • String ID:
                                                                                      • API String ID: 1660781231-0
                                                                                      • Opcode ID: da31cd1f11c7d2345ac3f0e3e739c6ffd4a85b597b8c01a89bee62f249693027
                                                                                      • Instruction ID: fe4ec8eec3fd8eeeeef7904c498e43f3ef0e80dfed54e0e6d367109c5315e10f
                                                                                      • Opcode Fuzzy Hash: da31cd1f11c7d2345ac3f0e3e739c6ffd4a85b597b8c01a89bee62f249693027
                                                                                      • Instruction Fuzzy Hash: A3D0A9A490870D2C5EC07AB43C021BB234A6CA27743B00A56E330890C1EF258000A392
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: ItemShowWindow
                                                                                      • String ID:
                                                                                      • API String ID: 3351165006-0
                                                                                      • Opcode ID: 327d193c06a617fd11eebc05d49ab7e7fcd50e43c194e9eddd24ec124593a77c
                                                                                      • Instruction ID: 31070e89606c0ec098819b4081decd0465787de5a2577ae9e5b04ce517df559f
                                                                                      • Opcode Fuzzy Hash: 327d193c06a617fd11eebc05d49ab7e7fcd50e43c194e9eddd24ec124593a77c
                                                                                      • Instruction Fuzzy Hash: 4DC0123A098140BECB014BB4DC09D2E7BA89BE6211F10CA04B0A5C0060C239C010DB12
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetDlgItem.USER32(?,?), ref: 009E1191
                                                                                      • KiUserCallbackDispatcher.NTDLL(00000000), ref: 009E1198
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: CallbackDispatcherItemUser
                                                                                      • String ID:
                                                                                      • API String ID: 4250310104-0
                                                                                      • Opcode ID: 6501cf1e9d9af5cceb5151f2612e8ae108311a12b606b5747dd8f8fcfe424a72
                                                                                      • Instruction ID: b4f8a681418f77b38b05bb410eb6c1a7879c54bb33a3a1ce81eda845294fbcbf
                                                                                      • Opcode Fuzzy Hash: 6501cf1e9d9af5cceb5151f2612e8ae108311a12b606b5747dd8f8fcfe424a72
                                                                                      • Instruction Fuzzy Hash: 33C04C7E448240BFCB019BE89C08D2FBFA9ABE6311F10CA09B1A5C0020C6368411DB12
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: __allrem
                                                                                      • String ID:
                                                                                      • API String ID: 2933888876-0
                                                                                      • Opcode ID: 6470bf1f669577e6a5f5066a8502c48e20d6388bc185f07f16c6840375cec032
                                                                                      • Instruction ID: 9912bf5556b51a9a64ec3a36c2bcecc3fdf35f73b32fc396ae9a887999b3e2d0
                                                                                      • Opcode Fuzzy Hash: 6470bf1f669577e6a5f5066a8502c48e20d6388bc185f07f16c6840375cec032
                                                                                      • Instruction Fuzzy Hash: 2731A2366112219FDB25DFADEC54A3A37A6FB88714B15403AE901D73A1F734AC838F91
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00A01108
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc
                                                                                      • String ID:
                                                                                      • API String ID: 190572456-0
                                                                                      • Opcode ID: 896b9d31f0b701992c20179957201dccf2b2651787a159cfca961380356a5b30
                                                                                      • Instruction ID: 33a70f881dde5d86d35e170e29a653d97853f47b15b7b47f5f8e8708fb5228d5
                                                                                      • Opcode Fuzzy Hash: 896b9d31f0b701992c20179957201dccf2b2651787a159cfca961380356a5b30
                                                                                      • Instruction Fuzzy Hash: A411E737A002399BDF25DF5DFC409DA73959B853607164228FE25AB294DB31DC4287D0
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                        • Part of subcall function 00A01546: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,009FF793,00000001,00000364,?,009FABD7,?,?,?,009FA652,00000050), ref: 00A01587
                                                                                      • _free.LIBCMT ref: 00A028F5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocateHeap_free
                                                                                      • String ID:
                                                                                      • API String ID: 614378929-0
                                                                                      • Opcode ID: 7d30b6ea8507d2c13b34e354a80f4644266152c8881b27fa68bdf41323802f68
                                                                                      • Instruction ID: 5068dd4b50f1709a4b79dd15ce52d5bc03e8513b0d7afd7b1e7e20213e4df32e
                                                                                      • Opcode Fuzzy Hash: 7d30b6ea8507d2c13b34e354a80f4644266152c8881b27fa68bdf41323802f68
                                                                                      • Instruction Fuzzy Hash: 7101F9776003496BF3258F65E885A5AFBE9FBC5370F25052EE695872C0EA30A809C774
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 009F4517
                                                                                        • Part of subcall function 009E6A26: _wcslen.LIBCMT ref: 009E6A3C
                                                                                        • Part of subcall function 009EF482: __EH_prolog.LIBCMT ref: 009EF487
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: H_prolog$_wcslen
                                                                                      • String ID:
                                                                                      • API String ID: 2838827086-0
                                                                                      • Opcode ID: e131ff201206418ed9205e4b7d5a3960e81000e9a4b5fa24aac57c868ffa065d
                                                                                      • Instruction ID: d7237c568a47f1435124c970c9b131cd45c60bb57b652dea9dbf893f437555fe
                                                                                      • Opcode Fuzzy Hash: e131ff201206418ed9205e4b7d5a3960e81000e9a4b5fa24aac57c868ffa065d
                                                                                      • Instruction Fuzzy Hash: 0E01B13EA4A384BED705DBA9FC03BA93BB0FBE6310F50402AF454562D2D6B61546C722
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 009E126C
                                                                                        • Part of subcall function 009E5753: __EH_prolog.LIBCMT ref: 009E5758
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: H_prolog
                                                                                      • String ID:
                                                                                      • API String ID: 3519838083-0
                                                                                      • Opcode ID: 9dd333a963092d2a3d3af6a48d154ec05b1738deba720b7e279db3826c6dbfa0
                                                                                      • Instruction ID: 68bf4d9c6abd8a0591669b44d9558cb57d5cc04939d1b2e733564d7af641f1e5
                                                                                      • Opcode Fuzzy Hash: 9dd333a963092d2a3d3af6a48d154ec05b1738deba720b7e279db3826c6dbfa0
                                                                                      • Instruction Fuzzy Hash: 0C016970904B84CEC316EBAAC0657DEFBE4AFA5340F10454EE4AA53382CFB02B04C721
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,009FF793,00000001,00000364,?,009FABD7,?,?,?,009FA652,00000050), ref: 00A01587
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocateHeap
                                                                                      • String ID:
                                                                                      • API String ID: 1279760036-0
                                                                                      • Opcode ID: 08ea9ba79a4da5cf88ce05f157dc51f1e8a6e83a6bb9604bee1565510237cd7a
                                                                                      • Instruction ID: 4345a5e3b443ae40bbf36b38fe9bd439d7ed9caa3dd56f175a63006a92709798
                                                                                      • Opcode Fuzzy Hash: 08ea9ba79a4da5cf88ce05f157dc51f1e8a6e83a6bb9604bee1565510237cd7a
                                                                                      • Instruction Fuzzy Hash: 6AF0B43164432CA7DF215B72BC46BEB3798AFC1760B144021F80A9F0D0DA60FD0182E1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • RtlAllocateHeap.NTDLL(00000000,?,?,?,009FA7E9,?,0000015D,?,?,?,?,009FBCC5,000000FF,00000000,?,?), ref: 009FFA17
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocateHeap
                                                                                      • String ID:
                                                                                      • API String ID: 1279760036-0
                                                                                      • Opcode ID: 0d9247b47b54a98f868646b1242e7055c8b76dca15d071321a9369e2bedd3fff
                                                                                      • Instruction ID: e4235a6786bc72af588692977d1cc1df64ac484fe69500a1871b40ed1f5c9b46
                                                                                      • Opcode Fuzzy Hash: 0d9247b47b54a98f868646b1242e7055c8b76dca15d071321a9369e2bedd3fff
                                                                                      • Instruction Fuzzy Hash: DEE02B3221471D66DB202771AD61BBB764CDF827A4F150171EF4DA20D0EF90CC0183A0
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • FindCloseChangeNotification.KERNELBASE(000000FF,?,?,009E1BEA,?,?,?,?,?,00A08AA3,000000FF), ref: 009E1C4B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: ChangeCloseFindNotification
                                                                                      • String ID:
                                                                                      • API String ID: 2591292051-0
                                                                                      • Opcode ID: c5e6fbfed480a2bca9ab309976d755e2e012ffce1717fed69c6986998f90bc34
                                                                                      • Instruction ID: df5f4d33f82044b13e448a6857cc1efcb6969ccf653173b8b4931ef367050ff1
                                                                                      • Opcode Fuzzy Hash: c5e6fbfed480a2bca9ab309976d755e2e012ffce1717fed69c6986998f90bc34
                                                                                      • Instruction Fuzzy Hash: B8F03A304C1B958FDB328A26C448792B7ECAB12321F245B1ED0E2829A0D3B2A98D8651
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                        • Part of subcall function 009E2C15: FindFirstFileW.KERNELBASE(?,?), ref: 009E2C3E
                                                                                        • Part of subcall function 009E2C15: FindFirstFileW.KERNELBASE(?,?,?,?,00000800), ref: 009E2C6C
                                                                                        • Part of subcall function 009E2C15: GetLastError.KERNEL32(?,?,00000800), ref: 009E2C78
                                                                                      • FindClose.KERNELBASE(00000000), ref: 009E2B12
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: Find$FileFirst$CloseErrorLast
                                                                                      • String ID:
                                                                                      • API String ID: 1464966427-0
                                                                                      • Opcode ID: bfb2d2577b64a8ed6d3a72bedfb8427ca5c7308b76be2716dc34cbf9cc720f21
                                                                                      • Instruction ID: 3180a16b0696127049817b7e20b4c83e9b63389ed70b5dfa7d507fc8e080e21e
                                                                                      • Opcode Fuzzy Hash: bfb2d2577b64a8ed6d3a72bedfb8427ca5c7308b76be2716dc34cbf9cc720f21
                                                                                      • Instruction Fuzzy Hash: EBF082710097D0AACE635BB58845BCBBBA86F6A331F048A4DF1FD121A2C27558999732
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 009EF9AA
                                                                                        • Part of subcall function 009E1EE0: CreateFileW.KERNELBASE(?,?,?,00000000,00000003,08000000,00000000), ref: 009E1F5F
                                                                                        • Part of subcall function 009E1EE0: GetLastError.KERNEL32 ref: 009E1F6C
                                                                                        • Part of subcall function 009E1EE0: CreateFileW.KERNEL32(00000000,?,?,00000000,00000003,08000000,00000000,?,?,00000800), ref: 009E1FA2
                                                                                        • Part of subcall function 009E1EE0: GetLastError.KERNEL32 ref: 009E1FAA
                                                                                        • Part of subcall function 009E1EE0: SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000), ref: 009E1FF9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$CreateErrorLast$H_prologTime
                                                                                      • String ID:
                                                                                      • API String ID: 3517926197-0
                                                                                      • Opcode ID: 3db4b69bc8b2d22c5b12fb838e2d1cec096d3cdf749c98b30158a333b2d67bcd
                                                                                      • Instruction ID: ea947b0c92c28d51a161c2ec73df5311040c31479a762a54c1930ff4d68c833c
                                                                                      • Opcode Fuzzy Hash: 3db4b69bc8b2d22c5b12fb838e2d1cec096d3cdf749c98b30158a333b2d67bcd
                                                                                      • Instruction Fuzzy Hash: 4CF0307590158CEBDF52EF50C992BDCB735EF50344F4080A9B755A6191DB789E84CB20
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GdipAlloc.GDIPLUS(00000010), ref: 009F113C
                                                                                        • Part of subcall function 009F0EC8: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 009F0EE9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: Gdip$AllocBitmapCreateFromStream
                                                                                      • String ID:
                                                                                      • API String ID: 1915507550-0
                                                                                      • Opcode ID: 5ab87911419d104bf8d52cca4c52cd39a732c6fb385016300ad2ab0103f248f7
                                                                                      • Instruction ID: 3080bc59f1f9962ad89df6bbd2117c099bbc988982cfdcc3c45b1e6eae1023c4
                                                                                      • Opcode Fuzzy Hash: 5ab87911419d104bf8d52cca4c52cd39a732c6fb385016300ad2ab0103f248f7
                                                                                      • Instruction Fuzzy Hash: 3CD0A93070820CBADF412B208C02B7EBAACAB80340F008421FB01D5281EBB1D910A3A2
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,00000000,009E790C), ref: 009F47EE
                                                                                        • Part of subcall function 009F20D8: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 009F20E9
                                                                                        • Part of subcall function 009F20D8: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 009F20FA
                                                                                        • Part of subcall function 009F20D8: IsDialogMessageW.USER32(?,?), ref: 009F210E
                                                                                        • Part of subcall function 009F20D8: TranslateMessage.USER32(?), ref: 009F211C
                                                                                        • Part of subcall function 009F20D8: DispatchMessageW.USER32(?), ref: 009F2126
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: Message$DialogDispatchItemPeekSendTranslate
                                                                                      • String ID:
                                                                                      • API String ID: 897784432-0
                                                                                      • Opcode ID: 032ed6e486b9185f67aa1ff47aace49a3e6a3db7689bed5d127db16f1e8326e7
                                                                                      • Instruction ID: 7cfb14851e85db0b011b26ed1f28ab7ece34293c05db31752c7ca96c131430c0
                                                                                      • Opcode Fuzzy Hash: 032ed6e486b9185f67aa1ff47aace49a3e6a3db7689bed5d127db16f1e8326e7
                                                                                      • Instruction Fuzzy Hash: 48D0C736145300BEDA126B51CD06F1A7AF2BBE9B05F404564B344740F1CAA2DD76DB02
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 420f5234d26f58bffac5e901e1c2ef8da7ec3b1d3455be49b77a8e81df2f0c0d
                                                                                      • Instruction ID: 09d2a27f6b12f9ee64929f469b3c3a3adb9b09ec4c99e0b4c56e2aa105325c1b
                                                                                      • Opcode Fuzzy Hash: 420f5234d26f58bffac5e901e1c2ef8da7ec3b1d3455be49b77a8e81df2f0c0d
                                                                                      • Instruction Fuzzy Hash: 4EB012852AA008BC314852481D06EB7016CD4C4F127304B1BF240C1080D8404C512332
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 57c2fa7b852cef66268ac2ba3c253e27c5f3570188b844248b1b2298708cd75e
                                                                                      • Instruction ID: 7f9384a6d1d0157db176baf2c254e7942e513dd72dacc857a1b94ed3a943813b
                                                                                      • Opcode Fuzzy Hash: 57c2fa7b852cef66268ac2ba3c253e27c5f3570188b844248b1b2298708cd75e
                                                                                      • Instruction Fuzzy Hash: E9B0128529B008BC314852881E06EB7012CC0C4F137304B1BF240C1080D8444C522332
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: bd3e2e985c799824f0d618c971a9a6e1288cc05b8496b8ab0aacbba93f8f5abc
                                                                                      • Instruction ID: e72e7756ed4bc9ea34f546ffa7b71bb761c30cb81a58130762886d8b63298208
                                                                                      • Opcode Fuzzy Hash: bd3e2e985c799824f0d618c971a9a6e1288cc05b8496b8ab0aacbba93f8f5abc
                                                                                      • Instruction Fuzzy Hash: 12B0129529A108BC318853481D06EB7012CC1C4F127304B1BF240C1080D8404C912332
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 978915bf63a30affc90f3a283deebcd820bac83e893bebc239c4c4edd33e707b
                                                                                      • Instruction ID: 070b518eff4dd6f0ddabf081fca5cae156baad1b470256462e872ac9d92eee66
                                                                                      • Opcode Fuzzy Hash: 978915bf63a30affc90f3a283deebcd820bac83e893bebc239c4c4edd33e707b
                                                                                      • Instruction Fuzzy Hash: 20B01296299008BC314852481E06EB701ACC0C4F127304B1BF241C1080D8448C522332
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: c96a6522267b517b3c64d646d6e22020aae418320cd43f058a886ab6c7f06246
                                                                                      • Instruction ID: c9a6381d4331d5003525641b529c04d21a271a3c389dc165bec39597dbbbb7dc
                                                                                      • Opcode Fuzzy Hash: c96a6522267b517b3c64d646d6e22020aae418320cd43f058a886ab6c7f06246
                                                                                      • Instruction Fuzzy Hash: 03B01286299108BC318852481D06EB7016CC1C4F123304B1BF241C1080D8408C912332
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 04a43a5bf4f130a76afc03eb276ff6f3ac72ec7c62ce8eb63e7ce4f2a12a91bf
                                                                                      • Instruction ID: ee8d4249e982995bd31e2ca27bcfef09c85fcf8293edcef2cf26b088ca7f79ca
                                                                                      • Opcode Fuzzy Hash: 04a43a5bf4f130a76afc03eb276ff6f3ac72ec7c62ce8eb63e7ce4f2a12a91bf
                                                                                      • Instruction Fuzzy Hash: E0B0128A299008BC314852581D06EB7016CC1C4F123308B1BF741C1080D9408C512332
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 61d90a32b3a5de8cb2ca75bee25262749986052d24b89cb3fb1d13df70e922a6
                                                                                      • Instruction ID: b2d9d65271db327d8482412be383228a362b483b547709645f787194bef5a0ca
                                                                                      • Opcode Fuzzy Hash: 61d90a32b3a5de8cb2ca75bee25262749986052d24b89cb3fb1d13df70e922a6
                                                                                      • Instruction Fuzzy Hash: 8BB012D5299008BC314852485E07EB7012CC0C8F123304B1BF240C1080D8444C522332
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 06e95f6e5f36fc0fa29849607d0e44a61c80ea7ecca62a581e4243cb128ce517
                                                                                      • Instruction ID: 335b2c7c2462ed1b1920ef56f19c2cf3b79c4b4c170454f4a573c56d13b68ed8
                                                                                      • Opcode Fuzzy Hash: 06e95f6e5f36fc0fa29849607d0e44a61c80ea7ecca62a581e4243cb128ce517
                                                                                      • Instruction Fuzzy Hash: DDB01295299108BC318852481D07EB7012CC1C8F123308B1BF240C1080D8404C912372
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 5a50ddeab230f116799b5634ba87effc9b9431ec827d75b3c9ce001a906e3a2f
                                                                                      • Instruction ID: a68a6698b21488551f1da7ddeb28a4c6cc8c0885f4cc02ff95c38bd58c33321d
                                                                                      • Opcode Fuzzy Hash: 5a50ddeab230f116799b5634ba87effc9b9431ec827d75b3c9ce001a906e3a2f
                                                                                      • Instruction Fuzzy Hash: 07B01295299008BC314853481D07EB7012CC0C8F123308B1BF640C1080D8404C512332
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: a1d07ff041c7eff5950e5b1b933e7418ffa6649b2769620b350259d7746030db
                                                                                      • Instruction ID: 445aeb4f18e0c54a66164c6648c821a7cf4a98e42cda3a1727d89cb24a767e5d
                                                                                      • Opcode Fuzzy Hash: a1d07ff041c7eff5950e5b1b933e7418ffa6649b2769620b350259d7746030db
                                                                                      • Instruction Fuzzy Hash: 9CB01295299008BC314852481D07EB7012CD0C8F123304F1BF240C10C0D8404C512332
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: ea3c85cfd22aafcf29f2f2c0266568aaa941f813a72c642244be57f3a98ecb04
                                                                                      • Instruction ID: e176c2782f34752160cc79653c84f8dde248b6ffa0ea77ee91ae20d63a595e72
                                                                                      • Opcode Fuzzy Hash: ea3c85cfd22aafcf29f2f2c0266568aaa941f813a72c642244be57f3a98ecb04
                                                                                      • Instruction Fuzzy Hash: 4EB01285299508BC354812441E06DB7012CC1C0F133308F1BF241C0080D8408C953332
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 7b7155e072a1f22bd43168d96f2e9a0b8f355b6633d3c4a2fab6ea979f6812a4
                                                                                      • Instruction ID: ee7e8bc8de55425c3ba4156cdd33fbc5874108b3e766b06cd40ff9c1fe96b53a
                                                                                      • Opcode Fuzzy Hash: 7b7155e072a1f22bd43168d96f2e9a0b8f355b6633d3c4a2fab6ea979f6812a4
                                                                                      • Instruction Fuzzy Hash: 64B01295299108BC3188524C1D06EB7012CC1C4F123304B1BF240C1080D8404C912332
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: fb45e82be08fc6a1ee7222d04728d39faa74ed916630710915a2dbe1e0dddf4b
                                                                                      • Instruction ID: 76d446f2c13e2e5709aa674d9765e45044d5c65bc916ad9f7ca56c19ed98c06c
                                                                                      • Opcode Fuzzy Hash: fb45e82be08fc6a1ee7222d04728d39faa74ed916630710915a2dbe1e0dddf4b
                                                                                      • Instruction Fuzzy Hash: 0EB01295299008BC3148524C1D06EB7012CC0C4F123308B1BF640C1080D8404C512332
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: f5a1e02205550d9c6ff311e2eeb755671336df47810b0c3eda6f21ca5beb997a
                                                                                      • Instruction ID: 1926d36274f8929c9354812e8e7aaacf3b9ff30dd8ff2d487187f80ffda69159
                                                                                      • Opcode Fuzzy Hash: f5a1e02205550d9c6ff311e2eeb755671336df47810b0c3eda6f21ca5beb997a
                                                                                      • Instruction Fuzzy Hash: 85B01295299008BC3148524D1D06EB7012CD0C4F123304B1BF240C1081D8444C512332
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 005bc455c5b44da80d86e8210f0332b1eb1464f86d72fefbd038b03ee1ee02be
                                                                                      • Instruction ID: 078107d78b0b80b6304a270d12b78f707138913d701d89a8792953a13c798ff8
                                                                                      • Opcode Fuzzy Hash: 005bc455c5b44da80d86e8210f0332b1eb1464f86d72fefbd038b03ee1ee02be
                                                                                      • Instruction Fuzzy Hash: B9B01295299008BD3148524C1E06EB7012CC0C4F123304B1BF240C1080D8444D522332
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4E62
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: cc90730ede1486bcc5f5435ab1da801f83067540934cc256f5633ecd54aecc2d
                                                                                      • Instruction ID: 185c2b444def477260d02d33978b530e66e22ea2d4c7f303b7e17e473b10cd4b
                                                                                      • Opcode Fuzzy Hash: cc90730ede1486bcc5f5435ab1da801f83067540934cc256f5633ecd54aecc2d
                                                                                      • Instruction Fuzzy Hash: E9B012953D9104BC334452442C02E77020CD4C8F133304B1BF290C0080D4404C984332
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4E62
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 8937aeb9b93f4d29f6c19f3c22238f26283d1957b54f0e61a5372817ada07d3a
                                                                                      • Instruction ID: eed5da014254b2a6581551d077a8578a3ead1b7fa91e067fa2ff17ec76300271
                                                                                      • Opcode Fuzzy Hash: 8937aeb9b93f4d29f6c19f3c22238f26283d1957b54f0e61a5372817ada07d3a
                                                                                      • Instruction Fuzzy Hash: F8B012953D8104BC334452442C02E77020CE4C8F133304F1BF290C0080D4444C984332
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4E62
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: deea64c85ec09739984a341be3a40899327f6a85c2bfb6680104a7c8296d427a
                                                                                      • Instruction ID: addf9b59d6ae1386c7d294d359920ef2282fd4499d640a527e59a5cc22872df9
                                                                                      • Opcode Fuzzy Hash: deea64c85ec09739984a341be3a40899327f6a85c2bfb6680104a7c8296d427a
                                                                                      • Instruction Fuzzy Hash: 56B012953D8004BC324456442C02F77020CF4C8F133304B1BF290C0081D4484C504332
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4F4C
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: a21c73fcac384622fa1d89987191ce0fe6e4b907c268dde73fe8f778c50da338
                                                                                      • Instruction ID: d903da1b70fa031c12cf57a5b16665c16fa8a58765d0cad10d1d6edb45b8f659
                                                                                      • Opcode Fuzzy Hash: a21c73fcac384622fa1d89987191ce0fe6e4b907c268dde73fe8f778c50da338
                                                                                      • Instruction Fuzzy Hash: 67B0128D2DC004FC310412419D02D77020CC0C4B133308B1FF600D0084D8404C900337
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4F4C
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: a7a9c10a819d22fa334ed437d65cf7235db31026534b9444028086fe50d19f9e
                                                                                      • Instruction ID: ce68635a869af6ec45f434506faa1e4a2b60781d0868b1022c70a8266aa7a2fb
                                                                                      • Opcode Fuzzy Hash: a7a9c10a819d22fa334ed437d65cf7235db31026534b9444028086fe50d19f9e
                                                                                      • Instruction Fuzzy Hash: 38B012892D8104FC314452455D02E77010CC0C4B123308B2FF608C1084D8404C900333
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4F4C
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 3f97bbfaef8eb833a2a0f4bc000746b4f64507de16e4e078dda81127ec2bb08f
                                                                                      • Instruction ID: 68989de434341eefc6bd0d4cc93dc83db8d157ef929ae54551fb87a125d621bf
                                                                                      • Opcode Fuzzy Hash: 3f97bbfaef8eb833a2a0f4bc000746b4f64507de16e4e078dda81127ec2bb08f
                                                                                      • Instruction Fuzzy Hash: E1B0128D2E8004BC314452859D02F77010CD0C4B133304B1FF204C1084D8404C900337
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4F4C
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 428a83c09543302b8e93981af09b992972fd21fbd47d6de3fb36bc8752dfe2f5
                                                                                      • Instruction ID: d7b2eff72483e71053e38544a518c759192ab3607d143f5bcfbef30767dad83d
                                                                                      • Opcode Fuzzy Hash: 428a83c09543302b8e93981af09b992972fd21fbd47d6de3fb36bc8752dfe2f5
                                                                                      • Instruction Fuzzy Hash: F0B012892D8204BC324452456F02E77010CC0C4B123308B2FF308C1084D8454C910333
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4F4C
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: fcf6b4ae3be89172d9c8f27dff0a1b3d16ccb977061f5171b6783882121da3bc
                                                                                      • Instruction ID: f3e017d35347cd27c35189f809b9d73d117a5acd5cf3e8ac05e17378417eb900
                                                                                      • Opcode Fuzzy Hash: fcf6b4ae3be89172d9c8f27dff0a1b3d16ccb977061f5171b6783882121da3bc
                                                                                      • Instruction Fuzzy Hash: FCB012892D8204BC325452455D02E77010CC0C4B123304B2FF208C1084D8404CD84333
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: f229eb31aecd9f978bf434472da10569ab428e4932211b104ee2774a16541d0e
                                                                                      • Instruction ID: 6da5c39b66a49553a447e2793b197b27f975634643dc30a2cb901a14e1e2df87
                                                                                      • Opcode Fuzzy Hash: f229eb31aecd9f978bf434472da10569ab428e4932211b104ee2774a16541d0e
                                                                                      • Instruction Fuzzy Hash: 94A011822AA00ABC300822802E0AEBB022CC0C8F223308F0AF28280080A8800CA22330
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: d00a2997e50ba02a2c46f0680879a62f0614c090860fa661ac74651759ab82d8
                                                                                      • Instruction ID: 6da5c39b66a49553a447e2793b197b27f975634643dc30a2cb901a14e1e2df87
                                                                                      • Opcode Fuzzy Hash: d00a2997e50ba02a2c46f0680879a62f0614c090860fa661ac74651759ab82d8
                                                                                      • Instruction Fuzzy Hash: 94A011822AA00ABC300822802E0AEBB022CC0C8F223308F0AF28280080A8800CA22330
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 6c17757a04b35f180d740aa4c91dccbd3c8efcad864a9fd68af2dca75c2471fa
                                                                                      • Instruction ID: 6da5c39b66a49553a447e2793b197b27f975634643dc30a2cb901a14e1e2df87
                                                                                      • Opcode Fuzzy Hash: 6c17757a04b35f180d740aa4c91dccbd3c8efcad864a9fd68af2dca75c2471fa
                                                                                      • Instruction Fuzzy Hash: 94A011822AA00ABC300822802E0AEBB022CC0C8F223308F0AF28280080A8800CA22330
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: a0b2a7c4838afe98cd39409bc42f488d639589558a8ba722dbebdf60b8b7bd43
                                                                                      • Instruction ID: 6da5c39b66a49553a447e2793b197b27f975634643dc30a2cb901a14e1e2df87
                                                                                      • Opcode Fuzzy Hash: a0b2a7c4838afe98cd39409bc42f488d639589558a8ba722dbebdf60b8b7bd43
                                                                                      • Instruction Fuzzy Hash: 94A011822AA00ABC300822802E0AEBB022CC0C8F223308F0AF28280080A8800CA22330
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 7921109abc80b8d9cfce9f1d5aa56884166443174839504383bc08965593760d
                                                                                      • Instruction ID: 6da5c39b66a49553a447e2793b197b27f975634643dc30a2cb901a14e1e2df87
                                                                                      • Opcode Fuzzy Hash: 7921109abc80b8d9cfce9f1d5aa56884166443174839504383bc08965593760d
                                                                                      • Instruction Fuzzy Hash: 94A011822AA00ABC300822802E0AEBB022CC0C8F223308F0AF28280080A8800CA22330
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: f6f0091c45f49c35e8586625179e2cc7d7191d548acf68575677604abc71afc4
                                                                                      • Instruction ID: 6da5c39b66a49553a447e2793b197b27f975634643dc30a2cb901a14e1e2df87
                                                                                      • Opcode Fuzzy Hash: f6f0091c45f49c35e8586625179e2cc7d7191d548acf68575677604abc71afc4
                                                                                      • Instruction Fuzzy Hash: 94A011822AA00ABC300822802E0AEBB022CC0C8F223308F0AF28280080A8800CA22330
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 3139105e826a8f0c7d089d14509f160738192b419272bdaf2fc0311fa35f56c4
                                                                                      • Instruction ID: 6da5c39b66a49553a447e2793b197b27f975634643dc30a2cb901a14e1e2df87
                                                                                      • Opcode Fuzzy Hash: 3139105e826a8f0c7d089d14509f160738192b419272bdaf2fc0311fa35f56c4
                                                                                      • Instruction Fuzzy Hash: 94A011822AA00ABC300822802E0AEBB022CC0C8F223308F0AF28280080A8800CA22330
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 25e0899f7f40b28749f1ad06443dbbb1fdbe8c496218e293f53804c7efab9485
                                                                                      • Instruction ID: 6da5c39b66a49553a447e2793b197b27f975634643dc30a2cb901a14e1e2df87
                                                                                      • Opcode Fuzzy Hash: 25e0899f7f40b28749f1ad06443dbbb1fdbe8c496218e293f53804c7efab9485
                                                                                      • Instruction Fuzzy Hash: 94A011822AA00ABC300822802E0AEBB022CC0C8F223308F0AF28280080A8800CA22330
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 06888f30a4dcb5efe10b879834ba60515d070395507bb374e6b445aeee34b778
                                                                                      • Instruction ID: 6da5c39b66a49553a447e2793b197b27f975634643dc30a2cb901a14e1e2df87
                                                                                      • Opcode Fuzzy Hash: 06888f30a4dcb5efe10b879834ba60515d070395507bb374e6b445aeee34b778
                                                                                      • Instruction Fuzzy Hash: 94A011822AA00ABC300822802E0AEBB022CC0C8F223308F0AF28280080A8800CA22330
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4C49
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 12f306d0f1d32f371ca85ed18dcfaf5ffbe7bab7323cc215ea85e64a15ee7073
                                                                                      • Instruction ID: 6da5c39b66a49553a447e2793b197b27f975634643dc30a2cb901a14e1e2df87
                                                                                      • Opcode Fuzzy Hash: 12f306d0f1d32f371ca85ed18dcfaf5ffbe7bab7323cc215ea85e64a15ee7073
                                                                                      • Instruction Fuzzy Hash: 94A011822AA00ABC300822802E0AEBB022CC0C8F223308F0AF28280080A8800CA22330
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4E62
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: faa2e10338e91077c34dfb86f07b75bf6a0ed54cd7e1f17af7e00c6abf802780
                                                                                      • Instruction ID: 1686b9b56286ea970286efa847ed5978d511ecaf77e9d823adba334eb66cf46f
                                                                                      • Opcode Fuzzy Hash: faa2e10338e91077c34dfb86f07b75bf6a0ed54cd7e1f17af7e00c6abf802780
                                                                                      • Instruction Fuzzy Hash: 6AA001962A950ABC324866916D06EBB061CE8C8F633718F1AF6A2C4081A9845CA59335
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4E62
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 6af9751e35746538bc0265f22eb8038b5dd321382a7fa5a8b8c2190d462d6ce2
                                                                                      • Instruction ID: 1686b9b56286ea970286efa847ed5978d511ecaf77e9d823adba334eb66cf46f
                                                                                      • Opcode Fuzzy Hash: 6af9751e35746538bc0265f22eb8038b5dd321382a7fa5a8b8c2190d462d6ce2
                                                                                      • Instruction Fuzzy Hash: 6AA001962A950ABC324866916D06EBB061CE8C8F633718F1AF6A2C4081A9845CA59335
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4E62
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 1cc16b23cbe0fc6af60c232cc3de3a6b136c33608410df25b133389a9a28bec3
                                                                                      • Instruction ID: 1686b9b56286ea970286efa847ed5978d511ecaf77e9d823adba334eb66cf46f
                                                                                      • Opcode Fuzzy Hash: 1cc16b23cbe0fc6af60c232cc3de3a6b136c33608410df25b133389a9a28bec3
                                                                                      • Instruction Fuzzy Hash: 6AA001962A950ABC324866916D06EBB061CE8C8F633718F1AF6A2C4081A9845CA59335
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4E62
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: b300899507f692a6f2b80ae9827627f3964b226847cb43b3944ade22c4b2ee01
                                                                                      • Instruction ID: a74b54b84864dcc546bbd94876303e1947235f73a7245cd01898de10d2628cc9
                                                                                      • Opcode Fuzzy Hash: b300899507f692a6f2b80ae9827627f3964b226847cb43b3944ade22c4b2ee01
                                                                                      • Instruction Fuzzy Hash: 68A001962A9609BC324866916D06EBB071CE8D8F233728B1AF7A2D4081A9845CA59335
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4E62
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 5a6df8ccde07bd9b26a3a9001fe1629212bdd6165148b680fb23127117201d58
                                                                                      • Instruction ID: 1686b9b56286ea970286efa847ed5978d511ecaf77e9d823adba334eb66cf46f
                                                                                      • Opcode Fuzzy Hash: 5a6df8ccde07bd9b26a3a9001fe1629212bdd6165148b680fb23127117201d58
                                                                                      • Instruction Fuzzy Hash: 6AA001962A950ABC324866916D06EBB061CE8C8F633718F1AF6A2C4081A9845CA59335
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4E62
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 0a54f707d9c7041d2215a8a0e1eeb38525587e4a23744b1ff0a1546e8bc3adcc
                                                                                      • Instruction ID: 1686b9b56286ea970286efa847ed5978d511ecaf77e9d823adba334eb66cf46f
                                                                                      • Opcode Fuzzy Hash: 0a54f707d9c7041d2215a8a0e1eeb38525587e4a23744b1ff0a1546e8bc3adcc
                                                                                      • Instruction Fuzzy Hash: 6AA001962A950ABC324866916D06EBB061CE8C8F633718F1AF6A2C4081A9845CA59335
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4F4C
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: a819dc5f29a8fbc83dab6aabb4a455d551a492f4ee8a2606cca46e46a8f43299
                                                                                      • Instruction ID: 9bcf06739dc4051591910adb64fe2823e5c7695f6cd3870a7e0fa154d7378e17
                                                                                      • Opcode Fuzzy Hash: a819dc5f29a8fbc83dab6aabb4a455d551a492f4ee8a2606cca46e46a8f43299
                                                                                      • Instruction Fuzzy Hash: 12A0118A2A800ABC30082282AE02EBB020CC0C8B223308F0EF20280088A8800CA00332
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4F4C
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 1ecdd7c4ca106ee5cb337f3f9931c7aeb6b2b66f7b1827a16cbbc4a6d1beab31
                                                                                      • Instruction ID: 9bcf06739dc4051591910adb64fe2823e5c7695f6cd3870a7e0fa154d7378e17
                                                                                      • Opcode Fuzzy Hash: 1ecdd7c4ca106ee5cb337f3f9931c7aeb6b2b66f7b1827a16cbbc4a6d1beab31
                                                                                      • Instruction Fuzzy Hash: 12A0118A2A800ABC30082282AE02EBB020CC0C8B223308F0EF20280088A8800CA00332
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4F4C
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 29c8b174470b511eda7f0d7fe0ed43c640c2f63cb5905e716a1b9799f83968aa
                                                                                      • Instruction ID: 9bcf06739dc4051591910adb64fe2823e5c7695f6cd3870a7e0fa154d7378e17
                                                                                      • Opcode Fuzzy Hash: 29c8b174470b511eda7f0d7fe0ed43c640c2f63cb5905e716a1b9799f83968aa
                                                                                      • Instruction Fuzzy Hash: 12A0118A2A800ABC30082282AE02EBB020CC0C8B223308F0EF20280088A8800CA00332
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4EC3
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 3c8ad5faad1172d056f0294f21835f0e3c1ab2aa87fcab5255bcc7dc7b0163a0
                                                                                      • Instruction ID: 373e337c8e5fd3fc06af1bdc0a19597712c3dd2e0763b5e29eaaea8d1e211988
                                                                                      • Opcode Fuzzy Hash: 3c8ad5faad1172d056f0294f21835f0e3c1ab2aa87fcab5255bcc7dc7b0163a0
                                                                                      • Instruction Fuzzy Hash: ECA002DA6E9545BC355863A16D17EBF461DD4C8F233718B1FF615C40C1A8805CA54335
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 009F4FA3
                                                                                        • Part of subcall function 009F5280: DloadAcquireSectionWriteAccess.DELAYIMP ref: 009F528B
                                                                                        • Part of subcall function 009F5280: DloadReleaseSectionWriteAccess.DELAYIMP ref: 009F52F3
                                                                                        • Part of subcall function 009F5280: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 009F5304
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                                      • String ID:
                                                                                      • API String ID: 697777088-0
                                                                                      • Opcode ID: 41ab95afd6b0326ce7d92408a49940fded98ecbe394578080856063d2faedf7e
                                                                                      • Instruction ID: bb195ae0273b755dfa0ece477cb8b617e2d9893db5aceaced4e2723bbd63ab4f
                                                                                      • Opcode Fuzzy Hash: 41ab95afd6b0326ce7d92408a49940fded98ecbe394578080856063d2faedf7e
                                                                                      • Instruction Fuzzy Hash: A8A002D62BA509BC314863916D07EBB061CD5C4F233718B1FF610D40C1A8805CE54735
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • SetEndOfFile.KERNELBASE(?,009EA6E7), ref: 009E250C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: File
                                                                                      • String ID:
                                                                                      • API String ID: 749574446-0
                                                                                      • Opcode ID: bc8e0ea2e03724892f86c1df00dc700304085c3b0ab6cad7f310224ed2515935
                                                                                      • Instruction ID: 33f38d2d9d466e05479b8899e0dc85b25b3acf8e43e2cfb02a452f1bed791965
                                                                                      • Opcode Fuzzy Hash: bc8e0ea2e03724892f86c1df00dc700304085c3b0ab6cad7f310224ed2515935
                                                                                      • Instruction Fuzzy Hash: E7A0113088000E8ACE002B30CA0800A3B22EB20BC030002A8A00ACA0A2CB22880BCA00
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • SetCurrentDirectoryW.KERNELBASE(?,009F1A78,00A36D80,00000000,00A37D82,00000006), ref: 009F171D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: CurrentDirectory
                                                                                      • String ID:
                                                                                      • API String ID: 1611563598-0
                                                                                      • Opcode ID: efe1b646c26823b430a9d434e6c4bc3c360851220516ba4d6fb814efc8c1ab51
                                                                                      • Instruction ID: c4f85e5b5376bac5fae5de4f3d6730fddd9e5d4a81d791a0c3ed697baf251cdd
                                                                                      • Opcode Fuzzy Hash: efe1b646c26823b430a9d434e6c4bc3c360851220516ba4d6fb814efc8c1ab51
                                                                                      • Instruction Fuzzy Hash: B3A011302002088BC3008F20AF0AA0FBAAAAFA0B00B00C02AA20A80030CB308822AA00
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                        • Part of subcall function 009E11C6: GetDlgItem.USER32(00000000,00003021), ref: 009E120A
                                                                                        • Part of subcall function 009E11C6: SetWindowTextW.USER32(00000000,00A09584), ref: 009E1220
                                                                                      • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 009F2E21
                                                                                      • EndDialog.USER32(?,00000006), ref: 009F2E34
                                                                                      • GetDlgItem.USER32(?,0000006C), ref: 009F2E50
                                                                                      • SetFocus.USER32(00000000), ref: 009F2E57
                                                                                      • SetDlgItemTextW.USER32(?,00000065,?), ref: 009F2E91
                                                                                      • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 009F2EC8
                                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 009F2EDE
                                                                                        • Part of subcall function 009F172B: FileTimeToSystemTime.KERNEL32(?,?), ref: 009F173F
                                                                                        • Part of subcall function 009F172B: SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 009F1750
                                                                                        • Part of subcall function 009F172B: SystemTimeToFileTime.KERNEL32(?,?), ref: 009F175E
                                                                                        • Part of subcall function 009F172B: FileTimeToSystemTime.KERNEL32(?,?), ref: 009F176C
                                                                                        • Part of subcall function 009F172B: GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 009F1787
                                                                                        • Part of subcall function 009F172B: GetTimeFormatW.KERNEL32(00000400,?,?,00000000,?,00000032), ref: 009F17AE
                                                                                        • Part of subcall function 009F172B: _swprintf.LIBCMT ref: 009F17D4
                                                                                      • _swprintf.LIBCMT ref: 009F2F27
                                                                                        • Part of subcall function 009E2AA2: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 009E2AB5
                                                                                      • SetDlgItemTextW.USER32(?,0000006A,?), ref: 009F2F3A
                                                                                      • FindClose.KERNEL32(00000000), ref: 009F2F41
                                                                                      • _swprintf.LIBCMT ref: 009F2F90
                                                                                      • SetDlgItemTextW.USER32(?,00000068,?), ref: 009F2FA3
                                                                                      • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 009F2FC0
                                                                                      • _swprintf.LIBCMT ref: 009F2FF3
                                                                                      • SetDlgItemTextW.USER32(?,0000006B,?), ref: 009F3006
                                                                                      • _swprintf.LIBCMT ref: 009F3050
                                                                                      • SetDlgItemTextW.USER32(?,00000069,?), ref: 009F3063
                                                                                        • Part of subcall function 009F1B15: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 009F1B3B
                                                                                        • Part of subcall function 009F1B15: GetNumberFormatW.KERNEL32(00000400,00000000,?,00A1460C,?,?), ref: 009F1B8A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: Item$Time$Text$_swprintf$FileSystem$FormatMessageSend$Find$CloseDateDialogFirstFocusInfoLocalLocaleNumberSpecificWindow__vswprintf_c_l
                                                                                      • String ID: %s %s$REPLACEFILEDLG
                                                                                      • API String ID: 3464475507-439456425
                                                                                      • Opcode ID: c03bdc36fbba39d33170cd0c113ac35e3a35f2408a39a51889192e853fb0f04e
                                                                                      • Instruction ID: 25cdbe2edb362f0a428dc234ba46e15db27c033d559b88f1b7a20dae98eceeeb
                                                                                      • Opcode Fuzzy Hash: c03bdc36fbba39d33170cd0c113ac35e3a35f2408a39a51889192e853fb0f04e
                                                                                      • Instruction Fuzzy Hash: AE71A176648348BBE331EBA4CC49FFB77ACEBDA700F044819B749D2091D67699058763
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: __floor_pentium4
                                                                                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                      • API String ID: 4168288129-2761157908
                                                                                      • Opcode ID: 8f0586c06e493a252b08dbff650fb257b5be1ad8837b882e865ba053f2926a60
                                                                                      • Instruction ID: b0c7ebaac65eb5a990c5572cf4a3b496ff05a34056eff364d0ac61a89365349a
                                                                                      • Opcode Fuzzy Hash: 8f0586c06e493a252b08dbff650fb257b5be1ad8837b882e865ba053f2926a60
                                                                                      • Instruction Fuzzy Hash: A2C228B1E0462D8BDB25CF28AD407EAB7B5FB48305F1545EAD90DE7280E775AE818F40
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 009F5FFE
                                                                                      • IsDebuggerPresent.KERNEL32 ref: 009F60CA
                                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 009F60EA
                                                                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 009F60F4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                      • String ID:
                                                                                      • API String ID: 254469556-0
                                                                                      • Opcode ID: 436d702f299c7db60cac6f902e88c9ad4443100075a08a9cc9c8b06f8a4bd42e
                                                                                      • Instruction ID: 7e9046ab6afabca39df5d8edceeb3ee5538e1bd5f1751281fc30c2998c34c12d
                                                                                      • Opcode Fuzzy Hash: 436d702f299c7db60cac6f902e88c9ad4443100075a08a9cc9c8b06f8a4bd42e
                                                                                      • Instruction Fuzzy Hash: AE312775D0531D9BDF20DFA4D989BCDBBB8BF08304F1041AAE509AB251EB719A85CF44
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • VirtualQuery.KERNEL32(80000000,009F500B,0000001C,009F5200,00000000,?,?,?,?,?,?,?,009F500B,00000004,00A49274,009F5290), ref: 009F50D7
                                                                                      • GetSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,009F500B,00000004,00A49274,009F5290), ref: 009F50F2
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: InfoQuerySystemVirtual
                                                                                      • String ID: D
                                                                                      • API String ID: 401686933-2746444292
                                                                                      • Opcode ID: c126119fcb45186bce38f67e2baf7332396b363019115b5eddc4b2a91326a901
                                                                                      • Instruction ID: ab03442276f31120c6adbab5af16157f2a483bf4b326aa64ecc98ec106eef2f9
                                                                                      • Opcode Fuzzy Hash: c126119fcb45186bce38f67e2baf7332396b363019115b5eddc4b2a91326a901
                                                                                      • Instruction Fuzzy Hash: 0B01D432B0050D6BDB14DE69DC05BEE7BADAFC4328F0DC220EE19D6144DA34E902C780
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 009FA347
                                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 009FA351
                                                                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 009FA35E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                      • String ID:
                                                                                      • API String ID: 3906539128-0
                                                                                      • Opcode ID: 5cd5d8ffe6d587aa23c4bfe834bb87b5d1b124f1d43b1a1fb1b3b89c9e65fa32
                                                                                      • Instruction ID: a025a937911547b85b1445fac73e89b2ac3f2dbf345c53c9b1e42c433c87d632
                                                                                      • Opcode Fuzzy Hash: 5cd5d8ffe6d587aa23c4bfe834bb87b5d1b124f1d43b1a1fb1b3b89c9e65fa32
                                                                                      • Instruction Fuzzy Hash: D431C27490122DABCB21DF64D988BDDBBB8BF48310F5042EAE51CA6251E7709F818F45
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: fd3dd93da610b919f8d165fbb2784f9b1b6ab208c1227b41d85b18d91c3e1033
                                                                                      • Instruction ID: 692bd69b3ed5bd1a6e03448fb2bcc1b51c07f8d784a8b21543561190b97cf121
                                                                                      • Opcode Fuzzy Hash: fd3dd93da610b919f8d165fbb2784f9b1b6ab208c1227b41d85b18d91c3e1033
                                                                                      • Instruction Fuzzy Hash: 1B022D72E002199FDF14CFA9D8906ADFBF5FF88314F258269D919E7384D731AA458B80
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 009F1B3B
                                                                                      • GetNumberFormatW.KERNEL32(00000400,00000000,?,00A1460C,?,?), ref: 009F1B8A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: FormatInfoLocaleNumber
                                                                                      • String ID:
                                                                                      • API String ID: 2169056816-0
                                                                                      • Opcode ID: 9fc9348dd424bf93de5a77f6321af018d8d240ca51b0612ba6dc59c9bd65f251
                                                                                      • Instruction ID: 4f83376ae049b694c2c3064d9fa70d7625d6638b8c85e513d537c70042d3521a
                                                                                      • Opcode Fuzzy Hash: 9fc9348dd424bf93de5a77f6321af018d8d240ca51b0612ba6dc59c9bd65f251
                                                                                      • Instruction Fuzzy Hash: A5015A79600248AAD710DBB5DC45FDF7BBCEF89714F008422BA04A7191E3709926CBA5
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(009E19FE,?,00000400), ref: 009E1891
                                                                                      • FormatMessageW.KERNEL32(00001200,00000000,00000000,00000400,?,?,00000000), ref: 009E18B2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorFormatLastMessage
                                                                                      • String ID:
                                                                                      • API String ID: 3479602957-0
                                                                                      • Opcode ID: 5e85da20aa442f6f221aaa93db137f25730f9414acba53ccfb16a1c67ba232c3
                                                                                      • Instruction ID: 9bf7f4687e18f17ca839fbd9f19c46bef4b111b438b56bb0d1019710927a1fb5
                                                                                      • Opcode Fuzzy Hash: 5e85da20aa442f6f221aaa93db137f25730f9414acba53ccfb16a1c67ba232c3
                                                                                      • Instruction Fuzzy Hash: 09D0A930344300BBFA024EA24C06F6B3BA9BB80B41F14C404BB02E80E1C6708822E729
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00A07DFF,?,?,00000008,?,?,00A07A9F,00000000), ref: 00A08031
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionRaise
                                                                                      • String ID:
                                                                                      • API String ID: 3997070919-0
                                                                                      • Opcode ID: 6eefcb95eaca98967f9aaa8f1fbfa1fb2271f1a732c1c4b19d2fcc8b7813323e
                                                                                      • Instruction ID: 26a4806b083a7ece2f18bc025db947059badd9c67a6d951913a2b237084bca62
                                                                                      • Opcode Fuzzy Hash: 6eefcb95eaca98967f9aaa8f1fbfa1fb2271f1a732c1c4b19d2fcc8b7813323e
                                                                                      • Instruction Fuzzy Hash: 8DB15A31610609CFD715CF28D48AB697BA0FF05364F298698E8DACF2E1C739E995CB44
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: c
                                                                                      • API String ID: 0-112844655
                                                                                      • Opcode ID: cffda5e0f70f19dcdfc331a5b13f22da8624d39dc4c14f2f8b083c6e7fcabbeb
                                                                                      • Instruction ID: 8439a1b8c80603776f638b6d67ee2868a45ea95d2683b39bfab7fd5a9be934b2
                                                                                      • Opcode Fuzzy Hash: cffda5e0f70f19dcdfc331a5b13f22da8624d39dc4c14f2f8b083c6e7fcabbeb
                                                                                      • Instruction Fuzzy Hash: E2E16671A083968FC726DF29D480A6BBBE5BBC8308F14492EE58A97341D730EC45CF52
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetVersionExW.KERNEL32(?), ref: 009E2DB3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: Version
                                                                                      • String ID:
                                                                                      • API String ID: 1889659487-0
                                                                                      • Opcode ID: cb7f5f8e04168e95b66346d55b7e94cb94c251e70573bc1f4d765915d987adf9
                                                                                      • Instruction ID: d3a85f131cb01c964711540fb8ffc137de120c0b56bc3d652ff3e6043a68286d
                                                                                      • Opcode Fuzzy Hash: cb7f5f8e04168e95b66346d55b7e94cb94c251e70573bc1f4d765915d987adf9
                                                                                      • Instruction Fuzzy Hash: 48F05EB4A042088BCB18CF99FC426D977B9F78C354F108295DA16D3390C7749E82CEA1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_000161B0,009F5C55), ref: 009F619A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionFilterUnhandled
                                                                                      • String ID:
                                                                                      • API String ID: 3192549508-0
                                                                                      • Opcode ID: d1501f73caca4148ee2d94bae862db31e91ed0f384de3cab349105341dd401be
                                                                                      • Instruction ID: 08011530f3bb7124e84c03ff78612e1c4a00ccea4d5daa06a02565211e261abe
                                                                                      • Opcode Fuzzy Hash: d1501f73caca4148ee2d94bae862db31e91ed0f384de3cab349105341dd401be
                                                                                      • Instruction Fuzzy Hash:
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID: 0-3916222277
                                                                                      • Opcode ID: 934ccf0cd4b67d897cb7c2438ec395f92651c0feaeced376863ec7c5dca47e2e
                                                                                      • Instruction ID: 35666149962844f1d4e859f7fb338da4965767e5937e5653e8d8929e2e5ed95a
                                                                                      • Opcode Fuzzy Hash: 934ccf0cd4b67d897cb7c2438ec395f92651c0feaeced376863ec7c5dca47e2e
                                                                                      • Instruction Fuzzy Hash: 04114F729087469EDB2A8F6A984576AF7F4EB10354F14CD2ED5A6E2280D375E940CF00
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: HeapProcess
                                                                                      • String ID:
                                                                                      • API String ID: 54951025-0
                                                                                      • Opcode ID: c2a8fc13da80a31fbf9cf5da71662c61275879e618d9c52c895d1affc7b9f948
                                                                                      • Instruction ID: 72400fd6604cfe90e61fffdb250dde015c0cf4669ed5bfc524c434109c87e04e
                                                                                      • Opcode Fuzzy Hash: c2a8fc13da80a31fbf9cf5da71662c61275879e618d9c52c895d1affc7b9f948
                                                                                      • Instruction Fuzzy Hash: 5FA00274601205CF9780CFB55A4D20B36D9654579170541555405C5171DA254452D601
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 27329bd2b38ea0fc70af58ccf55552f5284fd50f828b14c9829db2735e4e426b
                                                                                      • Instruction ID: 73e921574ca30c28ebd83eb0fdd2a95afc238d5f7f292293cfc62939f6f90ca7
                                                                                      • Opcode Fuzzy Hash: 27329bd2b38ea0fc70af58ccf55552f5284fd50f828b14c9829db2735e4e426b
                                                                                      • Instruction Fuzzy Hash: 81525A72A187018FC718CF19C891A6AF7E1FFCC304F498A2DE5959B255D334EA19CB86
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 791aa257b12385cba905f7673c9522a145dc905769f43d4aa0d16e23f948a154
                                                                                      • Instruction ID: 8aae8b28aa03fa368b1fbf468426a8f359626bc41f44ea49bbf735939573adc4
                                                                                      • Opcode Fuzzy Hash: 791aa257b12385cba905f7673c9522a145dc905769f43d4aa0d16e23f948a154
                                                                                      • Instruction Fuzzy Hash: F522B0B15083958FC726DF6AD89053AB7A5FB84724F140A2DF8E1973A1E7309D478B82
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: fd884a3da726c720ab9b4c87bc5d8ecb0d25c3f3ee15a4aa915c92b28da12367
                                                                                      • Instruction ID: 4b73227a8f026e778314fa2bc901b0af84aa52a9ffb5846c8de545eefa78937e
                                                                                      • Opcode Fuzzy Hash: fd884a3da726c720ab9b4c87bc5d8ecb0d25c3f3ee15a4aa915c92b28da12367
                                                                                      • Instruction Fuzzy Hash: 56D15E745182D08FC745CF59E8904BABBE4AF9E310B08899EF5E587352C331EA1ADB71
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 03fea543a58d0dd27e2e864fb02117e59d378e4798fe078c1b3d5c0b9131bf93
                                                                                      • Instruction ID: 9501527d17c01a1aff083fb0f64cb64475615e260c0ad03d9c0092ed0b6718a5
                                                                                      • Opcode Fuzzy Hash: 03fea543a58d0dd27e2e864fb02117e59d378e4798fe078c1b3d5c0b9131bf93
                                                                                      • Instruction Fuzzy Hash: EA61AB7160070CA7DE346D28C992BBF238C9FC1784F24481AEB46DFA91D759DD828396
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 5deea3b29f66a918188f7a75532971316276c2599c24e1ebb0fa75850081f94e
                                                                                      • Instruction ID: 6f5ccfb1b10211333512cc40fab2f3448f416c02369595292b31eae87ab62305
                                                                                      • Opcode Fuzzy Hash: 5deea3b29f66a918188f7a75532971316276c2599c24e1ebb0fa75850081f94e
                                                                                      • Instruction Fuzzy Hash: 3F5186A160464C97DF389D6CC9A6BBF239D9F42318F284919F782CB292C70DDE028352
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a35da125e80c468dd5aab9f237431b15a2388d6d78beb144d45893835abd1a41
                                                                                      • Instruction ID: f61fd32320fb18fa4d8a02381b37017b318185113742a8b8cc6f65e241771862
                                                                                      • Opcode Fuzzy Hash: a35da125e80c468dd5aab9f237431b15a2388d6d78beb144d45893835abd1a41
                                                                                      • Instruction Fuzzy Hash: CB51F0765087D54FC702CF2A81805AEBFE1AE9A718F4B089AE4D55B142D231DF4ACB52
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 009F31F6
                                                                                        • Part of subcall function 009F1E84: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 009F1F6B
                                                                                      • _wcslen.LIBCMT ref: 009F34BC
                                                                                      • _wcslen.LIBCMT ref: 009F34C5
                                                                                      • SetWindowTextW.USER32(?,?), ref: 009F3523
                                                                                      • _wcslen.LIBCMT ref: 009F3565
                                                                                      • _wcsrchr.LIBVCRUNTIME ref: 009F36AD
                                                                                      • GetDlgItem.USER32(?,00000066), ref: 009F36E8
                                                                                      • SetWindowTextW.USER32(00000000,?), ref: 009F36F8
                                                                                      • SendMessageW.USER32(00000000,00000143,00000000,00A38D8A), ref: 009F3706
                                                                                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 009F3731
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcslen$MessageSendTextWindow$EnvironmentExpandH_prologItemStrings_wcsrchr
                                                                                      • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                                                                      • API String ID: 2804936435-312220925
                                                                                      • Opcode ID: aa86186e92512b120cdb97580fa0661d1011189140a299bfc07b2cdcdf8b5582
                                                                                      • Instruction ID: 64f9cdea92c978d9bea4f45397128cbf5dc47e7e253a288d166bb15da8f428ca
                                                                                      • Opcode Fuzzy Hash: aa86186e92512b120cdb97580fa0661d1011189140a299bfc07b2cdcdf8b5582
                                                                                      • Instruction Fuzzy Hash: 50E153B290015DAADB25DBA0DC85EFE73BCAF44350F5485A5FB09E3050EB789F858B60
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • _swprintf.LIBCMT ref: 009E489E
                                                                                        • Part of subcall function 009E2AA2: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 009E2AB5
                                                                                        • Part of subcall function 009E7B9F: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,009E48BA,?,00000000,00000000,?,?,?,009E48BA,?,?,00000050), ref: 009E7BBC
                                                                                      • SetDlgItemTextW.USER32(?,00A14154,?), ref: 009E491F
                                                                                      • GetWindowRect.USER32(?,?), ref: 009E4959
                                                                                      • GetClientRect.USER32(?,?), ref: 009E4965
                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 009E4A05
                                                                                      • GetWindowRect.USER32(?,?), ref: 009E4A32
                                                                                      • SetWindowTextW.USER32(?,?), ref: 009E4A6B
                                                                                      • GetSystemMetrics.USER32(00000008), ref: 009E4A73
                                                                                      • GetWindow.USER32(?,00000005), ref: 009E4A7E
                                                                                      • GetWindowRect.USER32(00000000,?), ref: 009E4AAB
                                                                                      • GetWindow.USER32(00000000,00000002), ref: 009E4B1D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_swprintf
                                                                                      • String ID: $%s:$CAPTION$d
                                                                                      • API String ID: 3208934588-2512411981
                                                                                      • Opcode ID: 530028021234a10aec77c062d46e839d82124c8ab8ddfb8b44cd08aa8763a424
                                                                                      • Instruction ID: 7384c1adb3e2d66f6b9dd2dee7fb27469a60b8805c15e5bbd8a51a4171846a95
                                                                                      • Opcode Fuzzy Hash: 530028021234a10aec77c062d46e839d82124c8ab8ddfb8b44cd08aa8763a424
                                                                                      • Instruction Fuzzy Hash: BB81D076248341AFD711DFA9CC89B6FBBE8EBC9714F04492DFA84A3251D631EC058B52
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ___free_lconv_mon.LIBCMT ref: 00A02F76
                                                                                        • Part of subcall function 00A02B11: _free.LIBCMT ref: 00A02B2E
                                                                                        • Part of subcall function 00A02B11: _free.LIBCMT ref: 00A02B40
                                                                                        • Part of subcall function 00A02B11: _free.LIBCMT ref: 00A02B52
                                                                                        • Part of subcall function 00A02B11: _free.LIBCMT ref: 00A02B64
                                                                                        • Part of subcall function 00A02B11: _free.LIBCMT ref: 00A02B76
                                                                                        • Part of subcall function 00A02B11: _free.LIBCMT ref: 00A02B88
                                                                                        • Part of subcall function 00A02B11: _free.LIBCMT ref: 00A02B9A
                                                                                        • Part of subcall function 00A02B11: _free.LIBCMT ref: 00A02BAC
                                                                                        • Part of subcall function 00A02B11: _free.LIBCMT ref: 00A02BBE
                                                                                        • Part of subcall function 00A02B11: _free.LIBCMT ref: 00A02BD0
                                                                                        • Part of subcall function 00A02B11: _free.LIBCMT ref: 00A02BE2
                                                                                        • Part of subcall function 00A02B11: _free.LIBCMT ref: 00A02BF4
                                                                                        • Part of subcall function 00A02B11: _free.LIBCMT ref: 00A02C06
                                                                                      • _free.LIBCMT ref: 00A02F6B
                                                                                        • Part of subcall function 009FF8BA: RtlFreeHeap.NTDLL(00000000,00000000,?,00A02CA6,?,00000000,?,00000000,?,00A02CCD,?,00000007,?,?,00A030CA,?), ref: 009FF8D0
                                                                                        • Part of subcall function 009FF8BA: GetLastError.KERNEL32(?,?,00A02CA6,?,00000000,?,00000000,?,00A02CCD,?,00000007,?,?,00A030CA,?,?), ref: 009FF8E2
                                                                                      • _free.LIBCMT ref: 00A02F8D
                                                                                      • _free.LIBCMT ref: 00A02FA2
                                                                                      • _free.LIBCMT ref: 00A02FAD
                                                                                      • _free.LIBCMT ref: 00A02FCF
                                                                                      • _free.LIBCMT ref: 00A02FE2
                                                                                      • _free.LIBCMT ref: 00A02FF0
                                                                                      • _free.LIBCMT ref: 00A02FFB
                                                                                      • _free.LIBCMT ref: 00A03033
                                                                                      • _free.LIBCMT ref: 00A0303A
                                                                                      • _free.LIBCMT ref: 00A03057
                                                                                      • _free.LIBCMT ref: 00A0306F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                      • String ID:
                                                                                      • API String ID: 161543041-0
                                                                                      • Opcode ID: ce8cc2248702d8b00c950205c95df99fc1d094bff593f2447ca4dd1db7063dec
                                                                                      • Instruction ID: c55a679ab469053b21663f3a737aac31ded93c5366a878259e86b2783acb9145
                                                                                      • Opcode Fuzzy Hash: ce8cc2248702d8b00c950205c95df99fc1d094bff593f2447ca4dd1db7063dec
                                                                                      • Instruction Fuzzy Hash: E9314A326003099FEF25AB39E845B6AB3E9FF40390F104469EA4AD7291DB35AD90CB10
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetWindow.USER32(?,00000005), ref: 009F4181
                                                                                      • GetClassNameW.USER32(00000000,?,00000800), ref: 009F41AD
                                                                                        • Part of subcall function 009E7D7D: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,009E3108,?,?,?,009E30B5,?,-00000002,?,00000000,?), ref: 009E7D93
                                                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 009F41C9
                                                                                      • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 009F41E0
                                                                                      • GetObjectW.GDI32(00000000,00000018,?), ref: 009F41F4
                                                                                      • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 009F421D
                                                                                      • DeleteObject.GDI32(00000000), ref: 009F4224
                                                                                      • GetWindow.USER32(00000000,00000002), ref: 009F422D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
                                                                                      • String ID: STATIC
                                                                                      • API String ID: 3820355801-1882779555
                                                                                      • Opcode ID: b150e873a9bfeead4fb9fd1af85a29a6382d12991b1aa496db795e382a98616d
                                                                                      • Instruction ID: f502c4ee92181743a83dfab6d8c06746a2d0f8b4194ba3b24d7eb64b7c80ed24
                                                                                      • Opcode Fuzzy Hash: b150e873a9bfeead4fb9fd1af85a29a6382d12991b1aa496db795e382a98616d
                                                                                      • Instruction Fuzzy Hash: A9113D3A1443147BE330ABA09C09FFF765CEFE5711F000020FB51A50A6DB69894647F2
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • _free.LIBCMT ref: 009FF685
                                                                                        • Part of subcall function 009FF8BA: RtlFreeHeap.NTDLL(00000000,00000000,?,00A02CA6,?,00000000,?,00000000,?,00A02CCD,?,00000007,?,?,00A030CA,?), ref: 009FF8D0
                                                                                        • Part of subcall function 009FF8BA: GetLastError.KERNEL32(?,?,00A02CA6,?,00000000,?,00000000,?,00A02CCD,?,00000007,?,?,00A030CA,?,?), ref: 009FF8E2
                                                                                      • _free.LIBCMT ref: 009FF691
                                                                                      • _free.LIBCMT ref: 009FF69C
                                                                                      • _free.LIBCMT ref: 009FF6A7
                                                                                      • _free.LIBCMT ref: 009FF6B2
                                                                                      • _free.LIBCMT ref: 009FF6BD
                                                                                      • _free.LIBCMT ref: 009FF6C8
                                                                                      • _free.LIBCMT ref: 009FF6D3
                                                                                      • _free.LIBCMT ref: 009FF6DE
                                                                                      • _free.LIBCMT ref: 009FF6EC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                      • String ID:
                                                                                      • API String ID: 776569668-0
                                                                                      • Opcode ID: faf5325f49e1a56dbf39cf1df27a64c484156c626c793c0a0c546f1a885f349d
                                                                                      • Instruction ID: aa068ade09aafd433e20833a9348fbb81702bf97b3dc3d6fa16fda24064d07ce
                                                                                      • Opcode Fuzzy Hash: faf5325f49e1a56dbf39cf1df27a64c484156c626c793c0a0c546f1a885f349d
                                                                                      • Instruction Fuzzy Hash: C011897691010CBFDB01EF94C962EED3B66EF48390B5181A5FF098F222DA31DE519B80
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: CallFramesMatchNestedTypeUnexpectedUnwind_aborttype_info::operator==
                                                                                      • String ID: csm$csm$csm
                                                                                      • API String ID: 322700389-393685449
                                                                                      • Opcode ID: 18402b7581cdd302e7bcc3584fe74cbd0dc6c0571132019e578e81e425cd7c50
                                                                                      • Instruction ID: bc2017431508c3321e4fe2bd8e0a6e54827aec4f5761435549519d476c9e2340
                                                                                      • Opcode Fuzzy Hash: 18402b7581cdd302e7bcc3584fe74cbd0dc6c0571132019e578e81e425cd7c50
                                                                                      • Instruction Fuzzy Hash: 6DB1657180020DEFCF29EFA4C881ABEBBB9BF54314B14455AFA146B212D731DA52CF91
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • _wcslen.LIBCMT ref: 009F01F6
                                                                                      • _wcslen.LIBCMT ref: 009F0296
                                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 009F02A5
                                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,?,00000000,00000000), ref: 009F02C6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcslen$AllocByteCharGlobalMultiWide
                                                                                      • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                                                                      • API String ID: 1116704506-4209811716
                                                                                      • Opcode ID: a8a4f258c397d9dcfaa5987830d2e269d8bb8b83b1c9a594a65a58b35d7b483e
                                                                                      • Instruction ID: 3cad8b7aa5921d3aeee6d6b9925bdc3bed6063a51780a0d568694d4aa8b1b6d6
                                                                                      • Opcode Fuzzy Hash: a8a4f258c397d9dcfaa5987830d2e269d8bb8b83b1c9a594a65a58b35d7b483e
                                                                                      • Instruction Fuzzy Hash: EF31373220534D7AD725AB60AC06FBF77ACEFD1310F14041AF765961D3EBA0990583A6
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                        • Part of subcall function 009E11C6: GetDlgItem.USER32(00000000,00003021), ref: 009E120A
                                                                                        • Part of subcall function 009E11C6: SetWindowTextW.USER32(00000000,00A09584), ref: 009E1220
                                                                                      • EndDialog.USER32(?,00000001), ref: 009F2180
                                                                                      • SendMessageW.USER32(?,00000080,00000001,?), ref: 009F21A7
                                                                                      • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 009F21C0
                                                                                      • SetWindowTextW.USER32(?,?), ref: 009F21D1
                                                                                      • GetDlgItem.USER32(?,00000065), ref: 009F21DA
                                                                                      • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 009F21EE
                                                                                      • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 009F2204
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$Item$TextWindow$Dialog
                                                                                      • String ID: LICENSEDLG
                                                                                      • API String ID: 3214253823-2177901306
                                                                                      • Opcode ID: ad510d27635996dd997d75532d1a9652602b686cb5d027715e811b11e6409e88
                                                                                      • Instruction ID: 358443f8c3275e612d2764553eb06525c684b282b8a8c63b3595525c6d057db7
                                                                                      • Opcode Fuzzy Hash: ad510d27635996dd997d75532d1a9652602b686cb5d027715e811b11e6409e88
                                                                                      • Instruction Fuzzy Hash: D021943A2882097BE2219FA5EC49FBB3A6DEBD7781F004414F715A10A1C7979C069776
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 009F173F
                                                                                      • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 009F1750
                                                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 009F175E
                                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 009F176C
                                                                                      • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 009F1787
                                                                                      • GetTimeFormatW.KERNEL32(00000400,?,?,00000000,?,00000032), ref: 009F17AE
                                                                                      • _swprintf.LIBCMT ref: 009F17D4
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: Time$System$File$Format$DateLocalSpecific_swprintf
                                                                                      • String ID: %s %s
                                                                                      • API String ID: 385609497-2939940506
                                                                                      • Opcode ID: fa4cb20c93817436d2b45bf51ebffa77a230aa45be2d904173d0cdfde5198071
                                                                                      • Instruction ID: bfa83e3ce3847807410b90ed3a4d325a41f0eaf3ed27c9af0245c918f4647f7e
                                                                                      • Opcode Fuzzy Hash: fa4cb20c93817436d2b45bf51ebffa77a230aa45be2d904173d0cdfde5198071
                                                                                      • Instruction Fuzzy Hash: 12211AB250015CABDB11DFA1EC44EFF3BADFF09300F044426FA09D2112E625DA4ACBA1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcslen
                                                                                      • String ID: </p>$</style>$<br>$<style>$>
                                                                                      • API String ID: 176396367-3568243669
                                                                                      • Opcode ID: 8df9176f259babb1d2553407d2052fc96fb7409e38144526471a1610542719c1
                                                                                      • Instruction ID: 8315cdcddd3e29b9f80da1fe9a7eeabf3fb5ebe68493839e47c8c43e21a3cfbb
                                                                                      • Opcode Fuzzy Hash: 8df9176f259babb1d2553407d2052fc96fb7409e38144526471a1610542719c1
                                                                                      • Instruction Fuzzy Hash: A251E75674532F95EB305A549C1177A63ECEFE0790F68442AEBC09B1C3FBE68C8183A1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00A06212,00000000,00000000,00000000,00000000,00000000,009FB802), ref: 00A05ADF
                                                                                      • __fassign.LIBCMT ref: 00A05B5A
                                                                                      • __fassign.LIBCMT ref: 00A05B75
                                                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00A05B9B
                                                                                      • WriteFile.KERNEL32(?,00000000,00000000,00A06212,00000000,?,?,?,?,?,?,?,?,?,00A06212,00000000), ref: 00A05BBA
                                                                                      • WriteFile.KERNEL32(?,00000000,00000001,00A06212,00000000,?,?,?,?,?,?,?,?,?,00A06212,00000000), ref: 00A05BF3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                      • String ID:
                                                                                      • API String ID: 1324828854-0
                                                                                      • Opcode ID: 62663136e372cb6fd2d014cee2ab7b516c4688a3ac1622fc680833cce43fccc0
                                                                                      • Instruction ID: d1c2cdcbdc46098e0b7f8feb105d71be235a2adf1217f146670c811ce8eff61b
                                                                                      • Opcode Fuzzy Hash: 62663136e372cb6fd2d014cee2ab7b516c4688a3ac1622fc680833cce43fccc0
                                                                                      • Instruction Fuzzy Hash: 0A517F75E0060D9FDB10CFA8E895AEFBBF8EF49310F14411AE556E7291E730A952CB60
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • _ValidateLocalCookies.LIBCMT ref: 009F8B97
                                                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 009F8B9F
                                                                                      • _ValidateLocalCookies.LIBCMT ref: 009F8C28
                                                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 009F8C53
                                                                                      • _ValidateLocalCookies.LIBCMT ref: 009F8CA8
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                      • String ID: csm
                                                                                      • API String ID: 1170836740-1018135373
                                                                                      • Opcode ID: aa57bbe5902b35cc253a4897ff3493dc52896b8f9e88438655bf82fad2088d66
                                                                                      • Instruction ID: b81528ebdb26c7cdb22dfe7db1bea454406b3cc33d9b700dbbffdbc127542788
                                                                                      • Opcode Fuzzy Hash: aa57bbe5902b35cc253a4897ff3493dc52896b8f9e88438655bf82fad2088d66
                                                                                      • Instruction Fuzzy Hash: 9241C434A1121CABCF10DF68C885BBF7BB5BF45328F148155EA189B392DB319902CFA1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • ShowWindow.USER32(?,00000000), ref: 009F0A0E
                                                                                      • GetWindowRect.USER32(?,?), ref: 009F0A64
                                                                                      • ShowWindow.USER32(?,00000005,00000000), ref: 009F0B01
                                                                                      • SetWindowTextW.USER32(?,00000000), ref: 009F0B09
                                                                                      • ShowWindow.USER32(00000000,00000005), ref: 009F0B1F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$Show$RectText
                                                                                      • String ID: RarHtmlClassName
                                                                                      • API String ID: 3937224194-1658105358
                                                                                      • Opcode ID: 933799f53d7f1b45db5960fce085fb19242e9d8de10fe95c4ae68ad6d2770a04
                                                                                      • Instruction ID: 986b1a8e63982e9b0d1af685ee4c3b0a53afbfa4edd238c74e7457d1d3eae361
                                                                                      • Opcode Fuzzy Hash: 933799f53d7f1b45db5960fce085fb19242e9d8de10fe95c4ae68ad6d2770a04
                                                                                      • Instruction Fuzzy Hash: 2241D039404308AFCB219FA49C4CB6B7BADEBC8705F004658FA49A9063D735D840CB62
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcslen
                                                                                      • String ID: $&nbsp;$<br>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                                                      • API String ID: 176396367-3743748572
                                                                                      • Opcode ID: 737c6c1d04416a4e2aef94db2dc1f924ddb55f6af9f1b5785253e171e16308f7
                                                                                      • Instruction ID: 1f8ac037a7f7db0fb4e2145c2c4a802aab4a617a295d85669169417c7a0e25f4
                                                                                      • Opcode Fuzzy Hash: 737c6c1d04416a4e2aef94db2dc1f924ddb55f6af9f1b5785253e171e16308f7
                                                                                      • Instruction Fuzzy Hash: 04315E61A4430DA6E634AB54AC42B7673ECEBD0320F10441EFB99971C2FAE4AD4487A2
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                        • Part of subcall function 00A02C78: _free.LIBCMT ref: 00A02CA1
                                                                                      • _free.LIBCMT ref: 00A02D02
                                                                                        • Part of subcall function 009FF8BA: RtlFreeHeap.NTDLL(00000000,00000000,?,00A02CA6,?,00000000,?,00000000,?,00A02CCD,?,00000007,?,?,00A030CA,?), ref: 009FF8D0
                                                                                        • Part of subcall function 009FF8BA: GetLastError.KERNEL32(?,?,00A02CA6,?,00000000,?,00000000,?,00A02CCD,?,00000007,?,?,00A030CA,?,?), ref: 009FF8E2
                                                                                      • _free.LIBCMT ref: 00A02D0D
                                                                                      • _free.LIBCMT ref: 00A02D18
                                                                                      • _free.LIBCMT ref: 00A02D6C
                                                                                      • _free.LIBCMT ref: 00A02D77
                                                                                      • _free.LIBCMT ref: 00A02D82
                                                                                      • _free.LIBCMT ref: 00A02D8D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                      • String ID:
                                                                                      • API String ID: 776569668-0
                                                                                      • Opcode ID: ed90a822092467ab948ce4ab8a4e5ff1fef504289117e408d2aed02f462530fb
                                                                                      • Instruction ID: 471638b9b7ba8b724fd365262ca87646db3ecfa09d4119308ce7db4896a86bdd
                                                                                      • Opcode Fuzzy Hash: ed90a822092467ab948ce4ab8a4e5ff1fef504289117e408d2aed02f462530fb
                                                                                      • Instruction Fuzzy Hash: 60118172940B0CBAF520B7B0DD4FFDF77AD6F40700F400D24B79AA6092DA24B5059790
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,009F508C,009F4FEF,009F5290), ref: 009F5028
                                                                                      • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 009F503E
                                                                                      • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 009F5053
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$HandleModule
                                                                                      • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                                      • API String ID: 667068680-1718035505
                                                                                      • Opcode ID: fbc339b331166a4dd58c588b6dd7dc4889ed70c550f773923bc203f86f7094b6
                                                                                      • Instruction ID: e2c5ffd64fb2d8dd7cec605d84ba05d1d86309583e89f490a5aa992a70efb3c6
                                                                                      • Opcode Fuzzy Hash: fbc339b331166a4dd58c588b6dd7dc4889ed70c550f773923bc203f86f7094b6
                                                                                      • Instruction Fuzzy Hash: DEF0FF35642E2FAB9B208EB06CC49BB238CAA0639630E04399B09EA550DF518C52D7E0
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(?,?,009F8EE1,009F8E6C,009F61F4), ref: 009F8EF8
                                                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 009F8F06
                                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 009F8F1F
                                                                                      • SetLastError.KERNEL32(00000000,009F8EE1,009F8E6C,009F61F4), ref: 009F8F71
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLastValue___vcrt_
                                                                                      • String ID:
                                                                                      • API String ID: 3852720340-0
                                                                                      • Opcode ID: cd80af10479b48e76a2fbd4a1331d0ba404b40488c1864f1f066cbcd9ea629d9
                                                                                      • Instruction ID: f22ec730af29d4445ff9f6bb79a1ebd0ad0eb1f681af2027b13e6cacdc20ad7a
                                                                                      • Opcode Fuzzy Hash: cd80af10479b48e76a2fbd4a1331d0ba404b40488c1864f1f066cbcd9ea629d9
                                                                                      • Instruction Fuzzy Hash: 100124B220D71A5EA7506EB87C8567B3649EB82778B30432DF334800F1EF510C02E384
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(?,?,009FABD7,?,?,?,009FA652,00000050), ref: 009FF769
                                                                                      • _free.LIBCMT ref: 009FF79C
                                                                                      • _free.LIBCMT ref: 009FF7C4
                                                                                      • SetLastError.KERNEL32(00000000), ref: 009FF7D1
                                                                                      • SetLastError.KERNEL32(00000000), ref: 009FF7DD
                                                                                      • _abort.LIBCMT ref: 009FF7E3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$_free$_abort
                                                                                      • String ID:
                                                                                      • API String ID: 3160817290-0
                                                                                      • Opcode ID: 7a2235086a48e24d62024a396c223e261fa1b9aaaf2a8f315d4ad122bc92b34d
                                                                                      • Instruction ID: f8599c4c54af99731c870f423d4237ef36a6d3274553a10d5249b58b07391b3f
                                                                                      • Opcode Fuzzy Hash: 7a2235086a48e24d62024a396c223e261fa1b9aaaf2a8f315d4ad122bc92b34d
                                                                                      • Instruction Fuzzy Hash: 6BF0C83624460C6BC61177786DAABBF266A9FD2764F310134FB16D26E3EF248C038320
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • _wcslen.LIBCMT ref: 009E3609
                                                                                      • GetCurrentDirectoryW.KERNEL32(000007FF,?,000000FF,000000FF,?,?,?,?,009E2763,000000FF,?,00000800,?,?,009E1D8F,?), ref: 009E36A7
                                                                                      • _wcslen.LIBCMT ref: 009E371D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcslen$CurrentDirectory
                                                                                      • String ID: UNC$\\?\
                                                                                      • API String ID: 3341907918-253988292
                                                                                      • Opcode ID: 7f0a12145c7f0bd9ce2e38fd6a6eb1e07711e131eaacbe1229107058faaf4345
                                                                                      • Instruction ID: daf8539efca7a7cbdd0056e6b08e80502968e7a5611ca35742d4a9fadcd95524
                                                                                      • Opcode Fuzzy Hash: 7f0a12145c7f0bd9ce2e38fd6a6eb1e07711e131eaacbe1229107058faaf4345
                                                                                      • Instruction Fuzzy Hash: A041C1F1844299B6CB23AF26CC4AAEA776DBF50790B01C425F55497142E772DF40C660
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • LoadBitmapW.USER32(00000065), ref: 009F225D
                                                                                      • GetObjectW.GDI32(00000000,00000018,?), ref: 009F2282
                                                                                      • DeleteObject.GDI32(00000000), ref: 009F22B4
                                                                                      • DeleteObject.GDI32(00000000), ref: 009F22D7
                                                                                        • Part of subcall function 009F11D2: FindResourceW.KERNELBASE(?,PNG,00000000,?,?,?,009F22AD,00000066), ref: 009F11E5
                                                                                        • Part of subcall function 009F11D2: SizeofResource.KERNEL32(00000000,?,?,?,009F22AD,00000066), ref: 009F11FC
                                                                                        • Part of subcall function 009F11D2: LoadResource.KERNEL32(00000000,?,?,?,009F22AD,00000066), ref: 009F1213
                                                                                        • Part of subcall function 009F11D2: LockResource.KERNEL32(00000000,?,?,?,009F22AD,00000066), ref: 009F1222
                                                                                        • Part of subcall function 009F11D2: GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,009F22AD,00000066), ref: 009F123D
                                                                                        • Part of subcall function 009F11D2: GlobalLock.KERNEL32(00000000,?,?,?,?,?,009F22AD,00000066), ref: 009F124E
                                                                                        • Part of subcall function 009F11D2: GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 009F12B7
                                                                                        • Part of subcall function 009F11D2: GlobalUnlock.KERNEL32(00000000), ref: 009F12D6
                                                                                        • Part of subcall function 009F11D2: GlobalFree.KERNEL32(00000000), ref: 009F12DD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: GlobalResource$Object$BitmapDeleteLoadLock$AllocCreateFindFreeFromGdipSizeofUnlock
                                                                                      • String ID: ]
                                                                                      • API String ID: 1428510222-3352871620
                                                                                      • Opcode ID: 25a65b214e6256cb81399cc951c838217362bb504de27cb224cf2d2237358bbf
                                                                                      • Instruction ID: 94ceac15f299565b1607df9a6896d2ab9e52c1dbf0c207558d28e49f068b79af
                                                                                      • Opcode Fuzzy Hash: 25a65b214e6256cb81399cc951c838217362bb504de27cb224cf2d2237358bbf
                                                                                      • Instruction Fuzzy Hash: 5301D23A540609A7D71567A48C0ABBF7A7EABC1B51F180014FF20B7292DF758C0687A2
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                        • Part of subcall function 009E11C6: GetDlgItem.USER32(00000000,00003021), ref: 009E120A
                                                                                        • Part of subcall function 009E11C6: SetWindowTextW.USER32(00000000,00A09584), ref: 009E1220
                                                                                      • EndDialog.USER32(?,00000001), ref: 009F410B
                                                                                      • GetDlgItemTextW.USER32(?,00000068,00000800), ref: 009F4121
                                                                                      • SetDlgItemTextW.USER32(?,00000066,?), ref: 009F4135
                                                                                      • SetDlgItemTextW.USER32(?,00000068), ref: 009F4144
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: ItemText$DialogWindow
                                                                                      • String ID: RENAMEDLG
                                                                                      • API String ID: 445417207-3299779563
                                                                                      • Opcode ID: dd04c278a67d0bb99fff66591eb24d7aa9065e2fd45dd3a7379e6669594a344d
                                                                                      • Instruction ID: e7aabea42360a59fe6135669811509fc12dc4a18220b063e7e471a13200b29d3
                                                                                      • Opcode Fuzzy Hash: dd04c278a67d0bb99fff66591eb24d7aa9065e2fd45dd3a7379e6669594a344d
                                                                                      • Instruction Fuzzy Hash: 0B01B93678C2187AE2219FA85C49F7B775CFBB7742F200905F301920D1C3A659858765
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,009FE3F8,00000003,?,009FE398,00000003,00A11D50,0000000C,009FE4EF,00000003,00000002), ref: 009FE467
                                                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 009FE47A
                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,009FE3F8,00000003,?,009FE398,00000003,00A11D50,0000000C,009FE4EF,00000003,00000002,00000000), ref: 009FE49D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                                      • API String ID: 4061214504-1276376045
                                                                                      • Opcode ID: 5d3281d7f52f09170398c534cf1a43b05aaf63450889dcc2048596843e8d1846
                                                                                      • Instruction ID: 8b92455d5e124fd3704d114b2b02ddd63d113befc8c39c08906508a0859cc72f
                                                                                      • Opcode Fuzzy Hash: 5d3281d7f52f09170398c534cf1a43b05aaf63450889dcc2048596843e8d1846
                                                                                      • Instruction Fuzzy Hash: 21F04431A0021CBBCB119FA5EC49BEEBFB8EB08721F004168F905A2161DB715A46CB90
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                        • Part of subcall function 009E6B9C: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 009E6BB7
                                                                                        • Part of subcall function 009E6B9C: LoadLibraryW.KERNELBASE(?,?,009E590F,Crypt32.dll,00000000,009E5989,?,?,009E596C,00000000,00000000,?,00000000), ref: 009E6BD9
                                                                                      • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 009E591B
                                                                                      • GetProcAddress.KERNEL32(00A1E028,CryptUnprotectMemory), ref: 009E592B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$DirectoryLibraryLoadSystem
                                                                                      • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                                                                      • API String ID: 2141747552-1753850145
                                                                                      • Opcode ID: 31d5b7b75c649c0c22de94c912aa97cd9282d726a5c8dce8e5f1621fc032bcd5
                                                                                      • Instruction ID: 473efc57a9a611f30a7aaeef6845192cc6e4cc8ded28997a5aa0884f3667848e
                                                                                      • Opcode Fuzzy Hash: 31d5b7b75c649c0c22de94c912aa97cd9282d726a5c8dce8e5f1621fc032bcd5
                                                                                      • Instruction Fuzzy Hash: 20E0DF31811B44EED7218F75A88C7C3BAD46F24724B008C1CE0CAC2183C6B5D8818B00
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AdjustPointer$_abort
                                                                                      • String ID:
                                                                                      • API String ID: 2252061734-0
                                                                                      • Opcode ID: 61a444e45aeb7255b60b97b2fd0104783767f1be20b23b6bc4a09d7ed7ee9e86
                                                                                      • Instruction ID: 2add8bdef28380bbc94eda69cf595c8c4f4a4d9c155cd97098026db30c150b13
                                                                                      • Opcode Fuzzy Hash: 61a444e45aeb7255b60b97b2fd0104783767f1be20b23b6bc4a09d7ed7ee9e86
                                                                                      • Instruction Fuzzy Hash: 6951D67260820EAFDB298F14D845BBA77B9FF94310F18452DEB45972A1DB32ED41C790
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetEnvironmentStringsW.KERNEL32 ref: 00A02349
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00A0236C
                                                                                        • Part of subcall function 009FF9E5: RtlAllocateHeap.NTDLL(00000000,?,?,?,009FA7E9,?,0000015D,?,?,?,?,009FBCC5,000000FF,00000000,?,?), ref: 009FFA17
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00A02392
                                                                                      • _free.LIBCMT ref: 00A023A5
                                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00A023B4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                      • String ID:
                                                                                      • API String ID: 336800556-0
                                                                                      • Opcode ID: d2944513fe77ef99c8ee4fec499c3d7ae5729de0ca7365785f7751c605c00ab5
                                                                                      • Instruction ID: 2361f7bd7872830527bae55c53de47e2b2d0f155a5c881714c3253de01c9820c
                                                                                      • Opcode Fuzzy Hash: d2944513fe77ef99c8ee4fec499c3d7ae5729de0ca7365785f7751c605c00ab5
                                                                                      • Instruction Fuzzy Hash: D401887260171D7FA3215BA67D4CE7B7A6DDFC2B603150179FE04CB281DA688C029271
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(?,?,?,009FF9D7,00A01598,?,009FF793,00000001,00000364,?,009FABD7,?,?,?,009FA652,00000050), ref: 009FF7EE
                                                                                      • _free.LIBCMT ref: 009FF823
                                                                                      • _free.LIBCMT ref: 009FF84A
                                                                                      • SetLastError.KERNEL32(00000000), ref: 009FF857
                                                                                      • SetLastError.KERNEL32(00000000), ref: 009FF860
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$_free
                                                                                      • String ID:
                                                                                      • API String ID: 3170660625-0
                                                                                      • Opcode ID: 55de5c5211a36f5402d18204491464a59168e100e629d27ebf2dc28414db1091
                                                                                      • Instruction ID: cbb77c3b72f76dfe7f19a76ffcab385600f1e7bfd5a24fd8e832df376fc23d10
                                                                                      • Opcode Fuzzy Hash: 55de5c5211a36f5402d18204491464a59168e100e629d27ebf2dc28414db1091
                                                                                      • Instruction Fuzzy Hash: E601F93620460C67D611A7746D65A7B266EDFD63F4B250538F717E21A3EE248C038360
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • _free.LIBCMT ref: 00A02C27
                                                                                        • Part of subcall function 009FF8BA: RtlFreeHeap.NTDLL(00000000,00000000,?,00A02CA6,?,00000000,?,00000000,?,00A02CCD,?,00000007,?,?,00A030CA,?), ref: 009FF8D0
                                                                                        • Part of subcall function 009FF8BA: GetLastError.KERNEL32(?,?,00A02CA6,?,00000000,?,00000000,?,00A02CCD,?,00000007,?,?,00A030CA,?,?), ref: 009FF8E2
                                                                                      • _free.LIBCMT ref: 00A02C39
                                                                                      • _free.LIBCMT ref: 00A02C4B
                                                                                      • _free.LIBCMT ref: 00A02C5D
                                                                                      • _free.LIBCMT ref: 00A02C6F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                      • String ID:
                                                                                      • API String ID: 776569668-0
                                                                                      • Opcode ID: bb02264cf14ea6e8624ec900d68c73a60d3393836412cc614b01cc9a131d0c1d
                                                                                      • Instruction ID: d468320a94d45e024014549281abf33daf1b8b36e8bf51b90cd9bf18a98ba43b
                                                                                      • Opcode Fuzzy Hash: bb02264cf14ea6e8624ec900d68c73a60d3393836412cc614b01cc9a131d0c1d
                                                                                      • Instruction Fuzzy Hash: 4EF06873500708ABE920DB68F9C9E6B73D9BF447503644865F94DD7540CB34FC814750
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • _wcslen.LIBCMT ref: 009E7DA7
                                                                                      • _wcslen.LIBCMT ref: 009E7DB8
                                                                                      • _wcslen.LIBCMT ref: 009E7DC8
                                                                                      • _wcslen.LIBCMT ref: 009E7DD6
                                                                                      • CompareStringW.KERNEL32(00000400,00001001,?,?,?,?,00000000,00000000,?,009E2F91,?,?,00000000,?,?,?), ref: 009E7DF1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcslen$CompareString
                                                                                      • String ID:
                                                                                      • API String ID: 3397213944-0
                                                                                      • Opcode ID: 6bcc026b58af79a092b1cebd7ee1b650d84f7879c6a998994f78d369156386bb
                                                                                      • Instruction ID: b8395e9e736bbde6a6635b30cbddf8faf0536979b9eebd44ad617768574c94b9
                                                                                      • Opcode Fuzzy Hash: 6bcc026b58af79a092b1cebd7ee1b650d84f7879c6a998994f78d369156386bb
                                                                                      • Instruction Fuzzy Hash: A7F09032108058BBCF125F91EC49EDE7F26EF80770B20C401F6395A0A1CB329991DB95
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • _free.LIBCMT ref: 009FEEFE
                                                                                        • Part of subcall function 009FF8BA: RtlFreeHeap.NTDLL(00000000,00000000,?,00A02CA6,?,00000000,?,00000000,?,00A02CCD,?,00000007,?,?,00A030CA,?), ref: 009FF8D0
                                                                                        • Part of subcall function 009FF8BA: GetLastError.KERNEL32(?,?,00A02CA6,?,00000000,?,00000000,?,00A02CCD,?,00000007,?,?,00A030CA,?,?), ref: 009FF8E2
                                                                                      • _free.LIBCMT ref: 009FEF10
                                                                                      • _free.LIBCMT ref: 009FEF23
                                                                                      • _free.LIBCMT ref: 009FEF34
                                                                                      • _free.LIBCMT ref: 009FEF45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                      • String ID:
                                                                                      • API String ID: 776569668-0
                                                                                      • Opcode ID: 000523123e2993a80ffca1f084285e8282b999a19a83fa0974923e3ba5f243ec
                                                                                      • Instruction ID: 80532966c6275fa9f438d1ff0dc9447fd097e73f4781ace6c691ffb0364368f0
                                                                                      • Opcode Fuzzy Hash: 000523123e2993a80ffca1f084285e8282b999a19a83fa0974923e3ba5f243ec
                                                                                      • Instruction Fuzzy Hash: 86F030BE8001288BEB12EFA8BC5155737A5FB9A7213050165FA0692271CB3608638BC0
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: _swprintf
                                                                                      • String ID: %ls$%s: %s
                                                                                      • API String ID: 589789837-2259941744
                                                                                      • Opcode ID: 91332470e6f0e775ac7ea725c5036e2039e81b18af1dccf8f1e83064be9e7cb5
                                                                                      • Instruction ID: f1d65b1564a14680fe569836a70218c1021a91cb190093acf4567460042f9a23
                                                                                      • Opcode Fuzzy Hash: 91332470e6f0e775ac7ea725c5036e2039e81b18af1dccf8f1e83064be9e7cb5
                                                                                      • Instruction Fuzzy Hash: 1C51AB3128C785FAE72326D78C02F3AF95AAB14F04F208D06B396644F6E5A59D50B727
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\64drop.exe,00000104), ref: 009FE582
                                                                                      • _free.LIBCMT ref: 009FE64D
                                                                                      • _free.LIBCMT ref: 009FE657
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: _free$FileModuleName
                                                                                      • String ID: C:\Users\user\Desktop\64drop.exe
                                                                                      • API String ID: 2506810119-1206620436
                                                                                      • Opcode ID: e665b000a4c4105cffc8a45cf5b94176785da77b6b59de434051672069f4571a
                                                                                      • Instruction ID: ed06796678a44ae35ad008b405223ba0bb4b4346ee19f7c82c73c61db198da63
                                                                                      • Opcode Fuzzy Hash: e665b000a4c4105cffc8a45cf5b94176785da77b6b59de434051672069f4571a
                                                                                      • Instruction Fuzzy Hash: B3316DB5A0421CAFDB21DF999C85AAFBBECEF95314B104066FA04D7221D6B18E41CB91
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 009F95EB
                                                                                      • _abort.LIBCMT ref: 009F96F6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: EncodePointer_abort
                                                                                      • String ID: MOC$RCC
                                                                                      • API String ID: 948111806-2084237596
                                                                                      • Opcode ID: c589df9293f29f9619797fe3fb40deec1284a47f3645532cc872d665f07d6225
                                                                                      • Instruction ID: 64d60ba6a6c5922c4a5d5730c784fa6608a451e52826c29babc9e588990eff81
                                                                                      • Opcode Fuzzy Hash: c589df9293f29f9619797fe3fb40deec1284a47f3645532cc872d665f07d6225
                                                                                      • Instruction Fuzzy Hash: 0B41267290020DAFCF16DF98CC81BAEBBB9BF48304F158059FA18A7221D7359961DF54
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • __fprintf_l.LIBCMT ref: 009E3EE4
                                                                                      • _strncpy.LIBCMT ref: 009E3F2A
                                                                                        • Part of subcall function 009E7B9F: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,009E48BA,?,00000000,00000000,?,?,?,009E48BA,?,?,00000050), ref: 009E7BBC
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWide__fprintf_l_strncpy
                                                                                      • String ID: $%s$@%s
                                                                                      • API String ID: 562999700-834177443
                                                                                      • Opcode ID: e3cd0fd0f2f00ced2d9f12dacd5111dcd0390b7a12af112c80225df74069c2cc
                                                                                      • Instruction ID: 199641780b7d22139e1ffe0b907ed1d96a839c870271b3f1e73c8be4c27e88f2
                                                                                      • Opcode Fuzzy Hash: e3cd0fd0f2f00ced2d9f12dacd5111dcd0390b7a12af112c80225df74069c2cc
                                                                                      • Instruction Fuzzy Hash: 0221937194028CBFEB22DEA6CD4AFEE3BACAF45300F044826F91097192E775DA448B51
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                        • Part of subcall function 009E11C6: GetDlgItem.USER32(00000000,00003021), ref: 009E120A
                                                                                        • Part of subcall function 009E11C6: SetWindowTextW.USER32(00000000,00A09584), ref: 009E1220
                                                                                      • EndDialog.USER32(?,00000001), ref: 009F1E2E
                                                                                      • GetDlgItemTextW.USER32(?,00000066,?,00000200), ref: 009F1E46
                                                                                      • SetDlgItemTextW.USER32(?,00000067,?), ref: 009F1E74
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: ItemText$DialogWindow
                                                                                      • String ID: GETPASSWORD1
                                                                                      • API String ID: 445417207-3292211884
                                                                                      • Opcode ID: 220e97ec57d3916d0d5ceaaf56f868f3beddda95a2b60f7fd1b589e9b9cd6886
                                                                                      • Instruction ID: 745d96915018de873090d06147dcd645013fb8569bb4511174af88d32bd47c1b
                                                                                      • Opcode Fuzzy Hash: 220e97ec57d3916d0d5ceaaf56f868f3beddda95a2b60f7fd1b589e9b9cd6886
                                                                                      • Instruction Fuzzy Hash: 5011C076A4021CFBEB219E789D49FBB3B7CEB9A714F040520FB15B60C0C2799D0297A1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                                      • API String ID: 0-56093855
                                                                                      • Opcode ID: e0321bd762b47b6bd7d341c08ecab8235359918c8054e397f8d72b2c7d0317e2
                                                                                      • Instruction ID: 36d0b8b882281b5e69183a408ccf9bfa7bfcb4274d91ab04ed8acc1930edbeba
                                                                                      • Opcode Fuzzy Hash: e0321bd762b47b6bd7d341c08ecab8235359918c8054e397f8d72b2c7d0317e2
                                                                                      • Instruction Fuzzy Hash: 10019E75A0024DBFDB11EFA8EC44BB73BA8A796790B004436FB0582270D3329C92DB61
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • std::_Xinvalid_argument.LIBCPMT ref: 009E8EAD
                                                                                        • Part of subcall function 009F55CD: std::invalid_argument::invalid_argument.LIBCONCRT ref: 009F55D9
                                                                                        • Part of subcall function 009F55CD: ___delayLoadHelper2@8.DELAYIMP ref: 009F55FF
                                                                                      • std::_Xinvalid_argument.LIBCPMT ref: 009E8EB8
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: Xinvalid_argumentstd::_$Helper2@8Load___delaystd::invalid_argument::invalid_argument
                                                                                      • String ID: string too long$vector too long
                                                                                      • API String ID: 2355824318-1617939282
                                                                                      • Opcode ID: b7d725740026c16f932f4afa337be5faca2b0075f19a9efb15eecc9c4e351e6b
                                                                                      • Instruction ID: e2f1ce78f5e022aa4399ce67375f9084c3887e0b3c47fc34a6c2d30daa662172
                                                                                      • Opcode Fuzzy Hash: b7d725740026c16f932f4afa337be5faca2b0075f19a9efb15eecc9c4e351e6b
                                                                                      • Instruction Fuzzy Hash: C5F0A031200388ABC7256E9AEC45A4BB7EEEBC1B50B50091AFA4597542DBF1AD0087B5
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: __alldvrm$_strrchr
                                                                                      • String ID:
                                                                                      • API String ID: 1036877536-0
                                                                                      • Opcode ID: d44050169a961246a75403e81249a310e18b1805ed77af15c25c3f8bfb7b45ee
                                                                                      • Instruction ID: ca5b9394fb507af3b0defc4991724d30332fcc73ef77713d95eda07dd80ebe7b
                                                                                      • Opcode Fuzzy Hash: d44050169a961246a75403e81249a310e18b1805ed77af15c25c3f8bfb7b45ee
                                                                                      • Instruction Fuzzy Hash: 05A1297290078E9FE721CF18D8A1BBEBBE5EF56310F14457DE6859B282C7788941C750
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000), ref: 009E2958
                                                                                      • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800), ref: 009E299C
                                                                                      • SetFileTime.KERNEL32(?,?,?,00000000), ref: 009E2A1D
                                                                                      • CloseHandle.KERNEL32(?), ref: 009E2A24
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$Create$CloseHandleTime
                                                                                      • String ID:
                                                                                      • API String ID: 2287278272-0
                                                                                      • Opcode ID: 57140aeaaf9a9070de8e3643b416ec2a113d64ba7c07f697d562e88ccad4e3d7
                                                                                      • Instruction ID: 165aeacbe9ce09e655f25fea8f71dd6429fa9fd9e8a4b491ed792cb3847b83f0
                                                                                      • Opcode Fuzzy Hash: 57140aeaaf9a9070de8e3643b416ec2a113d64ba7c07f697d562e88ccad4e3d7
                                                                                      • Instruction Fuzzy Hash: 6741C9302483C4AAE722DF66CD42BAEBBECAB85300F140919F5D1931D2C664DE48DB22
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • MultiByteToWideChar.KERNEL32(?,00000000,F4E85006,009FAD29,00000000,00000000,009FBD5E,?,009FBD5E,?,00000001,009FAD29,F4E85006,00000001,009FBD5E,009FBD5E), ref: 00A02DE5
                                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00A02E6E
                                                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00A02E80
                                                                                      • __freea.LIBCMT ref: 00A02E89
                                                                                        • Part of subcall function 009FF9E5: RtlAllocateHeap.NTDLL(00000000,?,?,?,009FA7E9,?,0000015D,?,?,?,?,009FBCC5,000000FF,00000000,?,?), ref: 009FFA17
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                      • String ID:
                                                                                      • API String ID: 2652629310-0
                                                                                      • Opcode ID: f7c2ed60d512770cb866be4d3ed37fb4325f63c2142e7a04fbeab5a684ec5eb2
                                                                                      • Instruction ID: fd9e0937fab4306fc58e1f6880b086e9c077af46e5d63a34d91cf92373085aa6
                                                                                      • Opcode Fuzzy Hash: f7c2ed60d512770cb866be4d3ed37fb4325f63c2142e7a04fbeab5a684ec5eb2
                                                                                      • Instruction Fuzzy Hash: BF31BE72A0021EABDF25DF64EC49EAF7BA5EB44710B144229FC08D7190EB35CD51CBA0
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetDC.USER32(00000000), ref: 009F1176
                                                                                      • GetDeviceCaps.GDI32(00000000,00000058), ref: 009F1185
                                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 009F1193
                                                                                      • ReleaseDC.USER32(00000000,00000000), ref: 009F11A1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: CapsDevice$Release
                                                                                      • String ID:
                                                                                      • API String ID: 1035833867-0
                                                                                      • Opcode ID: d47ea8a4c6fb2d0f5675d05753751b3f4957fdcafe7ca62258a02f0d8033ce90
                                                                                      • Instruction ID: 2b4944f764ec15517af1730ac0904b14bef1c22819cc39c25dc7c11ad65c9cea
                                                                                      • Opcode Fuzzy Hash: d47ea8a4c6fb2d0f5675d05753751b3f4957fdcafe7ca62258a02f0d8033ce90
                                                                                      • Instruction Fuzzy Hash: 02E0E6399C2720ABD3709BE47C0DB973E64ABA7752F000161FB0595190C76645468BD1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                        • Part of subcall function 009F11A9: GetDC.USER32(00000000), ref: 009F11AD
                                                                                        • Part of subcall function 009F11A9: GetDeviceCaps.GDI32(00000000,0000000C), ref: 009F11B8
                                                                                        • Part of subcall function 009F11A9: ReleaseDC.USER32(00000000,00000000), ref: 009F11C3
                                                                                      • GetObjectW.GDI32(?,00000018,?), ref: 009F134C
                                                                                        • Part of subcall function 009F15DE: GetDC.USER32(00000000), ref: 009F15E7
                                                                                        • Part of subcall function 009F15DE: GetObjectW.GDI32(?,00000018,?), ref: 009F1616
                                                                                        • Part of subcall function 009F15DE: ReleaseDC.USER32(00000000,?), ref: 009F16AE
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: ObjectRelease$CapsDevice
                                                                                      • String ID: (
                                                                                      • API String ID: 1061551593-3887548279
                                                                                      • Opcode ID: d9b742e0d9ab9a2fbe2a4194027b35e49eb1d14cf4800cbbf2961eb1a65bec28
                                                                                      • Instruction ID: 7104a7f9f4d433be1d157f9fda8adf1e2854817868938947febdbfca0044b9d5
                                                                                      • Opcode Fuzzy Hash: d9b742e0d9ab9a2fbe2a4194027b35e49eb1d14cf4800cbbf2961eb1a65bec28
                                                                                      • Instruction Fuzzy Hash: AB91EF75608348AFC710DF65D844A6BBBF8FBC9710F10485EF59AD3260DB71A806CBA2
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcslen
                                                                                      • String ID: }
                                                                                      • API String ID: 176396367-4239843852
                                                                                      • Opcode ID: d32a3d81f548f110ed1a4706fb06d8697be8c88834429285cf1284f545ffd86a
                                                                                      • Instruction ID: b0c615defef74f234e2906c7c58cb3340a2be811b3285944be0cd764742d161f
                                                                                      • Opcode Fuzzy Hash: d32a3d81f548f110ed1a4706fb06d8697be8c88834429285cf1284f545ffd86a
                                                                                      • Instruction Fuzzy Hash: CF219D63A0431E5AD721EB64D845BBBB3ECDF81760F58042AF784C2181EB65ED48C3A7
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                        • Part of subcall function 009E58FC: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 009E591B
                                                                                        • Part of subcall function 009E58FC: GetProcAddress.KERNEL32(00A1E028,CryptUnprotectMemory), ref: 009E592B
                                                                                      • GetCurrentProcessId.KERNEL32(?,?,?,009E596C), ref: 009E59FF
                                                                                      Strings
                                                                                      • CryptUnprotectMemory failed, xrefs: 009E59F7
                                                                                      • CryptProtectMemory failed, xrefs: 009E59B6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$CurrentProcess
                                                                                      • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                                                                      • API String ID: 2190909847-396321323
                                                                                      • Opcode ID: 2f79cfc05fa7572a64805b72ff87bf70f86159e2b8bf80918faecadb20f41e72
                                                                                      • Instruction ID: fe3320d20787edc298567374f08bb66d6ffd873a98df58d35f834127d5e44907
                                                                                      • Opcode Fuzzy Hash: 2f79cfc05fa7572a64805b72ff87bf70f86159e2b8bf80918faecadb20f41e72
                                                                                      • Instruction Fuzzy Hash: 42113B32601A68BBDB13DF22ED416AE376DFF48764B018115FC415B293D7749E02C6D4
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • _swprintf.LIBCMT ref: 009E3529
                                                                                        • Part of subcall function 009E2AA2: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 009E2AB5
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: __vswprintf_c_l_swprintf
                                                                                      • String ID: %c:\
                                                                                      • API String ID: 1543624204-3142399695
                                                                                      • Opcode ID: 9af1e53d800125ca7ebc4c4b6369c111c2ea119d9f1081a39ad73a9c39df46a3
                                                                                      • Instruction ID: 1c510221ca28e6dfab3a2a7828504853bcea96d2cc7433f44100b5ca79d4916e
                                                                                      • Opcode Fuzzy Hash: 9af1e53d800125ca7ebc4c4b6369c111c2ea119d9f1081a39ad73a9c39df46a3
                                                                                      • Instruction Fuzzy Hash: 5101F5A3504351B9DA32673ADC4AE6BB7ACEE95760B50C91EF558C7182FE20DE40C2A1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • IsWindowVisible.USER32(?), ref: 009F4836
                                                                                      • DialogBoxParamW.USER32(GETPASSWORD1,?,009F1DE0,?), ref: 009F4871
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: DialogParamVisibleWindow
                                                                                      • String ID: GETPASSWORD1
                                                                                      • API String ID: 3157717868-3292211884
                                                                                      • Opcode ID: 8382badb953d121fcb7f472a7669d472a1f4c135fd1ff17f6b1e42425302659f
                                                                                      • Instruction ID: 49a691aecd7aa38ef734983e046715afe096a14c27702a79cf4a10a9bb405d9a
                                                                                      • Opcode Fuzzy Hash: 8382badb953d121fcb7f472a7669d472a1f4c135fd1ff17f6b1e42425302659f
                                                                                      • Instruction Fuzzy Hash: 181129342442D8BECB129FA4DC06FFB3BAC6B853C1F008035B645A3191C6B45C84CB62
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                        • Part of subcall function 009E4878: _swprintf.LIBCMT ref: 009E489E
                                                                                        • Part of subcall function 009E4878: SetDlgItemTextW.USER32(?,00A14154,?), ref: 009E491F
                                                                                        • Part of subcall function 009E4878: GetWindowRect.USER32(?,?), ref: 009E4959
                                                                                        • Part of subcall function 009E4878: GetClientRect.USER32(?,?), ref: 009E4965
                                                                                      • GetDlgItem.USER32(00000000,00003021), ref: 009E120A
                                                                                      • SetWindowTextW.USER32(00000000,00A09584), ref: 009E1220
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: ItemRectTextWindow$Client_swprintf
                                                                                      • String ID: 0
                                                                                      • API String ID: 758586884-4108050209
                                                                                      • Opcode ID: 623d688ae7fec5ad9f864612568f06f1aa65b2a32d11a4b3d7743797a02dcf3f
                                                                                      • Instruction ID: afe64069a9fe58cb20486cac713a5e7d417c2f84f598f9b35159ae845da33720
                                                                                      • Opcode Fuzzy Hash: 623d688ae7fec5ad9f864612568f06f1aa65b2a32d11a4b3d7743797a02dcf3f
                                                                                      • Instruction Fuzzy Hash: 30F08C744402CAABDF074FA69C0DBF93BA8AB65365F008118FE58902A2C779CD91EA11
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: _swprintf
                                                                                      • String ID: z%s%02d$z%s%d
                                                                                      • API String ID: 589789837-468824935
                                                                                      • Opcode ID: 368406bbd72925ad5bde2a32d1ca5ce1b0c9e31cea18658fdf807e45d01ce6d7
                                                                                      • Instruction ID: 5aa0a8225692803420d96ff2aabe288e131933944eec91caeed597b7e35416cd
                                                                                      • Opcode Fuzzy Hash: 368406bbd72925ad5bde2a32d1ca5ce1b0c9e31cea18658fdf807e45d01ce6d7
                                                                                      • Instruction Fuzzy Hash: 23F0B4B140018D6BCF02AE86DC019EB775EEB98340F004036FD0AA7192DA71DD5587A1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNEL32(00000000,?,009E3FE5,?), ref: 009E4833
                                                                                      • FindResourceW.KERNEL32(00000000,RTL,00000005,?,009E3FE5,?), ref: 009E4841
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1727691538.00000000009E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009E0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1727661525.00000000009E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727719271.0000000000A09000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727744039.0000000000A49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1727817952.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_9e0000_64drop.jbxd
                                                                                      Similarity
                                                                                      • API ID: FindHandleModuleResource
                                                                                      • String ID: RTL
                                                                                      • API String ID: 3537982541-834975271
                                                                                      • Opcode ID: 0168a1046395cc87a1c6e6c61f22392048e6e900f8e9384e9371911bc9ba3211
                                                                                      • Instruction ID: d5ee5f0cd6183582cd397793f07af73802262f72d14c71ae7665f066379a2fed
                                                                                      • Opcode Fuzzy Hash: 0168a1046395cc87a1c6e6c61f22392048e6e900f8e9384e9371911bc9ba3211
                                                                                      • Instruction Fuzzy Hash: 9AC0123164039466E6305B717C4DB836E587B00712F050558B2429B0C1D7E5CC4386A0
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Execution Graph

                                                                                      Execution Coverage:8.4%
                                                                                      Dynamic/Decrypted Code Coverage:77.8%
                                                                                      Signature Coverage:0%
                                                                                      Total number of Nodes:9
                                                                                      Total number of Limit Nodes:0
                                                                                      execution_graph 34382 3403f60 34385 3403f83 34382->34385 34383 3403fb3 KiUserExceptionDispatcher 34384 3403fc3 34383->34384 34385->34383 34389 912b5e0 34390 912b62b SendARP 34389->34390 34392 912b679 34390->34392 34386 1106578 34387 1106585 VirtualAlloc 34386->34387
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.1718098943.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_3400000_CromulentLauncher.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 834d6c134e318ba805dd360d9db3e3f0040c95921075b7b6ea5177960d2954dd
                                                                                      • Instruction ID: 0705a53507ef68853e270e6f640c8dbfa61c2531a80961f4ede17c112a2beb85
                                                                                      • Opcode Fuzzy Hash: 834d6c134e318ba805dd360d9db3e3f0040c95921075b7b6ea5177960d2954dd
                                                                                      • Instruction Fuzzy Hash: D81167747012018FCB44EB3AE69066E37F3ABC92143A0063AD109DB365EB359803CF94
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 433 912b5d8-912b631 435 912b633-912b63f 433->435 436 912b641-912b677 SendARP 433->436 435->436 437 912b680-912b694 436->437 438 912b679-912b67f 436->438 438->437
                                                                                      APIs
                                                                                      • SendARP.IPHLPAPI(?,?,00000000,?), ref: 0912B66A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.1725194828.0000000009120000.00000040.00000800.00020000.00000000.sdmp, Offset: 09120000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_9120000_CromulentLauncher.jbxd
                                                                                      Similarity
                                                                                      • API ID: Send
                                                                                      • String ID:
                                                                                      • API String ID: 121738739-0
                                                                                      • Opcode ID: feaaa1e7966dfc6eb91bfe2755e2429174065c1883992a4ae0c4e3b36d438c59
                                                                                      • Instruction ID: 62282094c42d2048190ff95a6764b9d1bc80cc67763edb75290a7fc9d85b9d11
                                                                                      • Opcode Fuzzy Hash: feaaa1e7966dfc6eb91bfe2755e2429174065c1883992a4ae0c4e3b36d438c59
                                                                                      • Instruction Fuzzy Hash: 942100B1A042189FCB14DFAAC885BDEBBF4FB49314F10812AE859A7350D374A944CFA4
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 440 912b5e0-912b631 442 912b633-912b63f 440->442 443 912b641-912b677 SendARP 440->443 442->443 444 912b680-912b694 443->444 445 912b679-912b67f 443->445 445->444
                                                                                      APIs
                                                                                      • SendARP.IPHLPAPI(?,?,00000000,?), ref: 0912B66A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.1725194828.0000000009120000.00000040.00000800.00020000.00000000.sdmp, Offset: 09120000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_9120000_CromulentLauncher.jbxd
                                                                                      Similarity
                                                                                      • API ID: Send
                                                                                      • String ID:
                                                                                      • API String ID: 121738739-0
                                                                                      • Opcode ID: abed714b02c6e324ebe2b7a52563b4eeb64bf6ab8d9504e377a90d4ea6f8bb56
                                                                                      • Instruction ID: 0236f9973cf47cc81e8400357166a99b039167ea674bb34e7c6f81b3fbf46061
                                                                                      • Opcode Fuzzy Hash: abed714b02c6e324ebe2b7a52563b4eeb64bf6ab8d9504e377a90d4ea6f8bb56
                                                                                      • Instruction Fuzzy Hash: 952104B5A002189FCB10DF9AC884BDEFBF4FB49314F50852AE858A7350D374A944CFA4
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 03403FB5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.1718098943.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_3400000_CromulentLauncher.jbxd
                                                                                      Similarity
                                                                                      • API ID: DispatcherExceptionUser
                                                                                      • String ID:
                                                                                      • API String ID: 6842923-0
                                                                                      • Opcode ID: e8c076a781f3c78d146ffe14821131f1d188d39a8f0615de2fd7d4762a8b73c6
                                                                                      • Instruction ID: 6bfc4ace627e6ceee808e507c8c050eab5766c2fb94f8ce6584f6d51d7c305d0
                                                                                      • Opcode Fuzzy Hash: e8c076a781f3c78d146ffe14821131f1d188d39a8f0615de2fd7d4762a8b73c6
                                                                                      • Instruction Fuzzy Hash: 37019978B005249FDB45BB64E41D9AD7BB2FF88705700405AE947D3398DF345A0ADF85
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 463 3403f60-3403f7b 464 3403f83-3403fd3 call 34092a8 call 3409859 KiUserExceptionDispatcher 463->464 478 3403f7d call 3404449 463->478 474 3403fdb-340400c 464->474 478->464
                                                                                      APIs
                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 03403FB5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.1718098943.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_3400000_CromulentLauncher.jbxd
                                                                                      Similarity
                                                                                      • API ID: DispatcherExceptionUser
                                                                                      • String ID:
                                                                                      • API String ID: 6842923-0
                                                                                      • Opcode ID: 9d71eac5e69cc7b21ce067fdd237b728d7ebaa9b33fe7be76b9ef0621d3bcc72
                                                                                      • Instruction ID: 94233424cbe132b0f9e26304c49e52fc382e9977697853bc9a3979748b955b2a
                                                                                      • Opcode Fuzzy Hash: 9d71eac5e69cc7b21ce067fdd237b728d7ebaa9b33fe7be76b9ef0621d3bcc72
                                                                                      • Instruction Fuzzy Hash: D5019A7CB005248F9B45BB64A01C86D7BB6FB486057004019E907D3394DF345A0BDFC6
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      APIs
                                                                                      • VirtualAlloc.KERNEL32(?,?,?,?), ref: 011065A3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.1716620833.00000000010FA000.00000040.00000001.01000000.00000009.sdmp, Offset: 00F78000, based on PE: true
                                                                                      • Associated: 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.1716620833.00000000010DD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_f30000_CromulentLauncher.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 4275171209-0
                                                                                      • Opcode ID: cb4924fe05128a0d05165a668dd92a3733ec39e9cc93e169ea228da6acddbc59
                                                                                      • Instruction ID: d7fc683886d7458f300bf84d3d6527e002fba398267e6711976ddc04e2fa7e6a
                                                                                      • Opcode Fuzzy Hash: cb4924fe05128a0d05165a668dd92a3733ec39e9cc93e169ea228da6acddbc59
                                                                                      • Instruction Fuzzy Hash: 5BE0ECB5B00108ABDB55CE4CDA44B5A33DDA74D250F108411F609D7649C275F860CB75
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.1717812668.000000000322D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0322D000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_322d000_CromulentLauncher.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 2b8f0d1c6fe3ea9dd43c13986095595c58a7938e9eacb57015eb5bcd9344fb30
                                                                                      • Instruction ID: 1f5ff16187432e718f22befad533bfd0e4d46dd193a7939b6f180bd4721fd604
                                                                                      • Opcode Fuzzy Hash: 2b8f0d1c6fe3ea9dd43c13986095595c58a7938e9eacb57015eb5bcd9344fb30
                                                                                      • Instruction Fuzzy Hash: 03212271514200EFDB15DF14DDC4B2BBFA5FB88318F24C5A9E9094B216C3BAD4A6CBA1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.1717812668.000000000322D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0322D000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_322d000_CromulentLauncher.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 3be31bb4d36ceb8430c376a6ed64ce8f861b6205ec090b3f4584bc40cab41787
                                                                                      • Instruction ID: ff86b36b8f862b84244dad0982a09599677a5fedc3f01bf505723e127d08ff2d
                                                                                      • Opcode Fuzzy Hash: 3be31bb4d36ceb8430c376a6ed64ce8f861b6205ec090b3f4584bc40cab41787
                                                                                      • Instruction Fuzzy Hash: DC213371514244EFCB04DF14CDC0B2BFF65FB84324F24C1A9E8094B216C376E486CAA1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.1717915652.000000000337D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0337D000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_337d000_CromulentLauncher.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: d829e4b3d084689d651d9097aa5623e0be554f8f9c67cc40d390308253414d3b
                                                                                      • Instruction ID: 2c7339bffdf2bff90fc3fb94b89d684e95eaca2f4479f1d79aa8174e4826be21
                                                                                      • Opcode Fuzzy Hash: d829e4b3d084689d651d9097aa5623e0be554f8f9c67cc40d390308253414d3b
                                                                                      • Instruction Fuzzy Hash: 5831287550E3C48FD713CB24D994755BF71AF46214F29C1DBC8888F6A7C23A980ACB62
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.1717915652.000000000337D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0337D000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_337d000_CromulentLauncher.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c21ba429e6c3e1322acaf5bf29a50429f97c20eac8138c88c0e41f836117171a
                                                                                      • Instruction ID: 524e3b1a38b0a1920a7fdc6b0534b4c32ac096c55b0113a01f48a15a1c632142
                                                                                      • Opcode Fuzzy Hash: c21ba429e6c3e1322acaf5bf29a50429f97c20eac8138c88c0e41f836117171a
                                                                                      • Instruction Fuzzy Hash: DC210471604204EFDB25DF14D9C0B26BBA9FF84314F24C9ADD8494B256C33AD847CA61
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.1717915652.000000000337D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0337D000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_337d000_CromulentLauncher.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: b9a7b5c10471ba6d26e83cf22d5407daba63edcda0f0a1d91afd99dbc38d2370
                                                                                      • Instruction ID: b9935eea4f2ec9f75a6e5003f01b4bdaaf8b027fcecf61b8019a6378290678e6
                                                                                      • Opcode Fuzzy Hash: b9a7b5c10471ba6d26e83cf22d5407daba63edcda0f0a1d91afd99dbc38d2370
                                                                                      • Instruction Fuzzy Hash: 6921F371504244DFDB20DF14D9C4B2ABFA9FF84324F28C5AAD8094B246C37ED446CAA2
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.1716620833.0000000000F78000.00000040.00000001.01000000.00000009.sdmp, Offset: 00F30000, based on PE: true
                                                                                      • Associated: 00000001.00000002.1716550141.0000000000F30000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.1716566592.0000000000F32000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.1716620833.00000000010DD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.1716620833.00000000010FA000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.1716620833.000000000122B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_f30000_CromulentLauncher.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 518408baf94603cec1b8719a5ba8c227c0da2946edb44c376bd9b90b96e5ed87
                                                                                      • Instruction ID: 3a86cd4a1e23052a0528a82ea3970deeb3252bbaf8de909bdcce5c663653845f
                                                                                      • Opcode Fuzzy Hash: 518408baf94603cec1b8719a5ba8c227c0da2946edb44c376bd9b90b96e5ed87
                                                                                      • Instruction Fuzzy Hash: AE1194307003128FE315EF29E4D4A59B7EBBB8A314F5481B2E684C73A9CE799C41CB52
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.1717812668.000000000322D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0322D000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_322d000_CromulentLauncher.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c19ffdc8b203b97519f7b0b659eba67c25cdc18a70f81b6ee6acb1924888206d
                                                                                      • Instruction ID: 6b1ddef5199e48e44234f025be1b806e9b1ac27456f47cf4c530ba524200ef99
                                                                                      • Opcode Fuzzy Hash: c19ffdc8b203b97519f7b0b659eba67c25cdc18a70f81b6ee6acb1924888206d
                                                                                      • Instruction Fuzzy Hash: B411D376504280DFDB16CF10D9C4B56BF71FB94318F28C6A9DC094B216C33AD4AACBA1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.1717812668.000000000322D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0322D000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_322d000_CromulentLauncher.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c19ffdc8b203b97519f7b0b659eba67c25cdc18a70f81b6ee6acb1924888206d
                                                                                      • Instruction ID: 397dead844f1a7e0e561b0627907c29480af21a50b1ccdf2ac311fd0d2b31749
                                                                                      • Opcode Fuzzy Hash: c19ffdc8b203b97519f7b0b659eba67c25cdc18a70f81b6ee6acb1924888206d
                                                                                      • Instruction Fuzzy Hash: DD11E476404280DFCB01CF00D9C4B16FF62FB94314F28C2A9D8084B616C33AD456CBA1
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%

                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.1717915652.000000000337D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0337D000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_337d000_CromulentLauncher.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 0187bca310b961ac37e0564660db0e7edeefa82911be206c7875997007e58ac0
                                                                                      • Instruction ID: bccd76a415eb7320e13db740b5e8077ff12d438a7b28b53f4c8ac12ee3f859a9
                                                                                      • Opcode Fuzzy Hash: 0187bca310b961ac37e0564660db0e7edeefa82911be206c7875997007e58ac0
                                                                                      • Instruction Fuzzy Hash: FF118B75504280DFDB16CF14D9C4B15BFA1FF84318F28CAAADC494B656C33AD84ACB61
                                                                                      Uniqueness

                                                                                      Uniqueness Score: -1.00%